DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

United Health Centers of San Joaquin Valley remains publicly silent after ransomware attack

Posted on September 25, 2021 by Dissent

Threat actors known as Vice Society have disclosed another attack on the healthcare sector. This time, the victim is United Health Centers of the San Joaquin Valley in California.

Lawrence Abrams of BleepingComputer reports:

On August 31st, BleepingComputer was told by a source in the cybersecurity industry that United Health Centers was reeling from a Vice Society ransomware attack that caused them to shut down their entire network.

Neither BleepingComputer nor DataBreaches.net have been able to get a response from UHC to multiple inquiries about the incident.  As one consequence, DataBreaches.net has filed a public records request with the California Department of Public Health because under California law, UHC was required to notify the state within 15 days of detection of a breach.

As Abrams reports, Vice has dumped data. The dump appears to be a somewhat disorganized assortment of files. Some of them appear to be routine functions or business, but many that DataBreaches.net reviewed involved protected health information (PHI):

This site saw numerous files with insurance billing information on named patients.  The files included patients’ name, date of birth, date of service, insurance policy information, and diagnostic code and/or treatment/service code.  While the latter two are generally provided as numbers, those numbers can be easily looked up online to determine what a patient was being treated for or what treatment they were given. Because DataBreaches.net has previously provided images of such forms,  there is no point in including yet another redacted form here.

But DataBreaches.net also found a folder with what appeared to be old collections records — patients who were in arrears on their account and whose bills were sent out for collection in 2012.  For each patient, there were often multiple pages of records.  As but one example, the following are just two of multiple pages in a batch file on a patient whose information was sent for collection in 2012:

Patient account referred for collection
Image: Redacted by DataBreaches.net
Second page of colletion info
Image: Redacted by DataBreaches.net

Note that for these two  pages, there was a grand total of approximately $300 sent for collection in 2012. Other pages for this patient in the file revealed what tests and procedures the patient had and was billed for.  So the protected health information now dumped on the dark web for this patient includes their name, address, date of birth, Social Security number, and additional details related to service dates and services and some clinical findings. And that’s just one of many patients whose accounts were sent to collection.

How much will it cost UHC now for their failure to adequately secure old collection accounts? 

We also saw  a patient roster for part of November, 2020.  The roster included patient full name, date of birth, patient ID, postal address, and other details. There were more than 5,000 entries in the roster (some patients had more than one entry):

Patient Roster for part of November, 2020
Image: Redacted by DataBreaches.net

There were also files such as prescription refill forms that contained patient information and the name and dosage of prescribed medication.

Rx Refill Request
Image: Redacted by DataBreaches.net

The preceding is not a complete list of all types of PHI that were exposed in the data dump. DataBreaches.net is providing samples because UHC has not been forthcoming and has not issued any public notice that we can find to warn patients about what kinds of information on them is now in the wild.  Of note, DataBreaches.net has not noted much data from current or recent patients, although a review of the dump has not yet been completed.

Vice Society generally claims that they dump all of the data they have exfiltrated.  If that is the case here, then it appears that they did not get UHC’s EMR system — at least not in terms of what they exfiltrated.

DataBreaches.net reached out to Vice Society to see what they had to say about the incident. One of the questions put to them concerned whether the attack crippled any clinic functioning or services. Their spokesperson responded:

Attack was good but they were lucky. We lost access to some services because something gone wrong )

We can say that they were just lucky =)

Well, UHC may have been lucky in some respects from Vice Society’s perspective, but if Abrams’ source is accurate, UHC was significantly impacted by the attack, and we have already seen that a lot of personal and protected health information is now publicly available. Whether CDPH or HHS will take a deeper dive into why UHC had so much old data unencrypted or not offline remains to be seen. Under HIPAA, entities are required to have risk assessments. Were old data included in UHC’s risk assessment.  We may, or may not, find out.

But importantly for now:  more than three weeks after when the attack may have occurred and been detected, UHC does not appear to have issued any public warnings to patients that their personal and protected health information has not only been stolen, but made freely and publicly available on the dark web. HIPAA gives entities no more than 60 days from discovery to make notifications to the regulator and patients, but California law only gives them 15 days to notify patients. As a summary of the law by SheppardMullin explains:

Patient Notification. Initially, Section 1280.15 did not specify the content of patient notifications in the event of a breach and only specified that such notice must be provided to affected patients within fifteen (15) days of detection of a breach. The Regulations now provide precise criteria which were largely modeled after HIPAA, and must include a brief description of the breach, a description of the types of information that were involved in the breach, the steps affected individuals should take to protect themselves from potential harm, a brief description of what the covered entity is doing to investigate the breach, mitigate the harm, and prevent further breaches, as well as contact information for the covered entity (or business associate, as applicable).

Could UHC have they mailed everyone already? It’s possible but seems unlikely. This post will be updated when we obtain more information.

Category: Breach IncidentsCommentaries and AnalysesHealth DataHIPAAMalwareState/LocalU.S.

Post navigation

← Major European call center provider goes down in ransomware attack; not negotiating with Conti
Council on Aging of Southwestern Ohio notifies clients after employee email account compromsed →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.