DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ransomware group leaks data allegedly from Granger Medical Clinic

Posted on November 26, 2023 by Dissent

On November 24, the NoEscape ransomware group added Granger Medical Clinic in Utah to their leak site.

As proof, NoEscape provided a filetree and screenshots. The filetree listed numerous files related to facilities and other internal documents, including  files whose names appeared to relate to former and current providers and personnel. Some filenames suggested they would contain confidential information including disciplinary actions and terminations as well as Family Medical Leave Act (FMLA) documentation for employees.

The screenshots provided included some employee files and internal documents.

NoEscape wrote on their listing:

The company’s network was successfully encrypted and compromised.
After lengthy negotiations, the guys made their choice.
We have more then 35GB sensitive data, such as:
Confidential agreements and contracts, NDA.
More than two thousand documents on dismissal and the right to employment of employees, as well as personal data of patients which contain data such as First last name\dob\adress\city\state\zip\mail\pthone\ we also have more than 2 thousand passports and tens of thousands of SSN cards!!!
Audits, reports, finance, databases, budget, banking! Letters, insurance, Credentialing, licenses, payments, invoices, Payroll and tens of thousands of other confidential and important documents, the leakage of which will lead to multi-million dollar losses.

From the above, it sounds like there were negotiations that fell apart and Granger decided not to pay. NoEscape’s message ended:

You only have one chance and that is to pay us $700,000 within 24 hours or within 24 hours we will publish here absolutely all the data we have.

NoEscape’s notice does not indicate when they first accessed or compromised Granger.

The listing, posted on November 24, was still there when DataBreaches checked on November 25, but this morning, the last threatening line had been removed and replaced with a single word:  “Bye!”  and NoEscape leaked more than 31 GB of files in a multi-part leak.

DataBreaches has not yet acquired all the data to attempt to determine what is in the leak, whether there is any patient data in there, and if so, how much.  Given how slow the download speed is and how many parts there are to download, it will take considerable time.

DataBreaches sent email inquiries to Granger yesterday and today but has received no reply as yet. This post will be updated when more information becomes available.

 

Related posts:

  • Mulkay Cardiology Consultants notifies almost 80,000 of ransomware attack
  • Two more attacks involving sensitive data: a plastic surgery center in Brazil and a psychiatric hospital in Lithuania
  • NoEscape gang adds two more medical entities to their leak site
Category: Artificial IntelligenceBreach Incidents

Post navigation

← IBM, Johnson & Johnson Hit With Second Health Data Breach Suit
Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Terrible tales of opsec oversights: How cybercrooks get themselves caught
  • International Criminal Court hit with cyber attack during NATO summit
  • Pembroke Regional Hospital reported canceling appointments due to service delays from “an incident”
  • Iran-linked hackers threaten to release emails allegedly stolen from Trump associates
  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.