DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Las Vegas Cancer Center hit by ransomware over Labor Day weekend; 3,000 patients notified

Posted on November 1, 2021 by Dissent

KTNV reports that the Las Vegas Cancer Center was the victim of a ransomware attack over the Labor Day Weekend. The attack was discovered on September 7, when the center re-opened.  The attackers reportedly accessed encrypted data.  Patient data is in proprietary format and the center believes it would not be usable to the threat actors. The types of information that the threat actor(s) could access included patient names, addresses, dates of birth, social security numbers, medical records and insurance information.

Read more on KTNV.

In related coverage, the Las Vegas Review-Journal reports that about 3,000 were affected.

So far, there has been no mention of who the threat actors might be or how much ransom may have been demanded.

Updated Nov. 9:  Pysa threat actors have claimed responsibility for this attack but have not dumped any data as of today. Thanks to @DF_CyberGuy for alerting us to this.

Category: Health DataMalwareU.S.

Post navigation

← If you need to notify abuse survivors of a data breach, is it acceptable to take more than one year to notify them?
Possible cyberattack hits ‘brain’ of N.L. health-care system, delaying thousands of appointments Social Sharing →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.