DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

PruittHealth was hacked back in November. Here’s what we STILL don’t know.

Posted on June 7, 2024 by Dissent

What happens when threat actors leak data on the dark web but the victim entity doesn’t access it in time to figure out what was leaked? That’s what happened to PruittHealth in Georgia last year. How many people are they notifying because they can’t figure out what was accessed, acquired, or leaked? 

In November 2023, DataBreaches reported that PruittHealth had been hacked by threat actors calling themselves the NoEscape Gang. The criminals had also deployed a DDoS attack to increase the pressure on them to pay.

NoEscape claimed to have 1.5 TB of files from PruittHealth but as first reported by SuspectFile, the attackers did not provide any samples of protected health information (PHI). Neither the attackers nor PruittHealth responded to inquiries from either SuspectFile or this site. In December, DataBreaches submitted a second inquiry to PruittHealth, again asking for information about the breach. Again, there was no reply.

On May 30, 2024, PruittHealth began mailing notification letters. A copy was submitted to the Vermont Attorney General’s Office and to some other states.

PruittHealth reports that they discovered the cyberattack in November 2023. That is consistent with the threat actors’ claims that they accessed PruittHealth on November 13. By November 18, the threat actors claimed that they had already sent thousands of emails providing information about the data theft, with at least 400 of them sent to corporate email addresses. NoEscape also claimed to have made telephone contact with Randall Loggins, PruittHealth’s Chief Financial Officer.

“The hackers threatened to publish the stolen files on a ‘dark web’ blog site unless PruittHealth paid the hackers money as ransom,” the notification from Richard E. Gardner III,  Chief Compliance Officer, states.

On December 7, 2023, the hackers claimed to have published the files that they allegedly copied on their blog site. However, before PruittHealth’s forensic specialists could access the files the hackers claim to have published, the hackers’ blog site was taken down and any files that they claimed to have published were no longer accessible. As a result, PruittHealth is not able to confirm whether your information was exposed.

How quickly did PruittHealth try to access or download the leaked files when they were first leaked? Their letter is silent on that point. It is also silent on the question of whether they ever paid the attackers any ransom. PruittHealth claims:

We have performed extensive reviews of the files that were contained on the server at issue, and there is the possibility that some information related to your individual information, including potentially full or partial name, date of birth, government identification information, demographic information, contact information, home address, financial information including, Social security numbers, bank account number, health insurance information, and health information, may have been affected. While we have no evidence confirming that your information was taken, it is nevertheless possible that an unauthorized third party could have obtained this information. Therefore, we encourage you to review the attachment to this letter for additional information and steps to take with respect to potential identity theft.

Nothing in the notification samples DataBreaches found or on  PruittHealth’s website notice offers those affected complimentary credit-monitoring or identity theft restoration services.

How many were affected?

In November of 2023, when DataBreaches first became aware of this incident through its daily dark web searches, we noted this incident in an internal worksheet that tracks U.S. breaches of healthcare data.  But there has never been any update to the incident in terms of a report to HHS. A search today could find no notifications online that included any total number for the incident. Massachusetts, however, noted that 26 of its residents were reportedly affected, and Paul Bischoff reports that PruittHealth notified 5,217 South Carolina residents of the breach.

Did PruittHealth submit a notification to HHS but HHS just hasn’t posted it yet, or has PruittHealth not notified HHS yet? How many people, total, were affected by this incident?

Related posts:

  • Kept in the Dark — Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
Category: Commentaries and AnalysesHackHealth DataU.S.

Post navigation

← Numotion data breach affected 602,265 patients
Frontier Communications Hack Ensnares 750,000 Customers, SSNs Stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.