DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Kitsap Mental Health Services breach impacted sensitive patient information (1)

Posted on December 15, 2024December 15, 2024 by Dissent

Update: DataBreaches did not spot it earlier, but on December 12, Kitsap Mental Health Services posted a notice on its website about a cyberattack that it reportedly detected on October 17, 2024. Investigation revealed that on September 17 and between October 8, 2024, and October 19, 2024, there was unauthorized access to their network and the following types of data may have been impacted: name, address, birth date, Social Security number, driver’s license or state identification number, medical diagnosis, condition, and/or treatment information, medications, claims information, financial information, and any information on an individual that was created, used, or disclosed in the course of providing health care services.

Preliminary Inspection of Data Tranche

The leaked data, if verified, appear concerning. KMHS prepared an entire PowerPoint presentation on cybersecurity last year that stressed that cybersecurity was important because “It safeguards our agency from internal and external cyber-attacks, guarantees the availability of medical services, maintains confidentiality, the integrity of patient data, and complies with industry regulations.”

Except…. they appeared to have had a security-related file connected to the internet that has 750 past and current login credentials with usernames, passwords, URLs, and notes for their important accounts. All in clear text.

And except…. they had a report on the findings of their 2024 security assessment by their contracted vendor that shows where all their vulnerabilities are.  And the report is all in clear text.

And except….  DataBreaches sees numerous scanned reports or .pdf files with protected health information on KMHS patients that include their name, address, date of birth, diagnoses, labs, medications, treatment records, SSN, health insurance information, and billing account information.  While the filenames do not include patient names or date of birth, another leaked file contains almost 50,000 patient first and last names with corresponding client IDs. There was also a directory with passport images.

Assuming for now that all of the files are real and not fake (DataBreaches has not attempted to contact any patients but KMHS did post confirmation of a cyberattack that occurred in September and October), KMHS will have a lot notifications to make to regulators and patients.

Is This a Ransomware or Extortion Group?

Most groups’ “about” pages stress that a group is financially motivated. There is no such claim on this dark web site. To the contrary, they claim, “we’re a digital watchdog operating at the intersection of cybersecurity, internet freedom, and investigative journalism. We delve into the hidden corners of the web, exposing truths and uncovering stories that are often buried by mainstream media or distorted by corporate interests.” Color DataBreaches skeptical, especially after reading their FAQ that says there are no refunds. Refunds for what? There is nothing on their site that talks about buying data or paying them for anything. So what is that refund statement about?  The blog’s pages and listings look like they were generated by AI.

The person or persons behind this web site do not provide real contact information. If they would like to get in touch wtih DataBreaches, we would like to learn more about what they are doing.

DataBreaches has emailed KMHS to inquire whether they received any extortion demand, and if so, how they have responded.

This post was updated to report that KMHS had confirmed a data breach and that DataBreaches had now sent a follow-up inquiry.

Category: Commentaries and AnalysesHealth DataHIPAAU.S.

Post navigation

← Boston University and Feds Investigating Hacking of Framingham Heart Study Data
Clop ransomware claims responsibility for Cleo data theft attacks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Fraudsters, murderers, students: who the GRU assembled a team of hacker provocateurs from and why it failed
  • Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack
  • Lower Merion School District says a data breach was caused by a computer glitch
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.