DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Over 20,000 people’s data potentially compromised in phishing scam targeting Valley View Hospital (Colorado)

Posted on April 30, 2022 by Dissent

Ike Fredregill reports:

A phishing scam granted outside users access to four Valley View Hospital email accounts, potentially impacting the personal data of about 21,000 people, including hospital employees and patients, a Valley View spokesperson wrote in an email.

A Valley View news release Friday states the hospital learned in January that thousands of peoples’ personal information could have been accessed when an unauthorized third party gained access to several employees’ email accounts. An investigation followed, and it was determined March 29 that the accounts contained personal information that could have been compromised.

Read more at Aspen Times.

Valley View’s substitute notice, in full. They indicate when they discovered the breach, but not when it occurred.

Valley View Hospital Association (Valley View) is committed to protecting the privacy and security of our patients’ information. Regrettably, this notice is regarding an incident we identified that may have involved a limited group of patients’ information.

On January 19, 2022, Valley View discovered that an unauthorized party gained access to four of its employees’ email accounts that could have contained patient information. Valley View promptly secured the email accounts to prevent any further unauthorized access and engaged a forensic security firm to investigate the incident and confirm the security of Valley View’s email and computer systems.
We do not believe that any personal information was removed from our system. Consistent with our commitment to keep your personal information private, we investigated this matter and reviewed the contents of the email accounts. On March 29, 2022, we determined that the accounts contained personal information.

Valley View mailed letters to those patients whose information may have been involved in this incident beginning on March 19, 2022. If you believe you are involved and did not receive a letter, we encourage you to call 1-877-660-1330 with any questions regarding this incident. Representatives are available Monday through Friday from 7 a.m. – 4 p.m. Mountain Time.

We want to assure our patients that we are taking this matter very seriously. We deeply regret that this incident has occurred and greatly value the trust our patients have placed in Valley View.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: Health DataU.S.

Post navigation

← Friday musings: Do better Twitter
LA County Department of Mental Health Compromised by Phishing Attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.