DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Au: Atherfield Medical & Skin Cancer Clinic victim of cyberattack by Cyclops

Posted on July 5, 2023 by Dissent

Cyclops" leak site header says "Data Leaked. We keep our promises."

 

Australia has experienced a number of significant cyberattacks on healthcare entities in the past few years. Now a relatively new ransomware group, Cyclops, claims to have attacked Atherfield Medical & Skin Cancer Clinic in Australia:

Listing on Cyclops blog includes a link to download data and screencaps as proof of claims.

In Cyclops’ listing (above), there is a date of June 29, which appears to be the date they uploaded the data. There is a link to download files and screencaps as proof of claims. DataBreaches has redacted the link to the data.

Inspection of the leaked data revealed a lot of personal and health information of patients as well as banking details of doctors:

Folders with clinical results and zipped archives to show size. The ECG Test Results compressed archive was 189MB compressed.

The ECG Test Results folder contained subfolders, one for each year 2020 – 2023. The filenames were formatted to have the patient’s first and last name and the date of their ECG  (echocardiogram). The files were all .pdf files and were password-protected. DataBreaches did not attempt to crack the passwords to see if one password was used for all 300+ files or if there was a unique password per file. That said, just the disclosure of patient names, dates of service, and type of test would be considered a breach of protected health information under HIPAA. But this is Australia, not the U.S., and DataBreaches is not an expert on their regulations or laws. The doctors’ personal information for banking would also be a concern if the doctors still use those accounts.

DataBreaches is not sure whether the password protection on individual files was by Atherfield or by the attackers. When contacted via Qtox to ask about that, a spokesperson for Cyclops who called themself “Booda” informed DataBreaches that the attack was by an affiliate and not by CYCLOPS. On July 1, the spokesperson said they would reach out to the affiliate to ask about the individual file password protection, but they have not gotten back to DataBreaches by publication time.

Not finding any alert or notification on its site, DataBreaches emailed Atherfield on July 2 and July 3 asking about the incident. Their practice manager, identified only as Kaylene, replied today:

Good morning,

We recently experienced a cyber incident where an unauthorised third party accessed our network and took some of our data. We immediately partnered with forensic specialists and cybersecurity experts commenced an investigation to understand what happened. This investigation is ongoing.

We have also taken steps to further secure our systems.

The unauthorised third party published some data externally on 1 July 2023 which we are investigating as a priority.

We are notifying all individuals who may have been impacted by this incident, and providing steps they can take to protect their personal information.

We are taking this matter very seriously and we apologise for any inconvenience or distress that this incident may have caused.

At this point, then, it seems that this is a confirmed breach, but its scope is yet to be determined or revealed. DataBreaches will continue to monitor the situation.

 

 

Category: Breach IncidentsHealth DataMalwareNon-U.S.

Post navigation

← Why ransomware groups are targeting Indian pharma companies and the healthcare sector; ClearMedi allegedly hacked
DEVELOPING: HCA Healthcare patient data for sale on hacking forum? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.