DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

East Tennessee Children’s Hospital updates information on ransomware incident

Posted on April 8, 2022 by Dissent

On March 15, this site noted that the East Tennessee Children’s Hospital had posted a notice about an IT security incident. At the time, they did not identify the incident as a ransomware incident.

DataBreaches.net subsequently found some explanation for that notice — a listing on a Russian-language forum offering data from ETCH with numerous screencaps and a compressed archive of files. The listing was posted by a user affiliating with a group they called “NWGEN” and stated that although ETCH had been able to recover from backup, they were “forgetting about the children’s files.”  The threat actor claimed that they had “exfiled 700GB worth of .sql and .bak files(SSN, DoB, Full-names, Ages, Registered deceases and more..)” and were dumping 170GB of “useless” data at that point.


A forum listing with data from ETCH seen on a Russian-language forum in March.

The listing did not get much response other than from one individual who noted that the original torrent link did not work. Perhaps the attacker misgauged how much people might detest them for trying to capitalize on children’s sensitive information. In any event, there is no indication of how many people may have downloaded the data, and there was no further leak of ETCH data posted on that forum by that user. A quick check of other sites did not find the data from ETCH on two other popular forums where hacked data are often leaked (but of course, there are more than three places on the internet where such data might be shared).

Today, The Daily Times in Tennessee has an update on the incident and reports that a new press release was issued by the hospital yesterday.  The following is part of that press release:

What Happened? On March 13, 2022, ETCH identified unusual activity on its network. We promptly began taking steps to secure our systems and commenced a comprehensive investigation into the incident. Through the investigation to date, we have determined that ETCH experienced a cyber incident. While our investigation is ongoing, on March 18, 2022, we determined that certain documents stored within ETCH’s environment may have been copied from or viewed on the system as part of the cyber incident between March 11, 2022 – March 14, 2022. Based on the investigation, ETCH is currently working to determine the scope of potentially affected information and conducting a detailed review of the potentially impacted data to determine the type of information present and to whom it relates. This effort is currently ongoing.

What Information Was Involved? While the investigation to determine the full scope of potentially affected information is ongoing and may vary by individual, the relevant ETCH systems may contain the following types of information at the time of the event: names, date of birth, Social Security number, driver’s license or state identification number, non-resident identification number, other demographic information, medical information, health insurance information, credit or debit card information, financial information, billing information, other personal health information, and usernames and passwords.

The full press release can be found on ETCH’s website, here.

But “may have been copied or viewed?”  ETCH had direct knowledge and proof as to some of what had happened, as they actually negotiated with the threat actors and were given multiple examples of proof.  Then, too, some data were actually dumped and made freely available to the public.

The threat actors showed a negotiator for ETCH numerous files that they had exfiltrated during negotiations. These are just some. Redacted by DataBreaches.net.

The threat actors also uploaded some of the negotiations between them and “Todd,” someone who claimed to be an IT employee for ETCH, but used a Yahoo.com address.  At one point, the negotiator indicated that they would reduce their demand to $300,000.00.

The deadline given to ETCH to pay came and went, and it appears the initial data dump was reuploaded by the original poster to another file-sharing site on April 1. Yet no additional data has been leaked. Does that mean that there is still some negotiation going on?

ETCH’s press release is totally silent on the issue of ransom or any negotiations.

But should ETCH have told people that they know some data has already been dumped on the internet? How much personnel information does that 3.8 GB compressed archive contain?

And what, if anything, have the attackers done with any patient data?

Update May 23, 2022:  ETCH reported this incident to the Maryland AG’s Office on May 19 as impacting 422,531 people.

Category: Breach IncidentsCommentaries and AnalysesHackMalware

Post navigation

← Microsoft on disrupting cyberattacks targeting Ukraine; Facebook on countering Ghostwriter’s attempts
Details on the Weatherford ISD data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.