DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WY: Hospital scammed for employee information (updated with other W-2 phishing incidents)

Posted on January 26, 2017 by Dissent

Update Feb. 2, 2017: The list for 2017 has been moved to its own post that will be updated as more incidents are reported.

Original post:

First it was Dracut Schools. Then it was Tipton County Schools and then Odessa School District whose employees had their SSN and information from W-2 forms acquired by criminals in phishing attacks. And now there’s another successful W-2 phishing attack. Kathy Brown reports:

Social Security numbers and W-2 information for about 1,400 employees who worked over the past year at Campbell County Health were mistakenly released sometime Wednesday to someone impersonating a hospital executive.

Read more on Gillette News Record.

  • Update: Add Marin Software to this year’s list (is anyone creating one?) of entities whose employee W-2 data was compromised by a phishing attack.
  • Update 2: And now add 1,900 employees at UGI Utilities.
  • Update 3: And now add employees of Sunrun.
  • Update 4: And add Lexington School District Two in SC.
  • Update 5: And add Mercedes ISD in Texas.

I’ll just skip the “UPDATE” prefaces and keep going, huh? …

  • eHealthInsurance (eHealth, Inc.)
  • Kuhana Associates
  • Point Coupee Hospital
  • Morton School District (IL)
  • Scotty’s Brewhouse (IN)
  • Mitchell Gold + Bob Williams
  • Persante
  • TransPerfect 
  • Davidson County Schools (NC)

Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Health DataOf NotePhishingU.S.

Post navigation

← Patient claims identity stolen after confidential files compromised at DC social services agency
NYS A.G. Schneiderman Announces Settlement With Acer After Data Breach Exposed More Than 35,000 Credit Card Numbers →

2 thoughts on “WY: Hospital scammed for employee information (updated with other W-2 phishing incidents)”

  1. Regret says:
    January 30, 2017 at 1:55 pm

    THE 12-STEP PROGRAM FOR PHISHING

    STEP 1: prole opens e-mail message at 12:01am from company CEO, who has never communicated with said prole before:

    From: You’re Boss
    To: Miss Cellanious
    Subject: W-2 Request for all employees’ W2

    Dear Mis Cellanious: It is URGENT that you send me list of W-2 copy of employees wage and tax statement for 2015 I need them in PDF file type you can send it as an attachment kindly prepare the lists and email them to me asap.

    STEP 2: prole responds to message promptly, including the data as a PDF and Excel worksheet to demonstrate prole be working extra hard.

    STEP 3: affected employee complains to supervisor; nothing happens
    STEP 4: affected employee complains to supervisor; nothing happens
    STEP 5: affected employee complains to supervisor; nothing happens
    STEP 6: affected supervisor complains to VP; nothing happens
    STEP 7: affected supervisor complains to VP; nothing happens
    STEP 8: affected VP complains to EVP; EVP sends email to IT Tech, nothing happens
    STEP 9: IT Tech receives warning that IT Tech’s identity may have been compromised.
    STEP 10: IT Tech researches matter; phishing email discovered
    STEP 11: PR department notified, issues press release:

    “We take this matter and the security of personal information very seriously and we will continue to review and enhance our security practices to further secure our systems. We will be offering identity protection services to those employees affected from what we describe as a leading identity monitoring service.”

    STEP 12: prole opens e-mail message at 12:01am from company CEO, who has never communicated with said prole before.

  2. Anonymous says:
    February 2, 2017 at 7:23 am

    few more I don’t see noted here:
    1/27/2017 TransPerfect (NY/DE) ~3000 http://www.delawareonline.com/story/money/2017/01/27/transperfect-workers-victimized-data-breach/97129850/
    2/1/2017 Davidson County Schools (NC) 1/31/2017 http://myfox8.com/2017/02/01/davidson-county-sheriffs-office-investigating-email-spoofing-attack-involving-school-system-employees-w-2s/
    2/2/2017 Dare County Schools (NC) http://wnct.com/2017/02/02/dare-county-sheriffs-office-warns-school-employees-of-e-mail-scam/

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.