DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MI: Mendelson Kornblum Orthopedic and Spine Specialists notifies 28,658 patients of breach

Posted on March 20, 2021 by Dissent

Mendelson Kornblum Orthopedic and Spine Specialists in Michigan recently notified 28,658 patients of a data security incident.  The incident was reported to HHS on March 5 as a Hacking/IT incident. The practice writes, in part:

On January 5, 2021, the Practice became aware that certain limited health information residing on one of its servers was and had been for an unknown period of time vulnerable to viewing by unauthorized third parties. The potentially viewable information included patient name, medical record number, date of birth, sex, and certain information regarding medical images, including the date and time the image was taken, the image number, and the name of the body part that was imaged. The potentially viewable information did NOT include any medical images themselves, other diagnosis or treatment information, health insurance information, Social Security numbers, credit or debit card numbers, or financial account information.

Upon becoming aware of the incident, the Practice immediately launched an investigation and took steps to address the incident and help mitigate any impact on its patients. The Practice identified and closed the vulnerability on the applicable server and reviewed and enhanced its existing security procedures to try to prevent similar incidents in the future. In addition, the Practice has notified the U.S. Department of Health and Human Services Office for Civil Rights of this incident.

So does that sound like something was misconfigured or there was an unpatched vulnerability?  HOW did they find out on January 5? Did any researcher alert them?  And did their investigation actually determine if there was any access to the data at all?

They note:

Based on the findings of its investigation, the Practice has no evidence of any misuse of any patient health information. However, the Practice has advised potentially affected patients of the incident and to remain vigilant by regularly reviewing their account statements and credit reports and to immediately report to their financial institutions any suspicious activity involving one of their accounts.

Okay, but what, exactly happened and how?

You can read their full notice on their web site. DataBreaches.net sent an email inquiry to them yesterday but has received no reply as yet.


Related:

  • Little Rock Psychologist Indicted by Federal Grand Jury for Defrauding Medicare and Arkansas Blue Cross Blue Shield
  • SEC Voluntarily Dismisses SolarWinds Litigation
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident' impacting city's IT systems
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • Large medical lab in South Africa suffers multiple data breaches
Category: Breach IncidentsHealth DataU.S.

Post navigation

← UK: Details of ‘vulnerable kids’ uploaded to Birmingham City Council website in ‘serious’ data breach
Ca: Nunavut schools confirm school information system vendor suffered ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief
  • Justice Department Announces Actions to Combat Two Russian State-Sponsored Hacking Groups
  • Should entities be required to disclose the name of a vendor if the breach was at the vendor’s?
  • The Hidden Risks of Information Disclosure: A Costly Lesson from Cornwall
  • Defense Bill Would Require New Cyber Requirements for Some DoD Telecom Contracts
  • Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition (1)
  • US Posts $10 Million Bounty for Iranian Hackers
  • South Korea police raid e-commerce giant Coupang over data leak; govt schedules hearing

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC Denies Petition from SpyFone App CEO to Vacate 2021 Order
  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.