DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Brandywine Counseling and Community Services notifies patients of ransomware incident

Posted on April 20, 2020 by Dissent

Brandywine Counseling and Community Services, Inc. disclosed a breach. Note that this is not the Brandywine Urology breach recently disclosed but a different entity and a different breach.  DataBreaches.net has reached out to Brandywine Counseling to ask for clarification on certain details, but has not received any response by publication time.  This incident is not yet up on HHS’s public breach tool, so we also do not yet know how many patients have been notified. This post will be updated when more details are obtained, but for now, here is their notice:

Brandywine Counseling and Community Services, Inc. is committed to protecting the confidentiality and security of our clients’ information. Regrettably, this notice concerns a security incident that may have involved some of that information.

On February 10, 2020, we discovered that some of our servers were infected with ransomware. We immediately took steps to secure our network, contacted law enforcement, began an investigation, and an experienced computer forensic firm was hired to assist. During the investigation, we determined that during the incident, a limited amount of personal information was acquired from our systems, which included some clients’ names, addresses, dates of birth, and/or limited clinical information, such as provider name(s), diagnosis, prescription(s), and/or treatment information. In some instances, clients’ health insurance information, Social Security numbers and/or driver’s license numbers were also included.

This incident did not affect all clients, but only those clients whose information was included in the limited information acquired during the ransomware incident.

As a precaution, we are mailing letters to clients whose information was acquired during the ransomware incident. We also have established a dedicated, toll-free call center to answer clients’ questions. If you have questions, please call 1-888-921-0536, Monday through Friday, from 9:00 a.m. and 6:30 p.m. eastern time. For those clients whose Social Security numbers and/or driver’s license numbers were involved, we are offering complimentary credit monitoring and identity protection services. We also recommend that affected clients review any statements they receive from their health insurers or healthcare providers. If clients see charges for services not received, they should contact the insurer or provider immediately.

We regret any concern or inconvenience this incident may cause. We remain committed to protecting the confidentiality and security of our clients’ information. To help prevent something like this from happening in the future, we continue to review our systems and implement additional measures to enhance and strengthen our security processes.

 

Category: Health DataMalwareU.S.

Post navigation

← PrimoHoagies Notifies Customers of Data Security Incident
CISI payment breach leaves members vulnerable to fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.