DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VPN Solutions LLC suffered a ransomware attack two months ago. Some clients still can’t access patient data hosted on the service.

Posted on December 29, 2021 by Dissent

It appears that a ransomware incident involving VPN Solutions LLC may have  affected a number of covered entities, although so far, DataBreaches.net has only identified two confirmed cases:

Surgery Group SC

On December 17, Surgery Group SC in Illinois notified HHS about an incident impacting 500 patients. DataBreaches.net interprets that 500 number as a marker in situations in which the entity may not yet have figured out how many have actually been affected.  That does seem to be the case in this incident.

According to a notice on Surgery Group SC’s website, they were notified of a data security incident experienced by VPN Solutions LLC (“VPN”). Surgery Group’s vendor, Physicians Healthcare Solutions, LLC (PHS) uses VPN to host its databases — databases that contain the personal and protected health information of patients.

Surgery Group was notified of the incident on October 31. Surgery Group’s notice does not indicate when the attack occurred, but they note that VPN hosts and maintains the practice management and EHR platform that they use. Those records include patients’ clinical, demographic, and financial and claims information such as amounts of charges and payment history.

VPN Solutions’ home page says “Our unique approach ensures secure and HIPAA compliant access to your health records 24.7.365.”

Access 24.7.365 does not appear to be the current situation, because Surgery Group reports:

The data security incident experienced by VPN resulted in the unavailability of the personal information of Surgery Group’s patients. […]  Despite numerous, repeated requests from PHS and Surgery Group, VPN has not restored the VPN Platform and has been unable to provide Surgery Group with a date by when the VPN Platform will be restored and fully functional. VPN has indicated that it currently does not believe that any of Surgery Group’s patient information has been viewed or acquired by an unauthorized party.

Due to the unavailability of the VPN Platform that contains patient contact information, Surgery Group is unable to notify its patients of the incident by mail. Patients with questions may call Surgery Group at (630) 208-7874 between 9:00 a.m. and 5:00 p.m. CST, Monday, Tuesday, and Thursday, and between 9:00 a.m. and 4:00 p.m. CST, Wednesday and Friday.

Apple Blossom Family Practice

Apple Blossom Family Practice in Virginia issued an identical notice on their website. Their report to HHS on December 16 also seemed to use a 500 marker report.

There does not seem to be any notice on the vendor’s website at this time, and DataBreaches.net was unable to find any dedicated leak site that listed an attack on VPN Solutions.  DataBreaches.net reached out to VPN Solutions via email to ask for more details, but no reply was immediately forthcoming. This post will be updated if or when more information becomes available.

 

Related posts:

  • TeamGhostShell posts “master list” of 548 leaks (so far)
  • HHS Office for Civil Rights Settles 9th Ransomware Investigation with Virtual Private Network Solutions
  • Connexin Software notifies parents of 2.2 million pediatric patients of hack
  • Another plastic surgery practice appears to have been hit — this time by Hunters International (5)
Category: Health DataMalwareOf NoteSubcontractorU.S.

Post navigation

← Virtual Care Provider Sues Rivals, Alleging Data Theft, Patent Violation
Pk: Hackers steal, put up for sale Khyber Pakhtunkhwa police data →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.