DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Grace Lutheran Communities attacked by BlackCat; employee and resident data acquired

Posted on February 19, 2024 by Dissent

Grace Lutheran Foundation, which does business as Grace Lutheran Communities in Wisconsin, offers a variety of services including rehabilitation services, assisted living, skilled nursing, independent living, adult day services, and childcare. On February 9, they posted a notice about a data breach they discovered on January 22, 2024. They emphasized that there was no indication of misuse of any data, but they also noted that their ongoing investigation had already revealed that patient information was involved: name, address, Social Security number, and health insurance information.

The same day that they posted their notice, BlackCat added Grace Lutheran to their dark web leak site.

According to BlackCat’s blog post, they acquired 70 GB of data but allegedly after a few weeks of negotiations, Grace Lutheran Communities “refused to protect data of its employees and patients/customers unfortunately. That is why these data is being shared right now to public for free.”

BlackCat’s characterization of Grace Lutheran as “refusing to protect” is misleading. A chat log provided to DataBreaches with the understanding it would not be published or quoted directly does not show Grace Lutheran refusing to pay. It showed them agreeing to pay but then asking for more time to make the payment — and the negotiations falling apart after that.

Grace Lutheran stopped responding on February 6 and posted its breach notice three days later.

DataBreaches was also given access to preview the data leak. As claimed by BlackCat, it does appear to involve both employee and resident/patient personal and sensitive information. Many files incorporated patient names and dates as part of the filenames.

 Image: DataBreaches.net

Skimming the files in the tranche, DataBreaches found clinical notes on named patients and also complete records in .pdf format. For some patients, the medical record would be hundreds of pages long in .pdf format and with personal and protected health information.  Other patient files were briefer records. Employee-related records were also spotted in the tranche.

DataBreaches sent an inquiry to Grace Lutheran on February 17. They have not replied, but appear to have silently updated their security incident notice to include:

On February 17, 2024, we learned an unauthorized actor published data relating to the incident, to possibly include the personal information of Grace Lutheran employees and residents. We are working with our cybersecurity firm to address and remediate the publication of this data. We will promptly contact any individuals affected by this or any future release of confidential information by the actor.

Based on information on its website, Grace Lutheran appears to be a HIPAA-covered entity. There is no report listed on HHS at this time, but they are still within the 60-day window to notify. According to a spokesperson for BlackCat, the attack occurred on December 22, and they gained access through phishing and social engineering.  DataBreaches could not independently confirm that claim, nor BlackCat’s description of their security as being “like a piece of cake to us.”  In response to questions from DataBreaches, the spokesperson claimed they locked the network successfully without being detected.  “Several top level employees were contacted through calls to make them talk. No patients or employees being informed yet, because of our organisation’s internal reasons.”

One of the questions DataBreaches put to BlackCat was whether they regretted not taking Grace Lutheran’s offer during negotiations.

“The sum which was demanded was based upon company’s financial documents. We are not sure whether it was their purpose to stall negotiation process or not, but it definitely took to long for them to answer every single questions, which is unacceptable in such cases,” the spokesperson replied. According to the spokesperson, the initial price had been set at $750,000.  When Grace offered $435,000, BlackCat asked for $100k more. After that, there was a bit more negotiation and repeated mentions of needing more time. And then Grace Lutheran just stopped responding.

BlackCat’s spokesperson tells DataBreaches they have sent emails once again to Grace Lutheran management, but haven’t received any reply.

 

 

 


Related:

  • Russian hackers target IVF clinics across UK used by thousands of couples
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • French agency Pajemploi reports data breach affecting 1.2M people
Category: Breach IncidentsHackHealth Data

Post navigation

← Developing: LockBit disrupted by law enforcement
Updating: In “Cronos,” law enforcement took down 34 Lockbit servers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Portugal updates cybercrime law to exempt security researchers
  • LockBit 5’s “new secure blog domain” infra leaked already
  • NL: Nuenen accidentally leaks addresses of 1,000 asylum center opponents
  • Ex-teen hackers warn parents are clueless as children steal ‘millions’
  • UK Government Considers Computer Misuse Act Revision
  • Japan issues arrest warrant against teen suspected of cyberattack using AI
  • How old is the average hacker? What does a new research report suggest? (1)
  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.