DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Brandywine Counseling and Community Services notifies patients of ransomware incident

Posted on April 20, 2020 by Dissent

Brandywine Counseling and Community Services, Inc. disclosed a breach. Note that this is not the Brandywine Urology breach recently disclosed but a different entity and a different breach.  DataBreaches.net has reached out to Brandywine Counseling to ask for clarification on certain details, but has not received any response by publication time.  This incident is not yet up on HHS’s public breach tool, so we also do not yet know how many patients have been notified. This post will be updated when more details are obtained, but for now, here is their notice:

Brandywine Counseling and Community Services, Inc. is committed to protecting the confidentiality and security of our clients’ information. Regrettably, this notice concerns a security incident that may have involved some of that information.

On February 10, 2020, we discovered that some of our servers were infected with ransomware. We immediately took steps to secure our network, contacted law enforcement, began an investigation, and an experienced computer forensic firm was hired to assist. During the investigation, we determined that during the incident, a limited amount of personal information was acquired from our systems, which included some clients’ names, addresses, dates of birth, and/or limited clinical information, such as provider name(s), diagnosis, prescription(s), and/or treatment information. In some instances, clients’ health insurance information, Social Security numbers and/or driver’s license numbers were also included.

This incident did not affect all clients, but only those clients whose information was included in the limited information acquired during the ransomware incident.

As a precaution, we are mailing letters to clients whose information was acquired during the ransomware incident. We also have established a dedicated, toll-free call center to answer clients’ questions. If you have questions, please call 1-888-921-0536, Monday through Friday, from 9:00 a.m. and 6:30 p.m. eastern time. For those clients whose Social Security numbers and/or driver’s license numbers were involved, we are offering complimentary credit monitoring and identity protection services. We also recommend that affected clients review any statements they receive from their health insurers or healthcare providers. If clients see charges for services not received, they should contact the insurer or provider immediately.

We regret any concern or inconvenience this incident may cause. We remain committed to protecting the confidentiality and security of our clients’ information. To help prevent something like this from happening in the future, we continue to review our systems and implement additional measures to enhance and strengthen our security processes.

 

No related posts.

Category: Health DataMalwareU.S.

Post navigation

← PrimoHoagies Notifies Customers of Data Security Incident
CISI payment breach leaves members vulnerable to fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.