DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Immediate care facility in Chicago hacked in December. Do patients know? (UPDATE1)

Posted on May 18, 2022 by Dissent

Approximately 43,000 patients of an immediate care facility and its associated primary care practice in Chicago may or may not know it yet, but threat actors gained access to protected health information in December and proceeded to remove more than 500 GB of files between December and May 10. Or so the threat actors claim.

On Monday, DataBreaches.net was contacted by an individual who claimed that Michigan Avenue Immediate Care had been hacked.

“Stealed more that 580 GB personal information about  ~43.000 patients  including SSN , Proof ID and lab analyses , TEMPUS Covid information and more info,” the person wrote, using a protonmail account.

A single 13-page file with a named patient’s registration form for Michigan Avenue Immediate Care (MAIC) was attached. The form contained demographic information about the patient with their name, date of birth, address, telephone number, Social Security number, health insurance information, and medical history including lifestyle factors was provided. That file also included a photocopy of the patient’s driver’s license and an April, 2022 date for follow up at Michigan Avenue Primary Care.

Top of patient registration form for MAIC.

Finding no media coverage of any breach, no report to HHS, and nothing on MAIC’s website, DataBreaches reached out to MAIC via email with questions about the claimed attack. Receiving no reply, DataBreaches sent a second inquiry earlier today, only to have it bounce back with a 550:blocked message. DataBreaches then sent a second email from this site’s domain email account. Although that email did not bounce back, no reply has been received.

With no information on MAIC’s or MAPC’s websites about any incident and no reply to emails, DataBreaches asked the threat actors if they would provide additional proof or details. They provided a 2.2 GB archive with protected health information (PHI) of patients. In addition to individual files with PHI, approximately 30 files in the sample were batched insurance claims with each page containing information on more than one patient.  Batched claims included patient name, account number, date of service, provider name, health insurance plan, health insurance policy number, charges, and balance.

Batched insurance claims were found in the leaked data. Redacted by DataBreaches.net .

When asked for information about when the attack occurred, the threat actors replied (as in the original):

We has break his servers on december 2021 . We continued uploading his data until to 10 May . We collected data from Yosi System, Docman , Tempus Covid results and more another info . We demanded not big price for confidential about this breach, but he only delay time, not paying .

Of note, they also informed DataBreaches that they had not encrypted any files.

Although the correspondent wrote to DataBreaches in English, default auto-text in emails such the “original message” divider appeared in Russian.

Somewhat surprisingly, they hesitated when DataBreaches asked how this site should refer to them, but when asked if DataBreaches might know them from any other hack or incident, they promptly replied, “Last our hack is Wycokck Country UG,” referring to the Unified Government of Wyandotte County and Kansas City incident, reported last month. That attack, which was discovered on April 16, was still impacting some government services by April 29.

Eventually, DataBreaches was told that they could be called “Targetware Team,” but  Databreaches is not confident that they used that name with WyCoKC or MAIC.

This post will be updated if MAIC responds to this site’s inquiries or if more information becomes available. As of the time of this publication, it is important to reiterate that they have not confirmed any breach to DataBreaches and if they did have a breach, it is not yet known to DataBreaches whether it was their breach or a third-party vendor’s breach.

Update 1 (May 19): No response has been received from MAIC  yet, but the TAs continue to provide this site with more details and data including more than 5 GB of data from TEMPUS that included COVID-19 test results on patients as well as re-registration forms for patients to be seen at MAPE, and appointment details for patients to be seen at MAPE.

Of note, they informed DataBreaches today that they did not reach out to MAIC until May 1 with their demands. That does not explain, of course, how MAIC did not detect any intrusion or exfiltration going back to December.

In response to DataBreaches’ question as to whether both MAIC and MAPE were attacked (because the TEMPUS system files showed registration files and appointments for MAPE), the spokesperson responded that it was only MAIC that got hit. “They have very weak computer security. Hacking their systems took only 1.5 hours,” the spokesperson added.

As a further update, the TAs claim that they have started selling data. “We already sell all information for now,” they wrote. But when DataBreaches asked if that meant all 580 GB of files that they claimed to have or just the data that they already shared with DataBreaches, the spokesperson responded, “No , we only start selling it yesterday.”

DataBreaches will continue to follow and update this report.

July 1: See update with their notification here.

Category: Breach IncidentsHackHealth DataU.S.

Post navigation

← Behavioral health entities in Massachusetts and Ohio reportedly victims of cyberattacks
Washington Local School District in Toledo, Ohio hit by disruptive cyberattack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.