DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

ID: St. Luke’s vendor suffers data breach affecting some patients

Posted on July 28, 2022 by Dissent

KMVT reports:

St. Luke’s says it was informed by a business vendor of a data breach the vendor says could have affected patients and members of certain customers.

The hospital system says one of its vendors informed them of a cybersecurity incident that occurred in late May of this year. The vendor had a contract with St. Luke’s to provide statement processing and billing services.

Read more at KMVT but you won’t find any details like the identity of the vendor.

This would seem to be the St. Luke’s Medical Center but DataBreaches can find no notice on their site and has received no immediate reply to an inquiry sent to the medical center. The image in the news story suggests it might be St. Luke’s Magic Way.

Update:  BoiseDev has some additional details. It appears the vendor was Kaye Smith, and that St. Luke’s Health System told BoiseDev it identified 31,573 individuals who are impacted by the breach. Read more on BoiseDev.

Update2: This was reported to HHS on Aug. 2 as affecting 31,573 patients but just appeared on the listing on Aug. 18.

No related posts.

Category: Breach IncidentsHealth Data

Post navigation

← Top secret documents scattered in street after careless disposal by German Chancellor Scholz
City of Detroit retirees data breach causes concern →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.