DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

PruittHealth was hacked back in November. Here’s what we STILL don’t know.

Posted on June 7, 2024 by Dissent

What happens when threat actors leak data on the dark web but the victim entity doesn’t access it in time to figure out what was leaked? That’s what happened to PruittHealth in Georgia last year. How many people are they notifying because they can’t figure out what was accessed, acquired, or leaked? 

In November 2023, DataBreaches reported that PruittHealth had been hacked by threat actors calling themselves the NoEscape Gang. The criminals had also deployed a DDoS attack to increase the pressure on them to pay.

NoEscape claimed to have 1.5 TB of files from PruittHealth but as first reported by SuspectFile, the attackers did not provide any samples of protected health information (PHI). Neither the attackers nor PruittHealth responded to inquiries from either SuspectFile or this site. In December, DataBreaches submitted a second inquiry to PruittHealth, again asking for information about the breach. Again, there was no reply.

On May 30, 2024, PruittHealth began mailing notification letters. A copy was submitted to the Vermont Attorney General’s Office and to some other states.

PruittHealth reports that they discovered the cyberattack in November 2023. That is consistent with the threat actors’ claims that they accessed PruittHealth on November 13. By November 18, the threat actors claimed that they had already sent thousands of emails providing information about the data theft, with at least 400 of them sent to corporate email addresses. NoEscape also claimed to have made telephone contact with Randall Loggins, PruittHealth’s Chief Financial Officer.

“The hackers threatened to publish the stolen files on a ‘dark web’ blog site unless PruittHealth paid the hackers money as ransom,” the notification from Richard E. Gardner III,  Chief Compliance Officer, states.

On December 7, 2023, the hackers claimed to have published the files that they allegedly copied on their blog site. However, before PruittHealth’s forensic specialists could access the files the hackers claim to have published, the hackers’ blog site was taken down and any files that they claimed to have published were no longer accessible. As a result, PruittHealth is not able to confirm whether your information was exposed.

How quickly did PruittHealth try to access or download the leaked files when they were first leaked? Their letter is silent on that point. It is also silent on the question of whether they ever paid the attackers any ransom. PruittHealth claims:

We have performed extensive reviews of the files that were contained on the server at issue, and there is the possibility that some information related to your individual information, including potentially full or partial name, date of birth, government identification information, demographic information, contact information, home address, financial information including, Social security numbers, bank account number, health insurance information, and health information, may have been affected. While we have no evidence confirming that your information was taken, it is nevertheless possible that an unauthorized third party could have obtained this information. Therefore, we encourage you to review the attachment to this letter for additional information and steps to take with respect to potential identity theft.

Nothing in the notification samples DataBreaches found or on  PruittHealth’s website notice offers those affected complimentary credit-monitoring or identity theft restoration services.

How many were affected?

In November of 2023, when DataBreaches first became aware of this incident through its daily dark web searches, we noted this incident in an internal worksheet that tracks U.S. breaches of healthcare data.  But there has never been any update to the incident in terms of a report to HHS. A search today could find no notifications online that included any total number for the incident. Massachusetts, however, noted that 26 of its residents were reportedly affected, and Paul Bischoff reports that PruittHealth notified 5,217 South Carolina residents of the breach.

Did PruittHealth submit a notification to HHS but HHS just hasn’t posted it yet, or has PruittHealth not notified HHS yet? How many people, total, were affected by this incident?

Category: Commentaries and AnalysesHackHealth DataU.S.

Post navigation

← Numotion data breach affected 602,265 patients
Frontier Communications Hack Ensnares 750,000 Customers, SSNs Stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report