DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Au: Atherfield Medical & Skin Cancer Clinic victim of cyberattack by Cyclops

Posted on July 5, 2023 by Dissent

Cyclops" leak site header says "Data Leaked. We keep our promises."

 

Australia has experienced a number of significant cyberattacks on healthcare entities in the past few years. Now a relatively new ransomware group, Cyclops, claims to have attacked Atherfield Medical & Skin Cancer Clinic in Australia:

Listing on Cyclops blog includes a link to download data and screencaps as proof of claims.

In Cyclops’ listing (above), there is a date of June 29, which appears to be the date they uploaded the data. There is a link to download files and screencaps as proof of claims. DataBreaches has redacted the link to the data.

Inspection of the leaked data revealed a lot of personal and health information of patients as well as banking details of doctors:

Folders with clinical results and zipped archives to show size. The ECG Test Results compressed archive was 189MB compressed.

The ECG Test Results folder contained subfolders, one for each year 2020 – 2023. The filenames were formatted to have the patient’s first and last name and the date of their ECG  (echocardiogram). The files were all .pdf files and were password-protected. DataBreaches did not attempt to crack the passwords to see if one password was used for all 300+ files or if there was a unique password per file. That said, just the disclosure of patient names, dates of service, and type of test would be considered a breach of protected health information under HIPAA. But this is Australia, not the U.S., and DataBreaches is not an expert on their regulations or laws. The doctors’ personal information for banking would also be a concern if the doctors still use those accounts.

DataBreaches is not sure whether the password protection on individual files was by Atherfield or by the attackers. When contacted via Qtox to ask about that, a spokesperson for Cyclops who called themself “Booda” informed DataBreaches that the attack was by an affiliate and not by CYCLOPS. On July 1, the spokesperson said they would reach out to the affiliate to ask about the individual file password protection, but they have not gotten back to DataBreaches by publication time.

Not finding any alert or notification on its site, DataBreaches emailed Atherfield on July 2 and July 3 asking about the incident. Their practice manager, identified only as Kaylene, replied today:

Good morning,

We recently experienced a cyber incident where an unauthorised third party accessed our network and took some of our data. We immediately partnered with forensic specialists and cybersecurity experts commenced an investigation to understand what happened. This investigation is ongoing.

We have also taken steps to further secure our systems.

The unauthorised third party published some data externally on 1 July 2023 which we are investigating as a priority.

We are notifying all individuals who may have been impacted by this incident, and providing steps they can take to protect their personal information.

We are taking this matter very seriously and we apologise for any inconvenience or distress that this incident may have caused.

At this point, then, it seems that this is a confirmed breach, but its scope is yet to be determined or revealed. DataBreaches will continue to monitor the situation.

 

 

Related posts:

  • Operation Anti Security Breakdown and targets, the full time line
Category: Breach IncidentsHealth DataMalwareNon-U.S.

Post navigation

← Why ransomware groups are targeting Indian pharma companies and the healthcare sector; ClearMedi allegedly hacked
DEVELOPING: HCA Healthcare patient data for sale on hacking forum? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.