DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY: Equinox notifies clients and employees of April data security incident

Posted on November 18, 2024November 18, 2024 by Dissent

On November 15, Equinox notified clients and staff members about what they described as a data security incident on April 29. With a little digging, DataBreaches realized that it was an attack by LockBit3.0.

Equinox is a human services organization that serves clients in the capital region of New York State, providing services to 3,500 people annually in 10 locations, including residential facilities.  According to their website, they serve youth, adults, and families whose lives have been impacted by domestic violence, drug and alcohol addictions, mental health disorders, homelessness, and the challenges of living amid poverty and violence. Equinox works collaboratively with numerous community organizations.

In a substitute notice on its website, Equinox states that the incident disrupted access to some of its network resources, but it does not state whether this was a ransomware attack or if it involved any encryption of any files. On May 18, however, LockBit3.0 added Equinox to its leak site, and on August 11, they updated the listing, giving Equinox until August 25 to respond. LockBit eventually leaked 31.8 GB of files from Equinox.

Equinox’s breach notification letter does not mention that data was actually leaked by any threat actor(s). What it does disclose is that the types of information that may have been accessed or exfiltrated without authorization included name, address, date of birth, Social Security number, driver’s license or other government identification number, passport number, financial account information, health insurance information, medical treatment or diagnosis information, and/or medication-related information.

As in many other breaches, the type of information varied by individual, and as in too many other breaches, inspection of a file tree reveals that in addition to recent data, the data tranche included files with personal or protected health information that was more than a decade old.

The total number of people affected by this breach has not yet been publicly reported, and as of publication, no submission to HHS OCR has yet shown up on HHS’s public breach tool.

This post was corrected to show that LockBit first added Equinox to its site on May 18, 2024. A previous version incorrectly reported it as May 24. 

 

 


Related:

  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Large medical lab in South Africa suffers multiple data breaches
  • From bad to worse: Doctor Alliance hacked again by same threat actor (2)
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
Category: Breach IncidentsHealth DataMalware

Post navigation

← T-Mobile confirms it was hacked in recent wave of telecom breaches
CISA Director Jen Easterly to depart on Inauguration Day →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How old is the average hacker? What does a new research report suggest? (1)
  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.
  • How a noisy ransomware intrusion exposed a long-term espionage foothold
  • KR: Hacking scheme targeted 120,000 home cameras for sexual footage

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.