DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Pediatric Urology Associates was allegedly locked and hacked. What are they doing about it?

Posted on June 28, 2024June 28, 2024 by Dissent

There has been a proliferation of new ransomware or hacking groups in the past six months, and some of them are still flying under the media radar. One of those groups is the dAn0n Hacker Group.

On March 26, dAn0n added Pediatric Urology Associates (“PUA”) to their leak site. On April 25, an updated listing with some screencaps claimed that they had exfiltrated 740 GB of information.

dAn0n did not leak 740 GB of information, but they have already leaked a compressed archive 16.76 GB in size that includes internal documents. A second compressed archive that they leaked is 662 MB in size and includes patient information.

Files in the second archive screened by DataBreaches included surgical booking slips that included patients’ name, address, date of birth, address, parents’ names and information, insurance information, diagnosis, and other medical information. Some files included very sensitive photos with file names or folder names that could link to a specific patient.

Some files viewed by DataBreaches contained more than one patient’s name, such as files with lists of patients with full names and dates of birth. There was no indication in what has been leaked so far that the threat actors accessed any EMR system.

What We Don’t Know

Unable to find any website notice, press release, or submission by PUA to any state regulator or HHS, DataBreaches reached out to PUA via their website to ask about their response to the breach and what appears to be protected health information of minor children. No reply has been received.

With further investigation, DataBreaches discovered that although PUA’s website does not link to NYU Langone, a November 2023 press release from NYU Langone noted they had acquired PUA and its 10 office locations. DataBreaches emailed NYU Langone to ask whether they knew about the alleged attack and whether they could provide any details. No reply has been received.

With both PUA and NYU Langone failing to reply to inquiries, we do not have firm confirmation of what appears to be a reportable breach under HIPAA. Nor do we know the scope of any breach or what the victim entity has done in response.

dAn0n’s Claims

DataBreaches also emailed dAn0n, who was willing to answer some questions. Through the email exchange, DataBreaches was told that dAn0n first gained access to PUA’s network in January 2023 (and no, that was not a typo, they said). dAn0n claims they deployed ransomware on March 23, 2024 and then notified PUA employees by email and WhatsApp on March 26, 2024.

dAn0n would not answer a question about how much they demanded as ransom, but they were willing to state that they used a custom exploit to gain access. According to dAn0n’s spokesperson, PUA never detected them in their network. The hackers no longer have access.

PUA allegedly never responded to dAn0n’s demands or attempted to negotiate with them. DataBreaches asked dAn0n whether they had really contacted any patients or regulators as their leak site listing suggested they might do when victims fail to respond or negotiate.  The spokesperson responded “yes,” but did not elaborate and DataBreaches did not have sufficient information to try to confirm that claim.

Tick Tock?

If PUA or NYU Langone PUA was compromised on March 23 and contacted on March 26 and informed they had been hacked and encrypted, why has there been no media statement, substitute notice, or submission by PUA or NYU Langone PUA? That entities do not always comply with notification requirements no later than 60 calendar days from the discovery of a breach is not surprising. But there is no notice anywhere and no response to multiple inquiries.

If dAn0n Hacker Group has told the truth, patients seen at PUA locations are being left in the dark while their protected health information or child’s protected health information has been freely available for months already.

This post will be updated if NYU Langone or PUA respond.

Category: Health DataMalwareU.S.

Post navigation

← Judge denies motion to dismiss cybersecurity lawsuit against Clark County schools
Remote access giant TeamViewer says Russian spies hacked its corporate network →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.