DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Pain Care Specialists may be feeling the pain of a ransomware attack

Posted on September 22, 2023 by Dissent

It appears that Pain Care Specialists in Oregon became the victim of an attack by AlphV. The threat actors added the medical entity to their leak site earlier today with some files with personal information on employees and patients.

AlphV’s listing noted that the breach occurred on September 13, and, “As a result of our hack attack the network has been encrypted and over 150GB of sensitive data were stolen from there. Those data includes patient’s and employee’s medical records, social security numbers, employees ID’s, contracts, drug screens, payments and another sensitive info. In addition we have gained access to portals of federal medical regulation web-resources that allows managing of prescribed medicine and provides access to medical records of various individuals.”

Consistent with other leak site posts, AlphV demonstrates that they look at claims that sites make and then point out how named entities do not adhere to promises the entity makes. In this case, AlphV writes that Dr. Poly Chen:

violates their own policy which states that “Patients can expect that all communications and records about their care will be confidential, unless disclosure is allowed by law” We have faced complete indifference from Poly Chen, Yonguen Cho, David Keen, Donald Winder and other top management representative of this business. They are receiving and reading our messages but still refusing to answer.

AlphV gives Pain Care Specialists until September 26 to contact them or all the data will be freely leaked.

One of the proof of claim files contained prescription information on a named patient. Image and redaction: DataBreaches.net.

In an email to Dr. Chen and others on September 18, AlphV provided them with an update about data leaked from the network. In that email, a copy of which was openly cc:d to DataBreaches, AlphV claimed they had acquired:

– detailed information about employees (contracts, ssn, phone, home address, ID’s, drug screens, etc)
– doctor’s info (contracts, signatures, certificates, ssn, phone, home address, ID’s, etc)
– SCS/PNS/DRG Representative Information (phones, emails, etc)
– patient’s info (medical records, prescriptions, home address, contacts, ssn, etc)
– medical providers and controllers contacts
– partners and other business contacts
– access to electronical medical services (covermymeds, eCW/eMR, ORPDMP, and
– access to sensitive details about patients (phone numbers, SSN, medications given, etc, example below)

In addition to those claims, AlphV warned them that if they did not contact AlphV, “we will start informing contacts we found within your files about their data being leaked from your network. Of course we will make those calls exhausting for the subscribers we will be calling.” A list of names and phones numbers followed that.

AlphV followed that with a version of the carrot and the stick:

We are offering your management to pay us a fee for following services:

– we will provide tool to decrypt your files in case if you had no backup for them
– we guarantee complete deletion of your data from our servers
– we will provide data deletion log for your files from our servers
– we will give network improvement strategy which will help your IT security to become superior
– we will provide independent network penetration test of your network
– we guarantee you will never see us again

In case if management or representatives of “PainCare Specialists” will completely refuse to contact us until September 26th the opportunity to protect their data will expire and all the leaked data will be shared through web. When this happens a dozen of federal regulators will investigate your business slowing down your business processes, working licenses will be issued. Following reputation loss and possible court fines is higher than recovery fee we are offering you to pay.

It may be true that the amount being demanded might be less than certain incident response costs or consequences (the amount was not specified in the email and is not known to DataBreaches), but their statement seems to ignore the fact that the entity still has to notify and pay all those other incident response costs, and paying extortion just adds to the costs of the incident. Paying extortion or ransom demands does not seem to reduce the likelihood of litigation. Nor does it reduce the likelihood that regulators will investigate and either fine and/or impose a corrective action plan.

From the email, however, it is clear that AlphV claims to have locked them, so paying extortion may actually be cheaper than being down for days or weeks if they are unable to recover necessary files (that is, of course, assuming that they would be able to recover all their files if they pay). A maintenance notice on their website today indicates that they may be trying to deal with some issues.

Dear Friends,Please note that we will be experiencing phone and fax system downtime on Friday, September 22, 2023, from 6:00AM to 6:00PM due to system maintenance. Our phone and fax will not be available during this time. However, please use our alternative phone and fax below during the maintenance process. Phone: +1 971-208-9282 Fax: +1 971-600-9009 We apologize in advance for any inconvenience that may occur. Sincerely, Your Team at Pain Care Specialists of Oregon
A “notice of maintenance” appeared on Pain Care Specialists’ website on September 22. Image: DataBreaches.net

DataBreaches sent an email inquiry to Pain Care Specialists early today to ask whether they did have a backup that they could use to restore files, and to ask other questions about the scope of the breach. No reply has been received.

Category: Breach IncidentsHealth DataMalwareU.S.

Post navigation

← Leander ISD sends email about students’ vaccination status to over 200 people
National Student Clearinghouse notifies California on behalf of almost 900 schools affected by MOVEit breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes
  • Personal information exposed by Australian Human Rights Commission data breach
  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.