DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Mikhy Farrera-Brochez sentenced to two years’ jail over Singapore HIV patient data leak

Posted on September 28, 2019 by Dissent

Charissa Yong reports:

American Mikhy Farrera-Brochez was sentenced on Friday (Sept 27) to two years in jail for using a stolen HIV database from Singapore to extort from the Singapore Government.

A Kentucky federal court had earlier in June convicted Farrera-Brochez, 34, of two counts of extortion in two e-mails sent on Jan 22 and Feb 18 this year.

Read more on The Straits Times.

The press release from the U.S. Attorney’s Office for the Eastern District of Kentucky:

LEXINGTON, Ky. —Mikhy Farrera-Brochez, a 34-year-old man originally from Winchester, Kentucky, was sentenced to 24 months in federal prison Friday, by United States Chief District Judge Danny C. Reeves, for sending extortionate communications to the Government of Singapore and its Ministry of Health and using the means of identification of over 14,200 people as leverage in his extortion attempt.

According to trial testimony, Farrera-Brochez obtained access to a database belonging to the Singaporean Ministry of Health that listed the private identifying and medical information of thousands of people in Singapore living with HIV, including more than 50 U.S. citizens. Farrera-Brochez sent the database to his mother in Kentucky, and retrieved it when he returned to Kentucky in 2018.

On January 22, Farrera-Brochez sent an email to several officials of the Government of Singapore that included three links to places on the internet where he had put copies of the database. Farrera-Brochez made several demands in that email. On February 18, Farrera-Brochez sent a second email to officials of the Government of Singapore threatening to publish the database if his demands were not met.

Farrera-Brochez was convicted on June 4. In addition to the sentencing, Farrera-Brochez was also ordered to forfeit to the federal government the electronic devices and Google accounts that he used in his crimes. Upon release from prison, Farrera-Brochez will be on supervised release for 3 years.

Robert M. Duncan, Jr., United States Attorney for the Eastern District of Kentucky, and James Robert Brown, Jr., Special Agent in Charge of the FBI, jointly made the announcement.

“The defendant’s conduct was serious and significant, affecting thousands of people across the world,” said United States Attorney Robert M. Duncan, Jr. “The defendant unlawfully obtained the private, personal identifying information of more than 14,000 people, including American citizens, and used this information in an attempt to extort the government of a foreign nation.  Without the hard work of law enforcement personnel, the defendant could have caused significant additional harm, by publishing this personal and private information.”

The investigation was conducted by the FBI with assistance from the Kentucky State Police. The United States was represented by Assistant United States Attorney Dmitriy Slavin and Special Assistant United States Attorney James Chapman.

Category: Health DataNon-U.S.Of Note

Post navigation

← After two nights in jail, St. Louis lawyer ordered to pay $775,000 to her former firm for copying client files
Tomo Drug Testing Notification of Security Incident →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.