DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

BianLian hits a community services organization for adults with serious disabilities

Posted on September 7, 2022 by Dissent

Alegria Family Services (AFS) provides residential and community services to adults with developmental disabilities in New Mexico under a contract with the New Mexico Department of Health.

They are not a large organization with vast resources, yet BianLian decided they would target them with a ransomware attack. Maybe they saw a ZoomInfo listing showing $7 million in revenue and didn’t understand that funds from the state and federal government under Medicaid or other programs are not revenue the agency can reallocate. Providing community inclusion programs for severely disabled adults is not something people go into to make a profit or buy a Lambo. I wish ransomware groups learned to lay off these entities trying to make a real difference in people’s lives.

In a listing on their leak site, BianLian claimed they had acquired internal records, personnel-related files, and client data. They did not list how much data they exfiltrated in total.

BianLian’s listing did not provide any proof of claims, but AFS confirmed that they had suffered a ransomware attack by the group.

DataBreaches spoke with someone from AFS today. AFS was not sure they knew how BianLian had managed to gain access, but they knew that BianLian managed to evade AV protections by breaking files into small units. They also know that BianLian succeeded in locking AFS’s current files and even their cloud-based backup. And they say they know that they cannot pay BianLian’s ransom demand.

AFS was in the middle of running a backup when the ransomware was triggered, which was how the cloud backup was locked. They tell DataBreaches that they have a usable Windows backup created three days before the attack, but all archived files and records going back six years are in the locked cloud backup.

Despite the challenges, AFS made a somewhat extraordinary decision to personally call every single client to explain what happened to them. Given their clients’ cognitive challenges, they felt that a letter would not be appropriate, and they want to ensure that their clients and caretakers understand what happened.

Given their current caseload, they have about 100 phone calls to make to explain and ensure their clients understand.

And then, when that’s done, they’ll start trying to call every client they’ve had for the past six years. Locating those clients’ phone numbers to call them may not always be possible, and they may have to send letters or post a substitute notice, but they intend to try.

As of publication time, BianLian has not leaked data from AFS or a second entity in the healthcare space that it also claims to have attacked.

No related posts.

Category: Health DataMalwareU.S.

Post navigation

← “Computer hacker steals sensitive information from 20,000 Christchurch hot pools customers” — NO. That’s NOT what happened.
“Bad faith, misunderstanding, or indifference?” Why do ransomware teams falsely insist victims have “revenue?” →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.