DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

BianLian hits a community services organization for adults with serious disabilities

Posted on September 7, 2022 by Dissent

Alegria Family Services (AFS) provides residential and community services to adults with developmental disabilities in New Mexico under a contract with the New Mexico Department of Health.

They are not a large organization with vast resources, yet BianLian decided they would target them with a ransomware attack. Maybe they saw a ZoomInfo listing showing $7 million in revenue and didn’t understand that funds from the state and federal government under Medicaid or other programs are not revenue the agency can reallocate. Providing community inclusion programs for severely disabled adults is not something people go into to make a profit or buy a Lambo. I wish ransomware groups learned to lay off these entities trying to make a real difference in people’s lives.

In a listing on their leak site, BianLian claimed they had acquired internal records, personnel-related files, and client data. They did not list how much data they exfiltrated in total.

BianLian’s listing did not provide any proof of claims, but AFS confirmed that they had suffered a ransomware attack by the group.

DataBreaches spoke with someone from AFS today. AFS was not sure they knew how BianLian had managed to gain access, but they knew that BianLian managed to evade AV protections by breaking files into small units. They also know that BianLian succeeded in locking AFS’s current files and even their cloud-based backup. And they say they know that they cannot pay BianLian’s ransom demand.

AFS was in the middle of running a backup when the ransomware was triggered, which was how the cloud backup was locked. They tell DataBreaches that they have a usable Windows backup created three days before the attack, but all archived files and records going back six years are in the locked cloud backup.

Despite the challenges, AFS made a somewhat extraordinary decision to personally call every single client to explain what happened to them. Given their clients’ cognitive challenges, they felt that a letter would not be appropriate, and they want to ensure that their clients and caretakers understand what happened.

Given their current caseload, they have about 100 phone calls to make to explain and ensure their clients understand.

And then, when that’s done, they’ll start trying to call every client they’ve had for the past six years. Locating those clients’ phone numbers to call them may not always be possible, and they may have to send letters or post a substitute notice, but they intend to try.

As of publication time, BianLian has not leaked data from AFS or a second entity in the healthcare space that it also claims to have attacked.

Category: Health DataMalwareU.S.

Post navigation

← “Computer hacker steals sensitive information from 20,000 Christchurch hot pools customers” — NO. That’s NOT what happened.
“Bad faith, misunderstanding, or indifference?” Why do ransomware teams falsely insist victims have “revenue?” →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.