DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Sonoma Valley Hospital computer systems shut down by ‘security incident’

Posted on October 23, 2020 by Dissent

Anne Ward Ernst reports:

Sonoma Valley Hospital reported on Thursday, Oct. 22 that a security incident on Oct. 11 knocked out its computer systems, and is not fully restored. The incident “triggered a significant downtime event,” an official said.

Read more on Sonoma News.  

The hospital’s most recent update, posted on its site, reads:

On October 11, Sonoma Valley Hospital experienced a security incident that affected computer systems and triggered a significant downtime event.

Currently, the Hospital is maintaining operations while computer systems are being fully restored. We have maintained the ability to care for patients using our business continuity plan.

  • Emergency Care remains available 24/7. Necessary surgeries and elective procedures have not been disrupted by the incident.
  • The majority of diagnostics are being continued without interruption.
  • The patient portal remains available but new results have not been posted to the portal since October 11.

The Hospital immediately initiated an investigation. We have partnered with outside experts to help us investigate and remedy this incident.  We will provide updates as the investigation progresses.

If you have questions regarding your particular health needs, please contact your physician or provider.

(Updated: 11:25 am, October 22, 2020)

Notice that their statement does not mention whether there is any indication that any patient data has been accessed or exfiltrated. Nor does their statement mention “ransomware” or whether there have been any ransom demands, although from the description of the impact, it sounds like this was a ransomware incident.

So far, I have not seen this incident on any of the dozen or so dark web leak sites run by various ransomware groups, but a number of active groups do not maintain any such sites.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Health DataMalware

Post navigation

← TX: Parker County Impacted by Computer Security Incident
Alleging harassment of kids admitted under RTE, Rajasthan man hacks schools’ servers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.