DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NY: Former Information Technology Employee Of Hospital Sentenced To 30 Months In Prison For Computer Intrusion

Posted on October 2, 2020 by Dissent

From the SDNY, a press release involving an unnamed hospital in NYC. I’ll tell you more about this one after the press release:

Audrey Strauss, the Acting United States Attorney for the Southern District of New York, announced that RICHARD LIRIANO was sentenced yesterday to 30 months in prison for engaging in a scheme to use malicious software programs, including a program known as a “keylogger,” on dozens of his coworkers’ computers at a New York City-area hospital, secretly obtaining user names and passwords to his victims’ personal email and other accounts, and using that unauthorized access to steal private and confidential files.  Using his victims’ stolen credentials, LIRIANO repeatedly compromised their password-protected online accounts, and accessed their sensitive personal photographs, videos, and other private documents.  LIRIANO’s sentence was imposed by United States District Judge Lewis A. Kaplan.

Acting U.S. Attorney Audrey Strauss said:  “For approximately five years, Richard Liriano used his computer skills and abused the trust placed in him as an information technology professional at a New York hospital to spy on his coworkers and steal personal information from them.  Liriano’s disturbing crimes not only grossly violated the privacy of his coworkers but jeopardized the integrity of computers housing vital healthcare and patient information, costing his former employer hundreds of thousands of dollars to remediate.  He will now be held accountable.”

According to the allegations in the Information to which LIRIANO pled guilty, a prior Indictment filed against LIRIANO, as well as statements made during the sentencing and other proceedings in the case:

From at least in or about 2013, up to and including at least in or about 2018, LIRIANO misused administrative access provided to him as an information technology employee at a New York City-area hospital (“Hospital-1”), to log in to employee accounts, and copy other employees’ personal documents, including tax records and personal photographs, onto his own workspace computer for his own personal use.

To further his efforts to steal personal information from Hospital-1’s employees, LIRIANO, used various malicious programs that he installed on Hospital-1’s computer systems without authorization, to steal the user names and passwords of his primarily female co-workers.  One of these programs is known as a keylogger, which surreptitiously recorded and sent victim employees’ keystrokes to LIRIANO, such as the usernames and passwords those employees entered to access their personal web-based email accounts.  Through the course of this conduct, LIRANO stole usernames and passwords for at least approximately 70 email accounts belonging to Hospital-1 employees or persons associated with those employees (the “Compromised Accounts”).

LIRIANO then used those stolen usernames and passwords to log into the Compromised Accounts and obtain unauthorized access to other password-protected email, social media, photographs, and online accounts to which the Compromised Accounts were registered.  Among other things, LIRIANO conducted searches for sexually explicit photographs and videos in the Compromised Accounts.

LIRIANO’s computer intrusions into Hospital-1’s computer networks caused over $350,000 in losses to Hospital-1, which include the expenses that Hospital-1 incurred to remediate the damage that LIRIANO caused to its computer networks.

*                      *                      *

In addition to the prison term, LIRIANO, 34, of the Bronx, New York, was sentenced to three years of supervised release.  LIRIANO was also ordered to pay restitution of $351,850.25.

Ms. Strauss praised the investigative work of the Federal Bureau of Investigation and thanked the New York City Police Department for its assistance.

This case is being handled by the Office’s Complex Frauds and Cybercrime Unit.  Assistant U.S. Attorney Vladislav Vainberg is in charge of the prosecution.

Source: U.S. Attorney’s Office, Southern District of New York


So what’s not in their press release that you may want to know is that this was the Hospital for Special Surgery, and I can find nothing on this site where I ever knew of this incident before. Nor would we have seen this on HHS’s breach tool because it involved employee data only, not patient data.

According to court filings seen by DataBreaches.net and as noted in the press release, Liriano made a voluntary confession to HSS and the FBI.  He claimed that he accessed the employees’ files to obtain nude photos and sexual videos that were not used for extortion and were not posted anywhere but were used “to do what people do when they view nude images.”


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • NY: Gloversville hit by ransomware attack, paid ransom
Category: InsiderOf NoteU.S.

Post navigation

← Magnolia Pediatrics notifies patients of a security incident after OCR tells them it’s reportable
Transport Malta hit by cyberattack, recovers after 5 days →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.