DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Double trouble: DoctorsToYou has not one, but two data security incidents to address

Posted on October 17, 2024 by Dissent

On Wednesday, the RansomHub ransomware group added a listing for DoctorsToYou in New York to their leak site. Their listing included several screencaps that revealed personally identifiable information (PII) and protected health information (PHI). Some of the files specifically showed their name or letterhead. The listing did not indicate how many GB of data RansomHub may have exfiltrated.

After checking DoctorsToYou’s website and realizing it was a non-profit organization serving often-underserved populations, DataBreaches reviewed RansomHub’s site to see if it said anything about avoiding hitting the medical sector.

It did, so yesterday morning, DataBreaches messaged RansomHub on Tox:

Your “about” page says, “We do not allow non-profit hospitals and some non-profit organizations be targeted.”

Why did you hit the non-profit “DoctorsToYou.com?” They focus on helping the elderly, veterans, and disabled people in their homes. They don’t even accept insurance or anything. They ask people to make pledges to donate to help the non-profit help other people in need of care.

Did you really encrypt them and demand an extortion payment?

Jeez…. have a heart.

Dissent from DataBreaches.net

Although their account appeared to be online, they did not respond directly. Yet less than an hour later, the listing on their site was removed.

A few hours later, DataBreaches messaged RansomHub again:

How about doing the right thing and giving these folks the decryptor?

This morning, RansomHub responded with a one-word reply:

will

DataBreaches hopes RansomHub does follow through on that. DataBreaches thanked them for their response and wants to publicly acknowledge their response.

But Ransomware Wasn’t DoctorsToYou’s Only Problem

When DataBreaches mentioned the attack on DoctorsToYou yesterday morning on infosec.exchange, the researcher known as @Chum1ng0 reached out on Telegram to say that he had been trying since August to get DoctorsToYou to secure a data leak that was exposing about 13,000 patient files. Chum1ng0 provided DataBreaches with copies of his responsible disclosure emails that had gone unanswered.

So yesterday, DataBreaches emailed DoctorsToYou a few times to update them about RansomHub’s actions and to reinforce Chum1ng0’s attempt to get them to secure their unsecured patient data in the unrelated leak.

No replies have been received as of publication and the exposed patient data remains exposed.

About DoctorsToYou

DoctorsToYou is a concierge service somewhat unlike other services. DoctorsToYou, founded by Dr. Ernest Brown, is based in the D.C. metropolitan area and provides urgent care, preventive care,  and long-term care to the elderly, veterans, and disabled patients in their homes. DoctorsToYou does not accept insurance, and they seem to have a pay-it-forward approach to being paid. From their website FAQ:

How much do your services cost?

All proceeds for the care we provide go directly to support the mission for Humans for Healthcare (www.h4-h.org), a 501c3 charitable organization dedicated to providing house calls to the elderly, veterans and disabled here in Washington, DC. When you submit a request, we determine what service we can provide and once all services have been rendered you will receive a pledge based on those services.

Now that is impressive. DataBreaches hopes they pay attention to the emails and lock down their patient data and storage.

Category: Commentaries and AnalysesExposureHealth DataMalwareOf NoteU.S.

Post navigation

← Radiant Capital Halts Lending After $50+ Million Security Breach; Compounded by Ancilia Goof
FBI Arrests Alabama Man in the January 2024 SEC X Hack that Spiked the Value of Bitcoin →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.