DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

It took an HHS complaint, but three years later, some Ventura Orthopedic patients are finally being notified of a ransomware attack

Posted on November 2, 2023 by Dissent
red key on a keyboard shows an unlocked lock and says "Medical Data Breach"
Image: JosephAlber13 | Dreamstime

In August 2020, DataBreaches reported that the Maze ransomware gang had added Ventura Orthopedics to their name-and-shame leak site. At the time, Ventura did not respond to inquiries about whether they would confirm or deny the claims. And they did not respond to other inquiries from DataBreaches when the Conti ransomware gang subsequently listed 1,850 Ventura Orthopedics on its leak site.

On August 28, 2020, DataBreaches updated its post to report that this site was contacted by Chris Roberts, who was with HillBilly Hit Squad at the time. Roberts said he was contacting DataBreaches on behalf of Ventura Orthopedics who had asked him to help explain the incident and their then-current status. Roberts stated that he was still conducting forensics and asked if he could get back to DataBreaches shortly.  DataBreaches agreed.

Roberts never followed through with DataBreaches and after a few polite attempts on this site’s part, he did not respond at all.

In January 2021, DataBreaches wrote a report to follow up on some breaches that had not been publicly disclosed. It included Ventura Orthopedics. DataBreaches also filed a watchdog complaint with HHS OCR about Ventura.

Over the next few years, there was no real progress or resolution that DataBreaches could detect. DataBreaches would occasionally get an inquiry from HHS asking if there were any updates and if we still had all the data we had offered to HHS when we filed the complaint. Things started to move, however slowly, in an April 2023 conference call with HHS, during which their investigator asked DataBreaches if we would be willing to reach out to Ventura to offer them a copy of the data. DataBreaches firmly (and somewhat impolitely) declined, stating that DataBreaches had reached out multiple times to Ventura to no avail and their consultant had ghosted DataBreaches.  If Ventura wanted help from DataBreaches, they would have to pick up the phone and ask for it.

Several months later, they did. In September 2023, DataBreaches met with their CFO and IT Director in a video conference call. Neither of the employees had been employed by Ventura at the time of the breach and were first trying to understand exactly what had happened and what Ventura had done in response.  DataBreaches gave them a recap of the incident and its chronology, and arranged to securely transmit all the data from the leaks.

Today, Ventura contacted DataBreaches with a copy of the notification letter they are now mailing out to those affected.  The letter explains, in relevant part:

We are sending you this letter as part of our continuing commitment to your privacy. Recently, we became aware that a health information security breach that occurred on July 28, 2020 was more extensive than we believed at the time. The breach involved a ransomware attack on our server resulting in the exposure of a number of documents. Our initial investigation indicated that the health information of only one patient had been compromised. However, on September 13, 2023, we learned that breach involved information about a larger group of patients. The information came from the server files of a single physician and his physician assistant and was limited to the patient’s name, date of birth, and drug and laboratory testing results from 2016, 2017, and 2018. We have reason to believe that your information was among those files.

In August 2020, we took steps to investigate the incident, to notify the patient of the breach, and to prevent any such breach from recurring. This included a full internal lockdown as well as an outside security audit to ensure our electronic medical record system had not been infiltrated. We recently conducted a formal security risk assessment across all our data center facilities. We have received no evidence to suggest that any further patient information has been disclosed or breached since that time.

No social security numbers, financial account or payment card inf01mation was exposed as a result of the July 28, 2020 breach.

Ventura has also posted a notice on its website.

What a shame that HHS didn’t handle this faster, although the pandemic may have slowed things down somewhat.  For three years, patients may have had no idea their protected health information was stolen and leaked.

DataBreaches does not yet know how many patients Ventura has now notified.  Nor does DataBreaches yet know what, if anything, HHS OCR will do at this point.  Will it just close the investigation and send DataBreaches a closing letter?  Will it impose conditions on Ventura? Will there be any monetary penalty?  DataBreaches hopes it won’t take another three years to find out, but is pleased that now patients are being informed of what they should have been told three years ago.

 

 

 

 


Related:

  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
Category: Commentaries and AnalysesHealth DataOf NoteU.S.

Post navigation

← Jeffco Public Schools hit by the same threat actors that hit Clark County School District — and via the same way
Australian Clinical Labs to face court over 2022 data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.