DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

A nightmare breach involving psychotherapy records just got worse

Posted on October 25, 2020 by Dissent

There’s an update to previous post about a ransom situation in Finland impacting 40,000 psychotherapy patients at Vastaamo. As initially reported by Vastaamo, a psychotherapy practice with multiple offices and locations, they had been hacked and the hacker had acquired records of patients who had registered before the end of November 2018.  Other sources reported that the hacker had demanded approximately half a million dollars not to dump the data, but that was not confirmed by Vastaamo, who states that they started notifying the public and patients as soon as the government authorities gave them permission to do so. Ilto-Sanomat reports the blackmailer contacted them and is demanding 40 btc (450,000 euros).

Now the hacker, who calls themself “ransom_man” has reportedly dumped hundreds of patient files on a dark web site, and is contacting other individual patients with blackmail demands — either pay the attacker(s) 200 € ransom or have their psychotherapy records dumped.

Vastaamo has updated its web site with the latest development, and others are discussing it on social media, where the threat actor’s language fluency in Finnish — or lack thereof — has been discussed, as well as the attacker seeking help writing ransom demands in Finnish. The request for help could have been misdirection, of course.

According to Vastaamo,  the ransom messages are titled, for example, “Answering Office Information” and contain the patient’s personal information. Vastaamo wants patients to know that such messages are not coming from Vastaamo’s Answering Machine.

The types of information the attacker may have acquired include contact information and personal identity number. A google translation of Vastaamo’s FAQ follows:

Based on these, the customer number (customer ID) created for each customer contains information manually entered by the healthcare professional. Discussions are not spelled out, but the entries are narrower professional entries. The dates of visits marked as completed and unrealized, as well as appointment entries and log information on the data processing that took place at any given time, have been entered in the register. Customer information may also include care plans and management goals and statements made to authorities or the customer themselves. See more detail on our website www.vastaamo.fi/tietosuoja the  leaflet where you can find detailed information in our customer and patient register.

Video sessions are not recorded, so the attacker does not possess any videos of patient sessions, but might have acquired notes from sessions created by therapist.

But there is no doubt that this is a serious privacy and data breach. Vastaamo now says that it is not just patients registered before November 2018 who have been impacted, but there is also some indication that patients registered before the end of March 2019 may have also had their data accessed. [Note: YLE.fi seems to be reporting this as two breaches, and maybe my translation is poor, but I had read it as one incident that involved more data than Vastaamo originally recognized. Reading other sites raises more questions:  did the breach occur before the end of November 2018, or was it more recent but just attacked older data? And was there a second breach or attacker or did the first attacker attack again when they realized the value of what they had? There are a lot of questions that need answers.]

This is obviously a developing situation.  Vastaamo has not revealed how the threat actor gained access to their system, or why their system security did not detect the intruder’s presence in the system or exfiltration of what appears to be tremendous amounts of data. Did the attacker disable defenses or were the defenses not in place? Patients will likely have a lot of understandable questions as to how this happened, but the immediate concern, of course, is to try to stop the attacker from dumping more data or otherwise misusing it.

 

 

Category: Breach IncidentsHackHealth DataNon-U.S.Of Note

Post navigation

← FL: Cybersecurity incident causes Indian River County network to shutdown
Press Trust of India services disrupted by LockBit ransomware attack →

1 thought on “A nightmare breach involving psychotherapy records just got worse”

  1. TD says:
    October 27, 2020 at 4:25 am

    This is beyond terrible. Hundreds of lives are at stake.

    One requirement of GDPR, while they were at it, should have been that any entity handling more than a hundred personal acts or dossiers of sensitive data, such as health information or legal/fiscal information, is subject to an external review from an information security company or authority yearly. This review could be paid for by the state. Certainly worth it. In its least severe form, in the case of a company with only a few employees handling just over the limit, it could be done as an honest signed self declaration of security practices.

    Anyway. Anyone can get hacked, but data leaks of this magnitude, in case they can be proven to have been caused by incompetence or violation of good practices, should not lead to merely economic sanctions. The only reasonable measure is sentencing the CEO and board members to jail time for a year or two. The hacker even longer of course, in case they ever find him/her.

    root/root as credentials and open SSH is rumored in this case… I hope it isn’t true, just too much. Sigh.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.