DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NorthShore health system reports 348,000 affected by Blackbaud breach

Posted on September 10, 2020 by Dissent

Ugh.  I’ve been so busy adding Blackbaud incident-related reports to my worksheets that I maintain for my research with Protenus for Breach Barometer that I forgot to post some incidents here.  Thankfully, a kind reader gave me a gentle poke to let you know that  Lisa Schenker reported that NorthShore University HealthSystem is notifying approximately 348,000 patients whose protected health information (PHI) was involved in the Blackbaud incident.

Regular readers will remember that Blackbaud paid the attackers’  ransom demand with the understanding that the threat actors would destroy their copy of exfiltrated data.

Read more about NorthShore’s part of the incident on Chicago Tribune.

And for those who are curious: we are still first learning about entities who had PHI involved in the Blackbaud breach, and we do not have numbers for all of the ones we do know about. But as of today, I’ve tabulated 3,148,492 patients who had PHI involved. I have no doubt that there will be many more.

And because this has been a brutal year for me trying to keep up, let me give you a sense of what’s been going on:

In June, I entered 83 incidents in my worksheets.  In July, I entered more than 50 incidents on my worksheet for the month, but that number is not the final number for the month.  In August, I entered 73 incidents, and more are still coming in.  And so far for September, it continues to be about 2 per day.

I still remember when we first hit about 1 per day.

Keep in mind that unlike other sites who rely solely on HHS’s public breach tool, DataBreaches.net and Protenus use multiple sources so that our numbers go beyond just HIPAA-covered entities to include other types of organizations that collect, store, or process health or medical data.

So how is YOUR year going?


Related:

  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
Category: Commentaries and AnalysesHealth Data

Post navigation

← Russian state hackers suspected in targeting Biden campaign firm – sources
SegurCaixa Adeslas activates its contingency plan due to a ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.