DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Texas firm exposed fetal and patient ultrasounds (updated)

Posted on December 20, 2016 by Dissent

Corpus Christi-based 4D Sound Diagnostics  (3d4dinfo.com and Bump 2 Baby & Beyond) provides elective ultrasounds for women or couples who want an image of their baby. The firm, owned by technologist Michael Rodriguez and formerly based in Louisiana, also provides ultrasound services in doctors’ offices. While many of their clients appear to be in the former group (fetal ultrasounds that are not medically necessary or ordered by physicians), a number of their patients are obtaining screening for health problems such as thyroid conditions, carotid artery issues, etc.

Unfortunately, and as we’re seeing all too often, a cloned server using the Rsync protocol was indexed by Shodan and was available to anyone and everyone because port 873 was open.

The problem was first detected by the MacKeeper Security Watch team, who discovered the problem through a Shodan search and alerted DataBreaches.net to the problem. MacKeeper’s team also attempted to alert the firm. DataBreaches.net also sent multiple alerts and notifications over a period of more than one week. The problem now appears to have been addressed, although the firm never acknowledged nor responded to any of the notifications directly. (But see below, as DataBreaches.net subsequently did hear from the firm, post-publication).

Client/Patient Information Exposed

So what was in the exposed data?  For those seeking elective ultrasounds, the files contained client/patient forms with name, date of birth, address, email address, telephone numbers, due date, how many weeks pregnant, physician’s name, method of payment, and a permission/consent form asking whether the firm could use the woman’s name and the ultrasound image on its web site or for advertising.

There appeared to be more than 1,000 patients’ files going back to 2012.

Sometimes, when abnormalities were detected, the firm would send a courtesy letter to the patient’s physician. A few of those exposed letters contained somewhat sensitive information, such as a letter to a patient’s physician indicating that the ultrasound suggested fetal demise and further testing should be considered.

Thankfully, perhaps, there did not appear to be any detailed patient financial information, credit card information, or patient SSN in the exposed files, although in some cases, partial credit card numbers used for payment were exposed. Nor were there any Medicare numbers or Medicare claim forms in the files.

Employee and Corporate Information

In addition to patient information, information about the business and Rodriguez’s personal details were also exposed. There were a number of files with bank account statements, credit card statements, mortgage loan information, and files on a child with special needs. There were also files with tax returns that included their children’s names and Social Security numbers.

Employee/contractor information included information on supervising physicians such as their names, Social Security numbers, date of birth, Medicare ID number, National Provider Identification number, and telephone number.

And yes, there was a file of plain-text passwords.

Kromtech Security, who discovered the file, and attempted to alert the firm, tells DataBreaches.net:

Based on our research, we have noticed that remote synchronization protocol (rsync) is one of the biggest cyber security threats. Cloning critical servers using unprotected RSYNC leaves data, files and folders vulnerable for ransomware, injections, or executable files. In many cases the folders are writable and can even be deleted remotely.

DataBreaches.net could find no mention of HIPAA on the web sites. In subsequent communications with Rodriguez, he indicated that none of the activities or files in the exposed files implicated HIPAA.  He also indicated that there was no indication that anyone other than Kromtech and this site had accessed the files.

Update: Post-publication, several image files were removed at Rodriguez’s request. Although personally identifiable information had been removed from the files before posting them, DataBreaches.net agreed to his request. As a result, portions of this post have been edited.


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
Category: Breach IncidentsExposureHealth Data

Post navigation

← Private Numbers Exposed – FLOW Customers’ Personal Information Inadvertently Released In Yellow Pages
Kanye West Hospital Records Breached, May Lead To UCLA Medical Center Firings →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.