DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

BianLian hits a community services organization for adults with serious disabilities

Posted on September 7, 2022 by Dissent

Alegria Family Services (AFS) provides residential and community services to adults with developmental disabilities in New Mexico under a contract with the New Mexico Department of Health.

They are not a large organization with vast resources, yet BianLian decided they would target them with a ransomware attack. Maybe they saw a ZoomInfo listing showing $7 million in revenue and didn’t understand that funds from the state and federal government under Medicaid or other programs are not revenue the agency can reallocate. Providing community inclusion programs for severely disabled adults is not something people go into to make a profit or buy a Lambo. I wish ransomware groups learned to lay off these entities trying to make a real difference in people’s lives.

In a listing on their leak site, BianLian claimed they had acquired internal records, personnel-related files, and client data. They did not list how much data they exfiltrated in total.

BianLian’s listing did not provide any proof of claims, but AFS confirmed that they had suffered a ransomware attack by the group.

DataBreaches spoke with someone from AFS today. AFS was not sure they knew how BianLian had managed to gain access, but they knew that BianLian managed to evade AV protections by breaking files into small units. They also know that BianLian succeeded in locking AFS’s current files and even their cloud-based backup. And they say they know that they cannot pay BianLian’s ransom demand.

AFS was in the middle of running a backup when the ransomware was triggered, which was how the cloud backup was locked. They tell DataBreaches that they have a usable Windows backup created three days before the attack, but all archived files and records going back six years are in the locked cloud backup.

Despite the challenges, AFS made a somewhat extraordinary decision to personally call every single client to explain what happened to them. Given their clients’ cognitive challenges, they felt that a letter would not be appropriate, and they want to ensure that their clients and caretakers understand what happened.

Given their current caseload, they have about 100 phone calls to make to explain and ensure their clients understand.

And then, when that’s done, they’ll start trying to call every client they’ve had for the past six years. Locating those clients’ phone numbers to call them may not always be possible, and they may have to send letters or post a substitute notice, but they intend to try.

As of publication time, BianLian has not leaked data from AFS or a second entity in the healthcare space that it also claims to have attacked.


Related:

  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Large medical lab in South Africa suffers multiple data breaches
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • From bad to worse: Doctor Alliance hacked again by same threat actor (2)
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
Category: Health DataMalwareU.S.

Post navigation

← “Computer hacker steals sensitive information from 20,000 Christchurch hot pools customers” — NO. That’s NOT what happened.
“Bad faith, misunderstanding, or indifference?” Why do ransomware teams falsely insist victims have “revenue?” →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Portugal updates cybercrime law to exempt security researchers
  • LockBit 5’s “new secure blog domain” infra leaked already
  • NL: Nuenen accidentally leaks addresses of 1,000 asylum center opponents
  • Ex-teen hackers warn parents are clueless as children steal ‘millions’
  • UK Government Considers Computer Misuse Act Revision
  • Japan issues arrest warrant against teen suspected of cyberattack using AI
  • How old is the average hacker? What does a new research report suggest? (1)
  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.