DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

McLaren provides written notice to 743,131 patients after ransomware attack in July 2024

Posted on June 22, 2025June 22, 2025 by Dissent

On August 5, 2024, McLaren Healthcare became aware of suspicious activity affecting McLaren Health Care and Karmanos Cancer Institute computer systems. In an early statement about the incident, McLaren indicated that the attack affected IT systems across its 13 hospitals, cancer treatment centers, surgery centers, and clinics. In an August 12 update, McLaren reported that in response to the incident, some of their locations had diverted ambulances to nearby facilities for certain conditions. Some patients reported that their appointments were delayed or rescheduled because of the attack, which had occurred between July 17, 2024, and August 5, 2024, and employees reported that they were not being paid properly.

Although McLaren and Karmanos provided updates and established a call center to assist patients, it is only now that McLaren has disclosed for the first time that 743,131 patients were affected by the attack.

In a June 20, 2025, notification to the Maine Attorney General’s Office, McLaren reported that the types of information that could have been involved include name, Social Security number, driver’s license number, medical information, and health insurance information. Those affected have been offered access to credit monitoring services for twelve (12) months, through IDX.

What the Notification Doesn’t Explain

The notification letter never clearly acknowledges that this was a ransomware attack by INC Ransom that involved encryption, but a copy of the ransom note received by Karmanos was posted on X.com on August 5, 2024, the same day McLaren reports that they became aware of the attack.

DataBreaches tested the “Personal ID” and found that the INC Ransom site did recognize it as a valid Personal ID. DataBreaches did not attempt to login, however.

==~ INC Ransom ~~~-----> Your data is stolen and encrypted. If you don't pay the ransom, the data will be published on our TOR darknet site: The sooner you pay the ransom, the sooner your company will be safe. Tor Browser Link: http: //incblog6qudydmmad zvwSnrmue6gbwtgj sxpw6b7ixzssu36tsaj doad -Onion/ http: //incblog7vmugq7rktic73rahad757m3ptym37tyvifzp2roedyyzzxid. onion/ Link for normal browser: http://incapt.su/ -----> What guarantees are that we won't fool you? p We are not a politically motivated group and we want nothing more than money. b If you pay, we will provide you with decryption software and destroy the stolen After you pay the ransom, you will quickly restore your systems and make even mo | Treat this situation simply as a paid training for your system administrators, b § Our pentest services should be paid just like you pay the salaries of your syste ) If we don't give you a decryptor or delete your data after you pay, no one will ; You can get more information about us on Twitter https://twitter.com/hashtag/inc -----> You need to contact us on TOR darknet sites with your personal ID Download and install Tor Browser https: //www.torproject.org/ # : Write to the chat room and wait for an answer, we'll guarantee a response from y : ghia = Sometimes you will have to wait some time for our reply, this is because we have i Tor Browser Link for chat: be http: //incpaykabj ge2mtdxq6c23ngh4x6msdkpss fr6vgdkgzpsn ssxégkid.onion/ personal ID: 66b080bc4b30850609e32824 =----> Warning! Don't delete or modify encrypted files, it will lead to problems ~-—-——> Don't go to the police or the FBI for help. They won't help you. The police will try to prohibit you from paying the ransom in any way. The first thing they will tell you is that there's no guarantee to decrypt your This 1s not true, we can do a test decryption before Paying and your data will b Paying the ransom to us is much cheaper and more profitable than paying fines an The police and the FBI don't care what losses you suffer as a result of our atta If you're worried that someone will trace your bank transfers, you can easily bu The police and FBI won't be able to stop lawsuits from your customers for leakin Sy The police and FBI won't protect you from repeated attacks. §5> Don't go to recovery companies! They are essentially just middlemen who will make money off you and cheat you. We are well aware of cases where recovery companies tell you that the ransom pri If you approached us directly without intermediaries you would pay several times -----> For those who have cyber insurance against ransomware attacks. Insurance companies require you to keep your insurance information secret. In most cases, we find this information and download it. -----> If you do not pay the ransom, we will attack Your company again in the fu
Ransom note by INC ransom was posted on X.com. Image credit: @thomasbarzaf

Second Ransomware Attack in One Year

The July 2024 ransomware attack was the second ransomware incident McLaren experienced in a year. In October 2023, McLaren notified HHS after a ransomware attack with encryption by AlphV (BlackCat). The incident was reported to HHS as affecting “501” patients, a placeholder entry indicating that McLaren did not yet know the total number of affected patients. The number of patients affected was subsequently updated to HHS as 2,103,881.

Based on BlackCat’s blistering attack on the health system and the data that they leaked as proof of claims (archived image), McLaren apparently did not pay BlackCat’s demands.

How did INC Ransom gain access to McLaren? Was it via the same method(s) as the 2023 attack by BlackCat? We do not know that, either.

And did McLaren decide to pay INC Ransom for fear of the reputation damage a second big breach might cause or because of the interference with patient care? Or did they decide not to pay? Their notification makes no mention at all of any extortion or ransom demands, but INC Ransom did not wind up listing McLaren or Karmanos on their leak site and did not leak their data,  which may be our only indication from INC Ransom that their victim paid.

DataBreaches emailed McLaren and Karmanos to ask whether they paid INC Ransom to secure a decryption key and/or to get assurances of data deletion (although we know those can’t be trusted). No reply was immediately available, but this post will be updated if a reply is received or more information on this point becomes available.

If any employee with knowledge of the ransom payment issue cares to reach out, please contact this site by email to tips@databreaches[.]net — just remove the brackets. 

Category: Breach IncidentsHealth DataMalware

Post navigation

← A state forensics lab was leaking its files. Getting it locked down involved a number of people.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • McLaren provides written notice to 743,131 patients after ransomware attack in July 2024
  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.
  • CoinMarketCap Hacked, Scrambles to Remove Malicious Wallet Verification Popup
  • Montana Attorney General launches investigation into Lee Enterprises data breach
  • AT&T gets preliminary approval for $177 million data breach settlement
  • Aflac notifies SEC of breach suspected to be work of Scattered Spider
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news (Updated)
  • Tonga’s health system hit by cyberattack (1)
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.