DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

PruittHealth was hacked back in November. Here’s what we STILL don’t know.

Posted on June 7, 2024 by Dissent

What happens when threat actors leak data on the dark web but the victim entity doesn’t access it in time to figure out what was leaked? That’s what happened to PruittHealth in Georgia last year. How many people are they notifying because they can’t figure out what was accessed, acquired, or leaked? 

In November 2023, DataBreaches reported that PruittHealth had been hacked by threat actors calling themselves the NoEscape Gang. The criminals had also deployed a DDoS attack to increase the pressure on them to pay.

NoEscape claimed to have 1.5 TB of files from PruittHealth but as first reported by SuspectFile, the attackers did not provide any samples of protected health information (PHI). Neither the attackers nor PruittHealth responded to inquiries from either SuspectFile or this site. In December, DataBreaches submitted a second inquiry to PruittHealth, again asking for information about the breach. Again, there was no reply.

On May 30, 2024, PruittHealth began mailing notification letters. A copy was submitted to the Vermont Attorney General’s Office and to some other states.

PruittHealth reports that they discovered the cyberattack in November 2023. That is consistent with the threat actors’ claims that they accessed PruittHealth on November 13. By November 18, the threat actors claimed that they had already sent thousands of emails providing information about the data theft, with at least 400 of them sent to corporate email addresses. NoEscape also claimed to have made telephone contact with Randall Loggins, PruittHealth’s Chief Financial Officer.

“The hackers threatened to publish the stolen files on a ‘dark web’ blog site unless PruittHealth paid the hackers money as ransom,” the notification from Richard E. Gardner III,  Chief Compliance Officer, states.

On December 7, 2023, the hackers claimed to have published the files that they allegedly copied on their blog site. However, before PruittHealth’s forensic specialists could access the files the hackers claim to have published, the hackers’ blog site was taken down and any files that they claimed to have published were no longer accessible. As a result, PruittHealth is not able to confirm whether your information was exposed.

How quickly did PruittHealth try to access or download the leaked files when they were first leaked? Their letter is silent on that point. It is also silent on the question of whether they ever paid the attackers any ransom. PruittHealth claims:

We have performed extensive reviews of the files that were contained on the server at issue, and there is the possibility that some information related to your individual information, including potentially full or partial name, date of birth, government identification information, demographic information, contact information, home address, financial information including, Social security numbers, bank account number, health insurance information, and health information, may have been affected. While we have no evidence confirming that your information was taken, it is nevertheless possible that an unauthorized third party could have obtained this information. Therefore, we encourage you to review the attachment to this letter for additional information and steps to take with respect to potential identity theft.

Nothing in the notification samples DataBreaches found or on  PruittHealth’s website notice offers those affected complimentary credit-monitoring or identity theft restoration services.

How many were affected?

In November of 2023, when DataBreaches first became aware of this incident through its daily dark web searches, we noted this incident in an internal worksheet that tracks U.S. breaches of healthcare data.  But there has never been any update to the incident in terms of a report to HHS. A search today could find no notifications online that included any total number for the incident. Massachusetts, however, noted that 26 of its residents were reportedly affected, and Paul Bischoff reports that PruittHealth notified 5,217 South Carolina residents of the breach.

Did PruittHealth submit a notification to HHS but HHS just hasn’t posted it yet, or has PruittHealth not notified HHS yet? How many people, total, were affected by this incident?

Category: Commentaries and AnalysesHackHealth DataU.S.

Post navigation

← Numotion data breach affected 602,265 patients
Frontier Communications Hack Ensnares 750,000 Customers, SSNs Stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.