DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AKO ransomware operators put some hurt on pain management doctors

Posted on May 13, 2020 by Dissent

Ransomware operators known as the Maze team have been getting media attention for their influence in implementing what is being called a double extortion scheme: attackers gain access to their victim’s network, exfiltrate data, and then lock up the victim’s system with ransomware. They then demand a fee — which may be hundreds of thousands of dollars or even more — to provide a decryption key. But even if the victim pays that ransom, the attackers still hold copies of the victim’s data which they threaten to dump publicly if the victim doesn’t pay a second fee.  To increase pressure on their victims, Maze Team created a web site where if the victim doesn’t pay them within a few days, Maze names them and provides a public sample of their data for the taking. The sample may be old uninteresting data just to show proof of access, or it may be sensitive corporate or personal information.

In the past few months, a number of other ransomware operators have adopted the Maze naming and dumping data approach, including DoppelPaymer, Nefilim, Ragnar, Sodinokibi (REvil), CLOP, Ako, and Netwalker.

Like other ransomware groups using the Maze model or approach, Ako maintains a site on Tor. At the present time, there are seven entities listed on their site two from the medical sector, four from the business sector, and one k-12 school district. Not all victims are U.S. entities, and the school district in Texas does not have any data dumped, although the attackers posted a note that stolen files are “coming soon”  in case of non-payment.

Perhaps some of the most sensitive data comes from a pain management practice in Massachusetts. North Shore Pain Management  has two offices in Massachusetts. The Ako operators have dumped more than 4 GB of their data that includes employee and patient information.  The patient records are a covered entity’s nightmare because it is all unencrypted protected health information that discloses patients’ names, addresses, telephone numbers, diagnoses, treatment codes, social security numbers, health insurance policy information, billing information, employer information, workers compensation details and much more.  Most of the more than 4,000 files are not spreadsheets or databases but rather are .pdf files or scans of tabled data involving deposits, explanation of benefits statements, bank account information, copies of checks with routing and account numbers, and other correspondence.

The files dumped by the attackers are not  EMR, but do contain a lot of PHI.  Not all patients have the same data types exposed, but to show they mean business, Ako used an unredacted screenshot with PHI on their website’s link to them. DataBreaches.net has redacted it below:

Ako operators posted a screenshot showing part of a daily schedule with patients’ name, appointment type, insurer, phone number, date of birth, and social security number. Redacted by DataBreaches.net.

Not all of the files in the data dump were meaningful (some were image files from Wild Tangent game), but some files were quite large with significant amounts of PHI such as one file which included a number of completed insurance claim forms containing patients’ name, insurance policy number, insurer, SSN, DOB, diagnosis code, treatment code, and charges.  Depending on the type of claim or case, the patient’s employer might also be disclosed with other relevant employee information.  The file also contained Explanation of Benefits statements, copies of checks and other payments records, and information on appeals.

A 134-page file contained completed health insurance claim forms, insurance EOBs, copies of payments, and other billing related information. Redacted by DataBreaches.net

DataBreaches.net reached out to NSPAIN’s Twitter team, but did not receive a reply by publication time.  At this point, then, they have not confirmed or denied any breach to this site, and based on a phone call I received yesterday from a victim of another ransomware operator, I cannot even be sure that NSPAIN knows that their patient and employee data was stolen (if it was, as it appears to have been).

This post will be updated if more information becomes available. This appears to be an incident that will require notification to HHS OCR.


Note: For an introduction to Ako ransomware, see SonicWall’s report in February and a report by AppRiver. Note that the $3,000 ransom mentioned may no longer be valid. One of Ako’s recent victims whose data has been dumped has this note on their listing:

Got only payment for decrypt – 350,000$
Payment for delete stolen files was not received.

Apparently, the attackers were not going to settle for just hundreds of thousands of dollars. They dumped thousands of records from the business including customer screening and due diligence, and other business and customer records. And of course, the implication is that if the firm doesn’t pay the other fee for deleting stolen data, it will be dumped publicly.

Category: Breach IncidentsHealth DataMalware

Post navigation

← Elizabethtown Community Hospital Patients Lack Standing in Data Breach Row
Danger zone! Brit research supercomputer ARCHER’s login nodes exploited in cyber-attack, admins reset passwords and SSH keys →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.