DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ransomware group leaks data allegedly from Granger Medical Clinic

Posted on November 26, 2023 by Dissent

On November 24, the NoEscape ransomware group added Granger Medical Clinic in Utah to their leak site.

As proof, NoEscape provided a filetree and screenshots. The filetree listed numerous files related to facilities and other internal documents, including  files whose names appeared to relate to former and current providers and personnel. Some filenames suggested they would contain confidential information including disciplinary actions and terminations as well as Family Medical Leave Act (FMLA) documentation for employees.

The screenshots provided included some employee files and internal documents.

NoEscape wrote on their listing:

The company’s network was successfully encrypted and compromised.
After lengthy negotiations, the guys made their choice.
We have more then 35GB sensitive data, such as:
Confidential agreements and contracts, NDA.
More than two thousand documents on dismissal and the right to employment of employees, as well as personal data of patients which contain data such as First last name\dob\adress\city\state\zip\mail\pthone\ we also have more than 2 thousand passports and tens of thousands of SSN cards!!!
Audits, reports, finance, databases, budget, banking! Letters, insurance, Credentialing, licenses, payments, invoices, Payroll and tens of thousands of other confidential and important documents, the leakage of which will lead to multi-million dollar losses.

From the above, it sounds like there were negotiations that fell apart and Granger decided not to pay. NoEscape’s message ended:

You only have one chance and that is to pay us $700,000 within 24 hours or within 24 hours we will publish here absolutely all the data we have.

NoEscape’s notice does not indicate when they first accessed or compromised Granger.

The listing, posted on November 24, was still there when DataBreaches checked on November 25, but this morning, the last threatening line had been removed and replaced with a single word:  “Bye!”  and NoEscape leaked more than 31 GB of files in a multi-part leak.

DataBreaches has not yet acquired all the data to attempt to determine what is in the leak, whether there is any patient data in there, and if so, how much.  Given how slow the download speed is and how many parts there are to download, it will take considerable time.

DataBreaches sent email inquiries to Granger yesterday and today but has received no reply as yet. This post will be updated when more information becomes available.

 

Category: Artificial IntelligenceBreach Incidents

Post navigation

← IBM, Johnson & Johnson Hit With Second Health Data Breach Suit
Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.