DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Miami Family Medical Centre able to access/recover ransomed patient records; didn't pay ransom (UPDATED)

Posted on December 12, 2012 by Dissent

Danny Garcia reports on some good news for Miami Family Medical Centre in Australia. As I previously noted, their patient records had been encrypted by an overseas hacker who was demanding ransom to give them the encryption key:

Garcia reports that Essential IT Services, a Gold Coast based reseller, was able to get them back into their data.

One of the take-home messages from this incident was that you should not leave your backups on the same server and connected to the Internet. The medical center had backups, but they, too, had been locked.

“The backup system in place was pretty good but the recovery of the data and getting them up and running has been a bit of a job”, said Jason Fillmore, who is the managing director at the reseller firm.

Fillmore said hackers have not left a single stone unturned to make the case complicated. But, it was great to know that their client has recorded their backups on DAT as well. Work is going to repair the system, said Fillmore, who affirmed that the centre system will be fully operational by next week. It means that the centre will be back after one week, which is after two weeks of attack.

Update: Some more details on the hack and why they were able to recover data.

Category: Health Data

Post navigation

← Government Agency IT Solutions Contractor Aquilent Hacked in #ProjectWhiteFox
Details on the Jackson South Community Hospital breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Trump Rewrites Cybersecurity Policy in Executive Order
  • AMI Group – Travel & Tours notice of ransomware attack
  • Resource: Insider Threat reports
  • Za: Cyber extortionist sentenced to eight years in jail
  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit
  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.