DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Episcopal Retirement Services suffered two ransomware attacks in a one-month period

Posted on November 19, 2021 by Dissent

It’s bad enough experiencing one ransomware attack. Imagine experiencing two, because that’s what Episcopal Retirement Services (ERS) in Ohio has been dealing with.

On or about September 24, ERS discovered that i had been the victim of what it describes as a cyberattack that impacted its systems and servers.  Then on October 22, they experienced what they describe as another incident that was determined to be a ransomware incident.

At this time, ERS also learned that the September incident was a ransomware attack.

ERS’s investigation is ongoing, and their external counsel reports that ERS  has not determined how its systems were accessed.

The notification by Whiteford, Taylor, & Preston LLP to the Maine Attorney General’s office does not indicate what type or types of ransomware were involved, or what any ransom demands might have been.  Nor has ERS shown up on any dedicated leak site where threat actors might disclose their attacks.

The incident(s) resulted in the exposure and potential acquisition of protected health information (PHI). While the types of PHI vary by individual, it could include first and last names, addresses, gender, social security numbers, phone numbers, and dates of birth. The information potentially impacted also may have included medical diagnoses, health care provider name, insurance numbers, and Medicare number.

ERS plans to notify 4,133 patients, but since the investigation is ongoing, the number may change.

Additional information is included in the notice on their website.

Updated Nov. 23:  @DF_CyberGuy on Twitter helpfully pointed out to me that on Oct. 23, one day after the second ransomware attack, Groove threat actor(s) posted ERS on their site.

Listing on Groove
Image: @DF_Cyberguy

Whether Groove was responsible for the attack or was just listing data for other(s) is unclear, as Groove recently claimed that their whole purpose in creating their site was just to embarrass the media.  Most in the media did not believe the claim and believe that Groove just failed so miserably as a threat actor that they made up some silly explanation. Because the site is gone now, however, we have no follow up on why ERS wound up on that leak site or who else might have the data.


Related:

  • Little Rock Psychologist Indicted by Federal Grand Jury for Defrauding Medicare and Arkansas Blue Cross Blue Shield
  • Software companies must be held liable for British economic security, say MPs
  • UK privacy regulator has seen ‘collapse in enforcement activity,’ rights coalition says
  • Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub
  • SEC Voluntarily Dismisses SolarWinds Litigation
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
Category: Commentaries and AnalysesHealth DataMalwareU.S.

Post navigation

← US regulators order banks to report cyberattacks within 36 hours
NJ: Spotswood Public Schools notifying 424 employees impacted by a ransomware incident →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ANNOUNCE: A new resource to help small and mid-sized HIPAA-regulated entities
  • Askul says 740,000 sets of data breached in cyberattack
  • Google and Apple roll out emergency security updates after zero-day attacks
  • Doxers Posing as Cops Are Tricking Big Tech Firms Into Sharing People’s Private Data
  • Virginia Urology Silent on Possible Data Breach as Purported Patient Data Begins to Leak
  • Village of Golf Manor considering paying ransom amid cyberattack (1)
  • Teen who allegedly stole millions of personal data records arrested in Spain
  • Akira ransomware: FBI tallies 250 million in payouts
  • IE: HSE confirms second ransomware attack but ‘no evidence’ patient data was stolen
  • Examining impact of federal relief program after major healthcare cyberattack — Research Brief

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Slovenian officials weaponize data-privacy laws against investigative journalism
  • End-of-Year 2025 State and Federal Developments in Minors’ Privacy
  • Tool allows stealthy tracking of Signal and WhatsApp users through delivery receipts
  • Oh Great, Smart Glasses That Record Everything You Say
  • CBP Agents Held This U.S. Citizen for Hours Until He Agreed To Let Them Search His Electronic Devices

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.