DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Georgia Spine and Orthopaedics of Atlanta notifies 7,012 patients after phishing attack

Posted on November 28, 2018 by Dissent

Another day, another successful phishing attack in the healthcare sector.  From the web site of Georgia Spine and Orthopaedics of Atlanta:

Georgia Spine and Orthopaedics of Atlanta (“GSO”) was a recent victim of an email “phishing” scam that resulted in unauthorized access to an employee’s email account. “Phishing” involves scammers sending emails that look legitimate, but in reality, are fraudulent. The emails often have malicious links or documents within them that, when accessed, allow the scammer to gain the email account/passwords – often without the knowledge of the email account owner. Companies all over the world are faced with the threat of phishing scams every day, as scammers get more and more sophisticated.

Unfortunately, phishing scams are hard to detect. Upon discovery of the incident, we promptly terminated the unauthorized access. We also engaged outside technical and legal experts to investigate the incident thoroughly to determine the full nature and scope of the access, to ensure our information technology systems are truly secure, and to identify (through a very tedious technical assessment and hand document review process) the exact emails that were actually accessed by the third party. After expert analysis, it was determined that the unauthorized access occurred on July 11, 2018. Because of the way the email account was accessed, a desk copy of certain emails was potentially saved onto the computer of the unauthorized third party – likely unintentionally, but we had to assume that the third party retained a copy of that data. As such, we searched the emails to determine whether sensitive data was located within any of the emails that were potentially saved. Individual emails were then hand reviewed to obtain names and mailing addresses.

After completing this extensive review, on October 26, 2018, we were alerted by the reviewers’ final mailing list that the mailbox included patient names and other information typically found in a medical record. A smaller number of the emails contained Social Security numbers and/or driver’s license numbers.

Fortunately, the unauthorized access did not extend beyond the single email account. We have attempted to notify by letter those for whom we had mailing addresses. GSO has advised affected persons to remain vigilant and monitor account statements and credit reports carefully and to report discrepancies to law enforcement. Fraud alerts and security freezes also can be activated to help protect individuals.

GSO has set up a toll free hotline to address any questions or concerns. If you are concerned your information was included in this incident, please call 888-238-5166, Monday through Friday, from 9 am to 9 pm EST for the next 90 days.

Comment:  Look at the cost of this phishing incident in terms of time and labor to investigate it so that proper notifications could be made.  Over 7,000 patients were notified. So let me ask one question:  why was so much email with PHI  in an employee’s inbox or mailbox? Was all of it needed for work that week? Could it/should it have been moved to other storage?

We know that despite training, some employees will fall prey to phishing attacks. So why aren’t you limiting how much data can be held in email accounts?

Category: Health DataPhishingU.S.

Post navigation

← Two Iranian Men Indicted for Deploying Ransomware to Extort Hospitals, Municipalities, and Public Institutions, Causing Over $30 Million in Losses
ElasticSearch server exposed the personal data of over 57 million US citizens →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.