DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Georgia Spine and Orthopaedics of Atlanta notifies 7,012 patients after phishing attack

Posted on November 28, 2018 by Dissent

Another day, another successful phishing attack in the healthcare sector.  From the web site of Georgia Spine and Orthopaedics of Atlanta:

Georgia Spine and Orthopaedics of Atlanta (“GSO”) was a recent victim of an email “phishing” scam that resulted in unauthorized access to an employee’s email account. “Phishing” involves scammers sending emails that look legitimate, but in reality, are fraudulent. The emails often have malicious links or documents within them that, when accessed, allow the scammer to gain the email account/passwords – often without the knowledge of the email account owner. Companies all over the world are faced with the threat of phishing scams every day, as scammers get more and more sophisticated.

Unfortunately, phishing scams are hard to detect. Upon discovery of the incident, we promptly terminated the unauthorized access. We also engaged outside technical and legal experts to investigate the incident thoroughly to determine the full nature and scope of the access, to ensure our information technology systems are truly secure, and to identify (through a very tedious technical assessment and hand document review process) the exact emails that were actually accessed by the third party. After expert analysis, it was determined that the unauthorized access occurred on July 11, 2018. Because of the way the email account was accessed, a desk copy of certain emails was potentially saved onto the computer of the unauthorized third party – likely unintentionally, but we had to assume that the third party retained a copy of that data. As such, we searched the emails to determine whether sensitive data was located within any of the emails that were potentially saved. Individual emails were then hand reviewed to obtain names and mailing addresses.

After completing this extensive review, on October 26, 2018, we were alerted by the reviewers’ final mailing list that the mailbox included patient names and other information typically found in a medical record. A smaller number of the emails contained Social Security numbers and/or driver’s license numbers.

Fortunately, the unauthorized access did not extend beyond the single email account. We have attempted to notify by letter those for whom we had mailing addresses. GSO has advised affected persons to remain vigilant and monitor account statements and credit reports carefully and to report discrepancies to law enforcement. Fraud alerts and security freezes also can be activated to help protect individuals.

GSO has set up a toll free hotline to address any questions or concerns. If you are concerned your information was included in this incident, please call 888-238-5166, Monday through Friday, from 9 am to 9 pm EST for the next 90 days.

Comment:  Look at the cost of this phishing incident in terms of time and labor to investigate it so that proper notifications could be made.  Over 7,000 patients were notified. So let me ask one question:  why was so much email with PHI  in an employee’s inbox or mailbox? Was all of it needed for work that week? Could it/should it have been moved to other storage?

We know that despite training, some employees will fall prey to phishing attacks. So why aren’t you limiting how much data can be held in email accounts?


Related:

  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Health DataPhishingU.S.

Post navigation

← Two Iranian Men Indicted for Deploying Ransomware to Extort Hospitals, Municipalities, and Public Institutions, Causing Over $30 Million in Losses
ElasticSearch server exposed the personal data of over 57 million US citizens →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • NCCIA arrests man over massive data breach involving millions of Pakistanis
  • Defense Contractors Are Silencing Their Cybersecurity Watchdogs
  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
  • ALT5 Sigma sues former consultant over alleged data breach
  • Is your cyberinsurance paid up? Are you sure?
  • Everest Group Interview on Collins Aerospace Breach — Daily Dark Web
  • Breaking Up With Edtech Is Hard to Do
  • Benworth Capital Partners negotiated with threat actors after more than 25,000 lenders had data stolen
  • Android Hit by 0-Click RCE Vulnerability in Core System Component
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Illuminate Education For Failing to Protect Students’ Data

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Modern cars are spying on you. Here’s what you can do about it.
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Education Software Company for Failing to Protect Students’ Data       
  • EU Parliament committee votes to advance controversial Europol data sharing proposal
  • DHS offers “disturbing new excuses” to seize kids’ biometric data, expert says
  • California Adds Injunctive Relief to its Right of Publicity Statute and Extends Liability to Digital Replicas

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.