DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Brandywine Counseling and Community Services notifies patients of ransomware incident

Posted on April 20, 2020 by Dissent

Brandywine Counseling and Community Services, Inc. disclosed a breach. Note that this is not the Brandywine Urology breach recently disclosed but a different entity and a different breach.  DataBreaches.net has reached out to Brandywine Counseling to ask for clarification on certain details, but has not received any response by publication time.  This incident is not yet up on HHS’s public breach tool, so we also do not yet know how many patients have been notified. This post will be updated when more details are obtained, but for now, here is their notice:

Brandywine Counseling and Community Services, Inc. is committed to protecting the confidentiality and security of our clients’ information. Regrettably, this notice concerns a security incident that may have involved some of that information.

On February 10, 2020, we discovered that some of our servers were infected with ransomware. We immediately took steps to secure our network, contacted law enforcement, began an investigation, and an experienced computer forensic firm was hired to assist. During the investigation, we determined that during the incident, a limited amount of personal information was acquired from our systems, which included some clients’ names, addresses, dates of birth, and/or limited clinical information, such as provider name(s), diagnosis, prescription(s), and/or treatment information. In some instances, clients’ health insurance information, Social Security numbers and/or driver’s license numbers were also included.

This incident did not affect all clients, but only those clients whose information was included in the limited information acquired during the ransomware incident.

As a precaution, we are mailing letters to clients whose information was acquired during the ransomware incident. We also have established a dedicated, toll-free call center to answer clients’ questions. If you have questions, please call 1-888-921-0536, Monday through Friday, from 9:00 a.m. and 6:30 p.m. eastern time. For those clients whose Social Security numbers and/or driver’s license numbers were involved, we are offering complimentary credit monitoring and identity protection services. We also recommend that affected clients review any statements they receive from their health insurers or healthcare providers. If clients see charges for services not received, they should contact the insurer or provider immediately.

We regret any concern or inconvenience this incident may cause. We remain committed to protecting the confidentiality and security of our clients’ information. To help prevent something like this from happening in the future, we continue to review our systems and implement additional measures to enhance and strengthen our security processes.

 


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Health DataMalwareU.S.

Post navigation

← PrimoHoagies Notifies Customers of Data Security Incident
CISI payment breach leaves members vulnerable to fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.