DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ransomware attacks of two more medical entities disclosed: one in U.S., one in Canada

Posted on March 4, 2021 by Dissent

It seems that every day, we learn of more ransomware attacks on healthcare entities.  Here are two more.

Arizona:  Cochise Eye and Laser

The most recent update to HHS’s public breach tool included an incident reported by RF Eye, P.C., dba Cochise Eye and Laser.

On February 17, the Arizona entity posted a notice on their web site that disclosed that it had experienced a ransomware attack on January 13.  The type of ransomware was not named but their patient scheduling and billing software were encrypted by the attack.

“There is no evidence that the data was taken, only that it was encrypted, and in some cases deleted, making it impossible for us to access anything in our scheduling system,” the notice states.

As of February 17, the practice was still operating with paper charts.

Everyone seen after January 1st, 2020 will be called to reschedule follow up appointments, as we have no way of knowing when they were originally scheduled.

Names, dates of birth, addresses, phone numbers, and in some cases social security numbers were stored in the practice’s billing software.

Patients have been given some advice on protecting themselves, but do not appear to have been offered any free credit monitoring or identity theft restorations services.

According to their notification to HHS, 100,000 patients have been impacted by this incident.

There is no mention in their notification as to any ransom or extortion demand, and this incident has not shown up on any of the approximately 20 dedicated leak sites used by threat actors.  According to the practice, there was no evidence of any data exfiltration, but we’ve all seen cases where entities did not detect that data had, in fact, been exfiltrated, so that assurance cannot be relied upon with high confidence at this point.  Time will tell.

Manitoba, Canada: Altona Clinic

Pembina Valley reports that  Altona Clinic was the victim of a ransomware attack last Friday (February 26).

At this time, clinic official cannot confirm whether patient information has been compromised, but two separate IT specialists have advised, based on a number of factors, this is unlikely, and the purpose of the attack was most likely to lock the information rather than to access the patient records.

What were those factors? Given how common the double extortion model has become, why would this attack not also exfiltrate data in the hopes of extorting the clinic to pay to keep patient data off the internet?

Clinic officials report information on visits that occurred on Thursday, February 25th was lost as a result of the attack, and they are asking patients who had visits scheduled for that day to call the clinic and book a return appointment.

Now that is another kind of harm– having to come back because your doctor’s notes on your visit were destroyed or locked up.

There is nothing on the clinic’s web site as of the time of this publication. You can read Pembina Valley’s coverage here.

 

Category: Health DataMalware

Post navigation

← UK: 15 schools in Nottinghamshire crippled by cyber attack
Report: Russian hackers exploit Lithuanian infrastructure →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.