DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Wise Health updates its breach notification of last summer

Posted on February 17, 2020 by Dissent

In July 2019, this site noted that Wise Health in Texas had notified HHS about a HIPAA breach impacting 35,899 patients. The report concerned a phishing incident in March, 2019 that was discovered in April, 2019.

Last week, Wise Health issued another press release, reproduced below. At first blush, it might sound like a new incident, but it appears to be the same incident, although the provider does not explain why it took so long to identify the additional 31,000 patients who required notification.


DECATUR, Texas, Feb. 13, 2020 /PRNewswire/ — Wise Health System in Decatur, TX, has started sending notifications to patients to inform them that some of their protected health information (PHI) has been exposed as a result of a phishing attack. 66,934 patients have potentially been affected.

The attack occurred on March 14, 2019. Several employees received phishing emails and some responded and disclosed their account credentials. The credentials were then used to gain access to the Employee Kiosk, where the attacker(s) attempted to reroute payroll direct deposits. Attempts were made to redirect approximately 100 direct deposit payments.

Wise Health had policies in place that require a paper check to be printed for two successive payrolls following a change to direct deposit information. The checks were printed in the payroll on April 5, 2019 and the unusually high number of checks raised the alarm, thanks to the two-check policy.  A system-wide password change was immediately performed to lock out the attackers and two third-party forensic firms were hired to investigate the breach. The breach was also reported to the FBI.

The sole purpose of the attack appears to have been to reroute direct deposits, although the stolen credentials would have allowed access to be gained to employee email accounts. Those accounts contained patients’ names, medical record numbers, diagnostic information, treatment information, and health insurance information.

Wise Health System does not believe PHI was accessed by the attackers and there have been no confirmed reports that patient information has been misused. Both forensics firms and the FBI share that point of view. The investigators all agreed they have never seen a direct deposit attack such as this where the attackers have stolen patient data. These gangs specialize in direct deposit fraud. The attackers in this case were traced to Africa by the FBI, which has now closed its investigation.

A data audit was completed to determine the scope and nature of the information potentially compromised, which began in June 2019 and was recently completed. Since unauthorized PHI access and data theft could not be ruled out, to ensure patients are protected, notification letters were sent on February 13, 2020, and affected patients have been offered between twelve and twenty four (12-24) months of complimentary membership to ID Experts MyIDCare service, which includes credit monitoring, identity theft recovery, and insurance coverage.

Wise Health System has reviewed its security policies and procedures and has taken numerous steps to reinforce security. Additionally, Wise Health System has established an informational line for potentially impacted individuals to call at (940) 539-3500 or (940) 627-5921 ext. 9088.

SOURCE Wise Health System


While it is probably the case that the attack was targeting employee payroll, how will HHS view the fact that some patients were not notified for 10 months following discovery of an incident?

And once again, how much of this incident could have been reduced if there wasn’t so much PHI in employee email accounts? Was all of it current and necessary or could it have been moved out of the employees’ email accounts already?

Related posts:

  • GA: Former IRS Revenue Agent Pleads Guilty to Aggravated Identity Theft of Taxpayer Information
  • Wise Health notifies almost 36,000 after phishing attack compromised employees’ email accounts
  • Victims of W-2 phishing scams (2017 list)
Category: Breach IncidentsHealth DataPhishingU.S.

Post navigation

← TX: Port Lavaca City Hall won’t pay $200k ransom demand; working to recover from Ryuk attack
UK: Redcar cyber-attack: Council using pen and paper →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit
  • British national “IntelBroker” charged with causing $25 million in damages; U.S. seeks his extradition from France
  • France issues press statement about arrest of ShinyHunters members
  • Patients Allege Home Delivery Pharmacy Failed to Timely Notify Them of Data Breach
  • Hackers breach Norwegian dam, open valve at full capacity

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions
  • NY Attorney General James Affirms Hospitals Must Provide Access to Emergency Abortion Care
  • How Internet of Things devices affect your privacy – even when they’re not yours
  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.