DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

SC: Roper St. Francis notifying patients after employees fall for phishing attack

Posted on February 4, 2019 by Dissent

Roper St.  Francis posted the following notice on their web site on January 29:

Roper St. Francis Healthcare values the privacy and confidentiality of our patients’ information. Regrettably, this notice is regarding a recent incident that may have involved some of your information.

On November 30, 2018, we learned that an unauthorized actor may have gained access to some employees’ email accounts between November 15 and December 1, 2018.  We immediately took steps to secure the email account and began an investigation, which included hiring a leading third party forensic firm. Our investigation determined that some patient information may have been contained in the email accounts, patients’ names, medical record numbers, information about services they received from Roper St. Francis, health insurance information, and, in some cases, Social Security numbers and financial information.

We have no indication that any patient information has been misused. As a precaution, for those patients whose Social Security number was affected, we are offering complimentary credit monitoring and identity protection services. We advise all patients affected to review the statements they receive from their healthcare providers. If they see services they did not receive, please contact the provider immediately.

We began mailing letters to affected patients on January 25, 2019 and have established a dedicated call center to answer any questions patients may have. If you believe you were affected by this incident and do not receive a letter by February 20, 2019, please call 1-877-231-1926, Monday through Friday, 9 a.m. to 9 p.m., Monday through Friday.

We apologize for any inconvenience or concern this incident may cause you. To help prevent something like this from happening again, we are continuing education with our staff on email protection and enhancing our email security.

Note: Two site are reporting that 13 employees fell for the attack,  but neither site provides a source for that statement.


Related:

  • Russian hackers target IVF clinics across UK used by thousands of couples
  • Large medical lab in South Africa suffers multiple data breaches
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • From bad to worse: Doctor Alliance hacked again by same threat actor (2)
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
Category: Health DataPhishingU.S.

Post navigation

← Russian Darknet Forum Selling Access to U.S. News Sites
MN: Infertility clinic reports malware incident →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief
  • Justice Department Announces Actions to Combat Two Russian State-Sponsored Hacking Groups
  • Should entities be required to disclose the name of a vendor if the breach was at the vendor’s?
  • The Hidden Risks of Information Disclosure: A Costly Lesson from Cornwall
  • Defense Bill Would Require New Cyber Requirements for Some DoD Telecom Contracts
  • Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition (1)
  • US Posts $10 Million Bounty for Iranian Hackers
  • South Korea police raid e-commerce giant Coupang over data leak; govt schedules hearing

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC Denies Petition from SpyFone App CEO to Vacate 2021 Order
  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.