DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The Chattanooga Heart Institute to notify 170,450 about March “data security incident”

Posted on July 29, 2023 by Dissent

In May, DataBreaches dutifully noted The Chattanooga Heart Institute (CHI) on our non-public worksheets. At the time, all we knew was that Karakurt threat actors had claimed to have attacked them and to have exfiltrated 158 GB of data. There was no proof of claim offered, but Karakurt wrote:

Employees and patients’ private data will soon be here available for everyone. Medical records, tests results, diagnoses, social security numbers, passports, addresses, phone numbers, financial data and other documents are going to be uploaded.

CHI never replied to the inquiry DataBreaches sent them on May 23, but on July 28, they notified the Maine Attorney General’s Office that 170,450 people were affected by an incident that they describe on its website as a “data security incident” or “cyberattack.”

The notice explains that on April 17, they detected indicators of a cyberattack and initiated their response plan. An investigation, conducted with the assistance of an external forensics firm, found that the network had been accessed between March 8 and March 16, but it wasn’t until  May 31 that they learned that patients’ protected health information and guarantors’ information had been acquired. There was no evidence that the data had been retrieved from the EMR system.

The information that could have been subject to unauthorized access reportedly includes patient or guarantor name, mailing address, email address, phone number, date of birth, driver’s license number, Social Security number, account information, health insurance information, diagnosis/condition information, lab results, medications and other clinical, demographic or financial information.

Notifications have yet to be sent out to all those affected; CHI indicates letters will be sent out “over the coming weeks” as detailed reviews of files are completed. Those notified will be offered credit monitoring and identity theft restoration services.

But nowhere in CHI’s notification does it ever reveal that there was a ransom demand from a known criminal group. Nor is there any mention that patient data might show up on the dark web.

As of publication, Karakurt has not leaked any of the data. DataBreaches will continue to monitor the leak site to see if patient data, guarantor data, or employee information is ever leaked there.

Related posts:

  • Peachtree Orthopedics alerts patients to cyberattack; third patient data breach in seven years
  • Follow-on extortion campaign: confirmation of some findings by Arctic Wolf
  • Was Yakima Valley Radiology the victim of a cyberattack? They’re not answering that.
Category: Breach IncidentsHealth DataMalware

Post navigation

← Arizona man who extorted Georgia Tech sentenced to prison
Attacked by Black Basta, BankCard USA paid ransom. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit
  • British national “IntelBroker” charged with causing $25 million in damages; U.S. seeks his extradition from France
  • France issues press statement about arrest of ShinyHunters members
  • Patients Allege Home Delivery Pharmacy Failed to Timely Notify Them of Data Breach
  • Hackers breach Norwegian dam, open valve at full capacity

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions
  • NY Attorney General James Affirms Hospitals Must Provide Access to Emergency Abortion Care
  • How Internet of Things devices affect your privacy – even when they’re not yours
  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.