DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ransomware attacks of two more medical entities disclosed: one in U.S., one in Canada

Posted on March 4, 2021 by Dissent

It seems that every day, we learn of more ransomware attacks on healthcare entities.  Here are two more.

Arizona:  Cochise Eye and Laser

The most recent update to HHS’s public breach tool included an incident reported by RF Eye, P.C., dba Cochise Eye and Laser.

On February 17, the Arizona entity posted a notice on their web site that disclosed that it had experienced a ransomware attack on January 13.  The type of ransomware was not named but their patient scheduling and billing software were encrypted by the attack.

“There is no evidence that the data was taken, only that it was encrypted, and in some cases deleted, making it impossible for us to access anything in our scheduling system,” the notice states.

As of February 17, the practice was still operating with paper charts.

Everyone seen after January 1st, 2020 will be called to reschedule follow up appointments, as we have no way of knowing when they were originally scheduled.

Names, dates of birth, addresses, phone numbers, and in some cases social security numbers were stored in the practice’s billing software.

Patients have been given some advice on protecting themselves, but do not appear to have been offered any free credit monitoring or identity theft restorations services.

According to their notification to HHS, 100,000 patients have been impacted by this incident.

There is no mention in their notification as to any ransom or extortion demand, and this incident has not shown up on any of the approximately 20 dedicated leak sites used by threat actors.  According to the practice, there was no evidence of any data exfiltration, but we’ve all seen cases where entities did not detect that data had, in fact, been exfiltrated, so that assurance cannot be relied upon with high confidence at this point.  Time will tell.

Manitoba, Canada: Altona Clinic

Pembina Valley reports that  Altona Clinic was the victim of a ransomware attack last Friday (February 26).

At this time, clinic official cannot confirm whether patient information has been compromised, but two separate IT specialists have advised, based on a number of factors, this is unlikely, and the purpose of the attack was most likely to lock the information rather than to access the patient records.

What were those factors? Given how common the double extortion model has become, why would this attack not also exfiltrate data in the hopes of extorting the clinic to pay to keep patient data off the internet?

Clinic officials report information on visits that occurred on Thursday, February 25th was lost as a result of the attack, and they are asking patients who had visits scheduled for that day to call the clinic and book a return appointment.

Now that is another kind of harm– having to come back because your doctor’s notes on your visit were destroyed or locked up.

There is nothing on the clinic’s web site as of the time of this publication. You can read Pembina Valley’s coverage here.

 

Related posts:

  • BUSTED? A blackhat’s revenge exposes a 2-year old patient data hack that Holland Eye Surgery & Laser Center failed to disclose
  • Mass. Eye and Ear Alerts Patients to Laptop Theft and Data Breach
  • Mass. Eye and Ear Alerts Patients to Laptop Theft and Data Breach
  • The Ransomware Superhero of Normal, Illinois
Category: Health DataMalware

Post navigation

← UK: 15 schools in Nottinghamshire crippled by cyber attack
Report: Russian hackers exploit Lithuanian infrastructure →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.