DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Apex Laboratory confirms ransomware attack; only recently discovered data theft

Posted on January 2, 2021 by Dissent

DataBreaches.net recently reported that Apex Laboratory Inc. had apparently been attacked by DoppelPaymer ransomware threat actors. Apex was added to their  leak site on December 15.

As proof of claims, the threat actors uploaded approximately 10,000 files containing protected health information of patients (PHI) and personally identifiable information of employees (PII). The 10,000 estimate is not an estimate of unique patients, as many patients had more than one report on them in the files. But some files also contained PHI on hundreds of unique patients, as some of the  files were from nursing home or rehabilitation facilities on Long Island in 2018. It appears that Apex stored census and rosters from these facilities. Whether the attackers also obtained any current rosters is unknown, but the data dump contained older data that included name, date of birth, Social Security number, Medicare, Medicaid, or insurance information, date of admission, date of discharge, and other details. Yet other patient-related files were test results/lab results for named patients from early 2020.  Those files included patient name, date of birth, phone number, physician’s name, and laboratory findings/results. Employee data in other files included some payroll information as well as  other types of employee information, such as a rental application with an employee’s full SSN and a photocopy of a driver’s license belonging to an Apex administrator.

DataBreaches.net reached out to Apex on December 15 when the dump was first spotted, but Apex did not reply then, nor to subsequent attempts to get any response from them. Their network administrator, contacted via LinkedIn, did not reply either.


This was not the first experience DataBreaches.net has had with Apex Laboratory ignoring inquiries from this site. Apex had a significant insider-wrongdoing breach back in 2012 that they only learned about when law enforcement contacted them. They ignored all of this site’s inquiries about that incident, too.


Of note, although Apex did not respond to this site’s inquiries,  their listing was removed from the leak site shortly after I contacted them to ask about it. The removal of a listing can mean that a victim suddenly decided to pay the ransom demand, or it could mean that the threat actors were just busy updating the data dump. In this case, the listing didn’t reappear, suggesting that ransom had been paid or was being negotiated.

Because Apex did not respond to inquiries and there was no notice on their site, on December 29, DataBreaches.net contacted two of Apex’s clients whose patient rosters from 2018 had appeared on the leak site. Neither one had been contacted by Apex by that point, and both were concerned to learn of the breach.

Two days later, on December 31, Apex posted a notice on their web site. Was the timing coincidental or had upset clients called them on the 29th? DataBreaches.net wouldn’t be surprised if they had. Nor would this site be surprised to learn that Apex had no knowledge of any data exfiltration or dump until they received this site’s inquiry on December 15.

Apex Knew, But Didn’t Know

According to the notice on their web site, Apex first discovered the ransomware attack on July 25, 2020.  Then why did it take five months from that discovery until they posted a notice on their site? The reason for the delay appears to be that their first forensic evaluation did not find any evidence of unauthorized access or exfiltration of patient information. Apex claims they first learned on December 15 that the attack had been worse than they knew:

However, on December 15, 2020, Apex learned that the hackers posted information on their blog about the attack and listed data taken that contained personal and health information for some patients.

Apex’s notice also provides some support for this site’s hypothesis that they paid ransom (emphasis added below):

Upon learning of the data that was taken, Apex, along with the assistance of forensic specialists, conducted a review of the files to determine what information was impacted and ensured that the data was removed from the hacker’s blog.  

Of course, removing a sample of data from a blog is no assurance that all of the data is no longer in threat actors’ hands or hasn’t already been shared with others.

Apex’s notice also states that they are currently preparing letters to send out to those for whom they have addresses.  At some point, I expect we will see this incident on HHS’s public breach tool and then we will find out how many patients Apex calculates were impacted.

Category: Breach IncidentsCommentaries and AnalysesHealth DataMalwareOf Note

Post navigation

← Cyberattack on emergency ambulance service in Wrocław
Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.