DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Episcopal Retirement Services suffered two ransomware attacks in a one-month period

Posted on November 19, 2021 by Dissent

It’s bad enough experiencing one ransomware attack. Imagine experiencing two, because that’s what Episcopal Retirement Services (ERS) in Ohio has been dealing with.

On or about September 24, ERS discovered that i had been the victim of what it describes as a cyberattack that impacted its systems and servers.  Then on October 22, they experienced what they describe as another incident that was determined to be a ransomware incident.

At this time, ERS also learned that the September incident was a ransomware attack.

ERS’s investigation is ongoing, and their external counsel reports that ERS  has not determined how its systems were accessed.

The notification by Whiteford, Taylor, & Preston LLP to the Maine Attorney General’s office does not indicate what type or types of ransomware were involved, or what any ransom demands might have been.  Nor has ERS shown up on any dedicated leak site where threat actors might disclose their attacks.

The incident(s) resulted in the exposure and potential acquisition of protected health information (PHI). While the types of PHI vary by individual, it could include first and last names, addresses, gender, social security numbers, phone numbers, and dates of birth. The information potentially impacted also may have included medical diagnoses, health care provider name, insurance numbers, and Medicare number.

ERS plans to notify 4,133 patients, but since the investigation is ongoing, the number may change.

Additional information is included in the notice on their website.

Updated Nov. 23:  @DF_CyberGuy on Twitter helpfully pointed out to me that on Oct. 23, one day after the second ransomware attack, Groove threat actor(s) posted ERS on their site.

Listing on Groove
Image: @DF_Cyberguy

Whether Groove was responsible for the attack or was just listing data for other(s) is unclear, as Groove recently claimed that their whole purpose in creating their site was just to embarrass the media.  Most in the media did not believe the claim and believe that Groove just failed so miserably as a threat actor that they made up some silly explanation. Because the site is gone now, however, we have no follow up on why ERS wound up on that leak site or who else might have the data.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
Category: Commentaries and AnalysesHealth DataMalwareU.S.

Post navigation

← US regulators order banks to report cyberattacks within 36 hours
NJ: Spotswood Public Schools notifying 424 employees impacted by a ransomware incident →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.