DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

As people headed out for the holiday weekend, breaches of protected health information were being disclosed. (2)

Posted on May 27, 2023 by Dissent

Update: The MCNA (Managed Care of North America) incident was reported to the Maine Attorney General’s Office as affecting a total of  8,923,662 people.

Update 2, May 29: This incident was claimed by LockBit in March and data were leaked in April, but the data dump URLs were not working as of last check yesterday.

Original post:

What are the odds that a data breach will be revealed on the Friday afternoon of a three-day holiday weekend?

Well, as anyone who has reported on breaches for a while knows, the odds are high. Today, DataBreaches reports two breaches that were disclosed on Friday. Whether the hope was that fewer people would notice them because they took off for the holiday or because there were more honorable intentions in disclosing on a Friday of a holiday weekend is unknown to DataBreaches. DataBreaches may find other Friday disclosures, but for now, we start with these:

MCNA Insurance

MCNA Insurance (also known as MCNA Dental) disclosed a hacking incident with data exfiltration that affected more than 100 covered entities including state Medicaid agencies, the Children’s Health Insurance Programs, corporations, and insurance plans. A list of the 112 entities on whose behalf MCNA is providing notification is listed on an incident response website created for them by IDX.

According to the Georgia firm’s disclosure, the unauthorized access occurred between February 27 and March 7, and was discovered on March 6. The types of information varied by individual, but may have included:

  • First and last name
  • Address
  • Date of birth
  • Phone number
  • Email address
  • Social Security number
  • Driver’s license number/other government-issued ID number
  • Health insurance (plan information, insurance company, member number, Medicaid-Medicare ID numbers)
  • Care for teeth or braces (visits, dentist name, doctor name, past care, x-rays/photos, medicines, and treatment)
  • Bills and insurance claims

Data was not only accessed but was also exfiltrated. MCNA’s notification did not indicate how many patients were affected for the 112 entities for who they are providing notice, and other entities may be providing their own notice.

DataBreaches sent MCNA an email inquiry asking if there was any ransom or extortion demand involved in this incident at all. No reply was immediately provided (see UPDATE 2 above this post).

Onix Group LLC

Onix Group LLC in Pennsylvania also issued a press release yesterday. Their notice was provided on their own behalf and on behalf of Addiction Recovery Systems, Cadia Healthcare, Physician’s Mobile X-Ray, and Onix Hospitality Group.

Onix reports they were the victim of a ransomware attack on March 27 and the attacker had accessed their network, corrupted some systems, and exfiltrated some files between March 20 and March 27.

The types of protected health information involved included names, Social Security numbers, dates of birth, and scheduling, billing, and clinical information regarding patient care at one of the named healthcare providers.

The files that were accessed also contained information maintained for human resources purposes, including names, Social Security numbers, direct deposit information, and health plan enrollment information for all of the named entities.

Onix did not name the group or threat actor responsible for the attack or whether any of the data was irretrievably corrupted or lost. An email inquiry has been sent to them, too.

Category: Breach IncidentsHack

Post navigation

← NYSDFS Fines Lender and Mortgage Servicer $4.25M for Cybersecurity Failures Including Vendor Management
Defiant Johns Hopkins doctor testifies she shared private patient records because she feared Russia →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.