DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Forefront Dermatology notifying patients and employees about ransomware incident

Posted on July 9, 2021 by Dissent

Update November 17, 2022:  Forefront has reportedly settled a class action lawsuit for $3.75 million.

Update: July 12, 2021: Post-publication, DataBreaches.net learned that external counsel for Forefront Management, LLC and Forefront Dermatology, S.C. reported the incident to the Maine Attorney General’s Office as impacting 4,431 patients.  On July 14, however, this incident was added to HHS’s public breach tool as impacting 2,413,553 patients. Original post follows….


Wisconsin- headquartered Forefront Dermatology issued a press release yesterday afternoon about a ransomware attack that began in May.

Forefront has multiple locations
Forefront Dermatology advertises that it has more than 175 locations and more than 195 board-certified dermatologists.

In their press release, Forefront reports that they had identified an intrusion into their system on June 4, and promptly took their system offline to prevent further spread or damage.

Subsequent investigation revealed that there had been unauthorized access to some of its patient files and employee files between the dates of May 28, 2021 and June 4, 2021. The patient files that were accessed may have included  patient names, addresses, dates of birth, patient account numbers, health insurance plan member ID numbers, medical record numbers, dates of service, accession numbers, provider names, and/or medical and clinical treatment information.

“There is no evidence that patient Social Security numbers, driver’s license numbers, or financial account / payment card information were involved in this incident,” they write.

Because Forefront’s investigation could not conclusively determine all the patients and employees whose files may have been involved, they are also notifying patients whose information may have been involved.

Forefront has established a dedicated, toll-free call center to help answer patient questions. Additional information is available at https://forefrontdermatology.com/incidentnotice/ or by calling Forefront Dermatology’s dedicated, toll-free incident response line at 855-899-4166, Monday through Friday, between 8:00am to 8:00pm, Central Time.

Forefront’s release does not mention any specific ransom demand or whether they negotiated at all with the threat actors.  As of today, however, some of Forefront Dermatology’s files remain  freely available on the Cuba Ransomware leak site.

 

Cuba Ransomware

Although not revealed in their disclosure, the attack was the work of threat actors calling themselves “Cuba Ransomware” (some details on Cuba ransomware can be found here).The threat actors dumped some of Forefront’s data at the end of June.

Cuba Ransomware Victim
The threat actors did not indicate how much data they had exfiltrated.

The June data dump did not include a tremendous amount of patient records, although it did include some patient information. The dump was only about 47 MB, but what it did include was more than 130 files with information on the entity’s system and network, with security and backup details, and all their logins to health insurance portals, etc.

Hopefully, Forefront has notified all of the insurers whose portals they use that their login credentials were compromised.  A passwords file in the dump listed more than 100 sets of logins. Sadly, there was what appeared to be a lot of weak password and extensive password reuse. More than 40 passwords had “Forefront” in combination with some digit(s) and an exclamation point. Another 10 had some variant of DAWderm1!

Logins
Passwords and email addresses with security quesions used for one insurer’s portal revealed significant re-use.

DataBreaches.net emailed their IT person to ask them some questions. In that July 4 email, I noted that I would be reporting on this breach and that I hope they had changed all their passwords.  I got no reply. That was actually the third email I had sent to Forefront seeking information or a statement. There was no reply to any of them.

DataBreaches.net has been trying — unsuccessfully so far — to reach the threat actors to ask them if they would reveal whether they got patient data and employee data, and if so, how much.

Bad Timing?

There is never a good time for a breach, but this may be particularly bad timing. In researching this incident, DataBreaches.net discovered articles on PE Hub dated June 30 and July 1 about how OMERS was reportedly preparing Forefront Dermatology for sale.

OMERS did not respond to three email inquiries about the breach or its potential impact on any sale.

Will the breach deter any buyers or will it result in the seller reducing the price of sale? DataBreaches.net has no idea, but if the entity doesn’t know for sure how much PII and PHI the attacker(s) actually acquired, then what impact might that have?


 


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: Breach IncidentsHealth DataMalware

Post navigation

← Kroger reaches $5M settlement with Accellion breach victims, as Supreme Court defines ‘actual harm’
Iran’s Rail Service Allegedly Hacked With Fake Delay Messages Urging Users To Call Khamenei →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.