DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TX: Threat actors dump patient files from Nocona General Hospital

Posted on February 10, 2021 by Dissent

On February 3,  Conti threat actors added Nocona General Hospital in Texas to their leak site, posting 20 files as proof that they had accessed the hospital’s files.  Many of the files contained patient records from 2018, and appeared to be pdf scans or doc files. They did not appear to be records from any current EMR system.  DataBreaches.net sent an inquiry to Conti asking them whether they would state whether they had hit some older server, but  received no reply.

Today, the threat actors dumped even more files, bringing the total number of files to more than 1,760.

As before, most of the files were not new patient records. In fact, some appeared to be old files, circa 2010.  The files did contain protected health information (PHI), including patient name, address, date of birth, Social Security number, diagnoses, and admission records showing why the patient sought treatment in the Emergency Department. There were also records containing health insurance information and requests for prior authorization, etc.

Today, in response to inquiries sent to the hospital over the past days, DataBreaches.net received a call from Brian Jackson of Jackson & Carter, external counsel for the hospital. He did not have a lot of information to share at this point, but stated that they believed that the threat actors had not been able to access the EMR system, and that what they had accessed appeared to be an older server that held files relating to the transfer of patients.  He reiterated what he had told NBC News — that they had not seen any ransom demand — but acknowledged that there might have been one and they just didn’t read it.  They received no phone call demands, he stated.

After looking through more of the data dump, they do not appear to me to be from a folder that would relate to the transfer of patients to other hospitals or facilities, and it’s not clear why there would be files from 2010 in with files from 2018 and even early 2020.  At some point, forensics will probably be able to clarify exactly where these files came from on their system.

Was Nocona even actually attacked with ransomware? When Jackson was asked whether the files were locked, he responded that they had been, but then it turned out he meant that the files had been secured before the attack. When the question was clarified for him, he responded that he believes that they were attacked with ransomware, but it clearly was not an answer said with any confidence.  He also stated, in answer to another question, that the hospital’s consultants believe that they have kicked the attackers out of their network.

At this point, DataBreaches.net does not know if Conti has more files from Nocona that they have not yet dumped, or if today’s dump was the last of what they have. It’s also not clear whether any of Nocona’s files were encrypted by the attackers, and given Jackson’s confusion about some terms, I wonder if it’s a file transfer system and not a folder about transferred patients that he meant to describe. In any event, this post will be updated or a new post created as more information becomes available.

 

 

 

Related posts:

  • Forbes Breach Email Statistics
  • Update: Nocona General Hospital “recently” learned of a breach we reported in early February
  • TeamGhostShell posts “master list” of 548 leaks (so far)
Category: Breach IncidentsHealth DataMalware

Post navigation

← University of Colorado responds to Accellion breach
NY: Syracuse University email hack compromises personal info of 9,800 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.