DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Grace Lutheran Communities attacked by BlackCat; employee and resident data acquired

Posted on February 19, 2024 by Dissent

Grace Lutheran Foundation, which does business as Grace Lutheran Communities in Wisconsin, offers a variety of services including rehabilitation services, assisted living, skilled nursing, independent living, adult day services, and childcare. On February 9, they posted a notice about a data breach they discovered on January 22, 2024. They emphasized that there was no indication of misuse of any data, but they also noted that their ongoing investigation had already revealed that patient information was involved: name, address, Social Security number, and health insurance information.

The same day that they posted their notice, BlackCat added Grace Lutheran to their dark web leak site.

According to BlackCat’s blog post, they acquired 70 GB of data but allegedly after a few weeks of negotiations, Grace Lutheran Communities “refused to protect data of its employees and patients/customers unfortunately. That is why these data is being shared right now to public for free.”

BlackCat’s characterization of Grace Lutheran as “refusing to protect” is misleading. A chat log provided to DataBreaches with the understanding it would not be published or quoted directly does not show Grace Lutheran refusing to pay. It showed them agreeing to pay but then asking for more time to make the payment — and the negotiations falling apart after that.

Grace Lutheran stopped responding on February 6 and posted its breach notice three days later.

DataBreaches was also given access to preview the data leak. As claimed by BlackCat, it does appear to involve both employee and resident/patient personal and sensitive information. Many files incorporated patient names and dates as part of the filenames.

 Image: DataBreaches.net

Skimming the files in the tranche, DataBreaches found clinical notes on named patients and also complete records in .pdf format. For some patients, the medical record would be hundreds of pages long in .pdf format and with personal and protected health information.  Other patient files were briefer records. Employee-related records were also spotted in the tranche.

DataBreaches sent an inquiry to Grace Lutheran on February 17. They have not replied, but appear to have silently updated their security incident notice to include:

On February 17, 2024, we learned an unauthorized actor published data relating to the incident, to possibly include the personal information of Grace Lutheran employees and residents. We are working with our cybersecurity firm to address and remediate the publication of this data. We will promptly contact any individuals affected by this or any future release of confidential information by the actor.

Based on information on its website, Grace Lutheran appears to be a HIPAA-covered entity. There is no report listed on HHS at this time, but they are still within the 60-day window to notify. According to a spokesperson for BlackCat, the attack occurred on December 22, and they gained access through phishing and social engineering.  DataBreaches could not independently confirm that claim, nor BlackCat’s description of their security as being “like a piece of cake to us.”  In response to questions from DataBreaches, the spokesperson claimed they locked the network successfully without being detected.  “Several top level employees were contacted through calls to make them talk. No patients or employees being informed yet, because of our organisation’s internal reasons.”

One of the questions DataBreaches put to BlackCat was whether they regretted not taking Grace Lutheran’s offer during negotiations.

“The sum which was demanded was based upon company’s financial documents. We are not sure whether it was their purpose to stall negotiation process or not, but it definitely took to long for them to answer every single questions, which is unacceptable in such cases,” the spokesperson replied. According to the spokesperson, the initial price had been set at $750,000.  When Grace offered $435,000, BlackCat asked for $100k more. After that, there was a bit more negotiation and repeated mentions of needing more time. And then Grace Lutheran just stopped responding.

BlackCat’s spokesperson tells DataBreaches they have sent emails once again to Grace Lutheran management, but haven’t received any reply.

 

 

 


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
Category: Breach IncidentsHackHealth Data

Post navigation

← Developing: LockBit disrupted by law enforcement
Updating: In “Cronos,” law enforcement took down 34 Lockbit servers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • BlackSuit ransomware site seized as part of Operation Checkmate
  • The day after XSS.is forum was seized, it struggles to come back online — but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders
  • Paying cyberattackers is wrong, right? Should Taos County’s incident be an exception? (1)
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report