DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

In the midst of restructuring, Guardian Healthcare hit by ransomware attack

Posted on November 8, 2024November 8, 2024 by Dissent

A recent article on the cybersecurity risks posed by mergers and acquisitions begins:

When companies merge, it creates significant cybersecurity challenges in two main ways: firstly, challenges arise in integrating disparate security infrastructures, and secondly, an M&A transaction brings together diverse organizational cultures which presents its own challenges from a cyber perspective. Yet the limited involvement of IT and cybersecurity within M&A teams can lead to cybersecurity considerations taking a back seat early in the process, potentially resulting in unforeseen vulnerabilities and risks.

Guardian Healthcare in Pennsylvania was going through restructuring when they became the victim of a ransomware attack by someone using Stormous ransomware. And when they didn’t pay the threat actors’ demands by mid-October, Stormous leaked 3 GB of files, many of which contain protected health information (PHI) of patients. The leak does not appear to include the EMR system or entire databases, but it does include a lot of individual files with sensitive information — files that appear to trigger notification requirements under HIPAA.

Finding nothing on Guardian Healthcare’s website that indicated they were aware of any breach or were responding to it, DataBreaches reached out to them via email on Wednesday. DataBreaches asked them if they were aware of the apparent breach, and if so, what were they doing in response. In case they were not aware they had been breached, the email included a link to the data tranche and some text from some of the files.

Guardian Healthcare did not reply, but DataBreaches asked Stormous some questions about the incident. One of the questions this site posed was whether Guardian had been targeted because it was undergoing restructuring and might be more vulnerable to attack. The spokesperson for Stormous was unable to answer that, saying, “Perhaps it’s not about that, or it depends on the concept or approach of the person affiliated with our RaaS.” In other words, they did not know why the affiliate targeted Guardian. But the spokesperson did say that the affiliate first gained access to several accounts through Office, impersonating accounts to target a list of key employees there or in groups that had been created by Guardian.

“Some accesses were successful while others failed, and 7GB of data was extracted, with 3GB being somewhat important and subsequently leaked,” the spokesperson told DataBreaches. They added that Guardian did know about the breach and there was some contact with them, “but they did not respond significantly to the incident, so the final solution was to leak the data.”

Stormous also confirmed that Guardian’s files were encrypted during the attack.

Does Guardian have usable backups, or has some patient data been corrupted or lost because of the attack? We do not know because Guardian has not issued any statement or preliminary notice about the incident. And of course, the affected patients likely have no idea that their data has been publicly leaked.

DataBreaches will update this post if more information becomes available.

Category: Health DataMalwareU.S.

Post navigation

← Germany drafts law to protect researchers who find security flaws
Still in the dark: A “500 marker” is updated, but too many still aren’t. Is HHS doing anything about this?? →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism
  • Kenyan court orders Worldcoin to delete all biometric data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.