DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VPN Solutions LLC suffered a ransomware attack two months ago. Some clients still can’t access patient data hosted on the service.

Posted on December 29, 2021 by Dissent

It appears that a ransomware incident involving VPN Solutions LLC may have  affected a number of covered entities, although so far, DataBreaches.net has only identified two confirmed cases:

Surgery Group SC

On December 17, Surgery Group SC in Illinois notified HHS about an incident impacting 500 patients. DataBreaches.net interprets that 500 number as a marker in situations in which the entity may not yet have figured out how many have actually been affected.  That does seem to be the case in this incident.

According to a notice on Surgery Group SC’s website, they were notified of a data security incident experienced by VPN Solutions LLC (“VPN”). Surgery Group’s vendor, Physicians Healthcare Solutions, LLC (PHS) uses VPN to host its databases — databases that contain the personal and protected health information of patients.

Surgery Group was notified of the incident on October 31. Surgery Group’s notice does not indicate when the attack occurred, but they note that VPN hosts and maintains the practice management and EHR platform that they use. Those records include patients’ clinical, demographic, and financial and claims information such as amounts of charges and payment history.

VPN Solutions’ home page says “Our unique approach ensures secure and HIPAA compliant access to your health records 24.7.365.”

Access 24.7.365 does not appear to be the current situation, because Surgery Group reports:

The data security incident experienced by VPN resulted in the unavailability of the personal information of Surgery Group’s patients. […]  Despite numerous, repeated requests from PHS and Surgery Group, VPN has not restored the VPN Platform and has been unable to provide Surgery Group with a date by when the VPN Platform will be restored and fully functional. VPN has indicated that it currently does not believe that any of Surgery Group’s patient information has been viewed or acquired by an unauthorized party.

Due to the unavailability of the VPN Platform that contains patient contact information, Surgery Group is unable to notify its patients of the incident by mail. Patients with questions may call Surgery Group at (630) 208-7874 between 9:00 a.m. and 5:00 p.m. CST, Monday, Tuesday, and Thursday, and between 9:00 a.m. and 4:00 p.m. CST, Wednesday and Friday.

Apple Blossom Family Practice

Apple Blossom Family Practice in Virginia issued an identical notice on their website. Their report to HHS on December 16 also seemed to use a 500 marker report.

There does not seem to be any notice on the vendor’s website at this time, and DataBreaches.net was unable to find any dedicated leak site that listed an attack on VPN Solutions.  DataBreaches.net reached out to VPN Solutions via email to ask for more details, but no reply was immediately forthcoming. This post will be updated if or when more information becomes available.

 


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: Health DataMalwareOf NoteSubcontractorU.S.

Post navigation

← Virtual Care Provider Sues Rivals, Alleging Data Theft, Patent Violation
Pk: Hackers steal, put up for sale Khyber Pakhtunkhwa police data →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Gates Down: Third Circuit Says Breaking Employer Computer Access Policies Is Not Hacking
  • Short-term renewal of cyber information sharing law appears in bill to end shutdown
  • Yanluowang ransomware IAB pleads guilty
  • Lawsuit Alleges Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
  • HIPAA, but for non-Covered Entities?
  • Manassas City Public Schools close on Monday due to cyberattack
  • San Joaquin County Superior Court concludes sensitive info leaked in data breach
  • NCCIA arrests man over massive data breach involving millions of Pakistanis
  • Defense Contractors Are Silencing Their Cybersecurity Watchdogs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
  • EPIC Publishes New Whitepaper Detailing Privacy Risks of Government Data Mining Programs
  • Modern cars are spying on you. Here’s what you can do about it.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.