DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

East Tennessee Children’s Hospital updates information on ransomware incident

Posted on April 8, 2022 by Dissent

On March 15, this site noted that the East Tennessee Children’s Hospital had posted a notice about an IT security incident. At the time, they did not identify the incident as a ransomware incident.

DataBreaches.net subsequently found some explanation for that notice — a listing on a Russian-language forum offering data from ETCH with numerous screencaps and a compressed archive of files. The listing was posted by a user affiliating with a group they called “NWGEN” and stated that although ETCH had been able to recover from backup, they were “forgetting about the children’s files.”  The threat actor claimed that they had “exfiled 700GB worth of .sql and .bak files(SSN, DoB, Full-names, Ages, Registered deceases and more..)” and were dumping 170GB of “useless” data at that point.


A forum listing with data from ETCH seen on a Russian-language forum in March.

The listing did not get much response other than from one individual who noted that the original torrent link did not work. Perhaps the attacker misgauged how much people might detest them for trying to capitalize on children’s sensitive information. In any event, there is no indication of how many people may have downloaded the data, and there was no further leak of ETCH data posted on that forum by that user. A quick check of other sites did not find the data from ETCH on two other popular forums where hacked data are often leaked (but of course, there are more than three places on the internet where such data might be shared).

Today, The Daily Times in Tennessee has an update on the incident and reports that a new press release was issued by the hospital yesterday.  The following is part of that press release:

What Happened? On March 13, 2022, ETCH identified unusual activity on its network. We promptly began taking steps to secure our systems and commenced a comprehensive investigation into the incident. Through the investigation to date, we have determined that ETCH experienced a cyber incident. While our investigation is ongoing, on March 18, 2022, we determined that certain documents stored within ETCH’s environment may have been copied from or viewed on the system as part of the cyber incident between March 11, 2022 – March 14, 2022. Based on the investigation, ETCH is currently working to determine the scope of potentially affected information and conducting a detailed review of the potentially impacted data to determine the type of information present and to whom it relates. This effort is currently ongoing.

What Information Was Involved? While the investigation to determine the full scope of potentially affected information is ongoing and may vary by individual, the relevant ETCH systems may contain the following types of information at the time of the event: names, date of birth, Social Security number, driver’s license or state identification number, non-resident identification number, other demographic information, medical information, health insurance information, credit or debit card information, financial information, billing information, other personal health information, and usernames and passwords.

The full press release can be found on ETCH’s website, here.

But “may have been copied or viewed?”  ETCH had direct knowledge and proof as to some of what had happened, as they actually negotiated with the threat actors and were given multiple examples of proof.  Then, too, some data were actually dumped and made freely available to the public.

The threat actors showed a negotiator for ETCH numerous files that they had exfiltrated during negotiations. These are just some. Redacted by DataBreaches.net.

The threat actors also uploaded some of the negotiations between them and “Todd,” someone who claimed to be an IT employee for ETCH, but used a Yahoo.com address.  At one point, the negotiator indicated that they would reduce their demand to $300,000.00.

The deadline given to ETCH to pay came and went, and it appears the initial data dump was reuploaded by the original poster to another file-sharing site on April 1. Yet no additional data has been leaked. Does that mean that there is still some negotiation going on?

ETCH’s press release is totally silent on the issue of ransom or any negotiations.

But should ETCH have told people that they know some data has already been dumped on the internet? How much personnel information does that 3.8 GB compressed archive contain?

And what, if anything, have the attackers done with any patient data?

Update May 23, 2022:  ETCH reported this incident to the Maryland AG’s Office on May 19 as impacting 422,531 people.


Related:

  • Tech Etch notifying employees of August ransomware incident
  • TeamGhostShell posts "master list" of 548 leaks (so far)
  • Exclusive: Attack on HVAC vendor gave threat actor access to Boston Children's Hospital
  • Confused about the drama with the new BreachForums? Reading this will either help you or make your head spin.
  • Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists
Category: Breach IncidentsCommentaries and AnalysesHackMalware

Post navigation

← Microsoft on disrupting cyberattacks targeting Ukraine; Facebook on countering Ghostwriter’s attempts
Details on the Weatherford ISD data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • HHS’ Office for Civil Rights Settles HIPAA Investigation of MMG Fusion, LLC Breach Affecting 15 Million Individuals
  • NL: Suspects report themselves via new reporting form
  • Nigerian Communication Commission Orders Telecoms to Report Cyber Threats Within 4 Hours
  • Russian Ransomware Administrator Pleads Guilty to Wire Fraud Conspiracy
  • LeakBase seized, arrests made as part of global action
  • Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
  • 1,700 Dutch police officers get reminder not to access files without legitimate purpose
  • Israeli spies ‘hacked every traffic camera in Tehran to plot killing of Iran’s Ayatollah Ali Khamenei’
  • Congress finds data brokers cost consumers tens of billions of dollars
  • Evoke Wellness at Hilliard updates its breach notification

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Allstate must face privacy lawsuit over cellphone tracking of drivers
  • Spain fines FC Barcelona €500,000 for failing biometric data protection assessment
  • Polish doctors jailed for denying woman abortion
  • France’s Highest Administrative Court Upholds CNIL’s Standard On Anonymization
  • Dutch police reminded not to snoop in files without legitimate purpose

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.