DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Patients need to be notified sooner of ransomware dumps

Posted on November 9, 2020 by Dissent

In the past year, we have seen a significant increase in the use of dedicated leak sites where ransomware threat actors post the names of victims and dump some of their data to pressure them to pay demanded ransom.

In the U.S., HIPAA gives covered entities no more than 60 days from discovery of a reportable breach to notify HHS and individuals, but the regulation also says notification must be made “without unreasonable delay.”

But what constitutes “reasonable delay?” Is it reasonable to delay notification because you’re not yet sure which patients may have had their ePHI accessed or exfiltrated? Is it reasonable to leave everyone at risk when you know data with at least some ePHI have been dumped, even though you are not yet sure whose data got dumped and how many other patients’ may have had their data accessed or exfiltrated?

Do we need to revise HIPAA to mandate a faster publicly issued warning for publicly dumped PHI or somehow promote a “best practice” of an earlier warning alert system?

DataBreaches.net examined a number of dedicated leak sites for listings involved medical/health entities in the U.S. and compiled descriptions of 30 incidents disclosed on such sites so far this.  For each incident, DataBreaches.net noted whether there is any indication that the incident has been reported to HHS or if there is any notice posted on the entity’s web site, or a media notice of any kind to alert patients that their ePHI has either been stolen and dumped or may have been stolen and dumped.

You can find the recap of the 30 incidents with comments in the attached file.

Download: Notifying Patients of Ransomware Incidents “…..WITHOUT UNDUE DELAY”  (pdf)

Update: DataBreaches.net subsequently discovered that the breach attributed to Kristin J. Tarbet by Maze threat actors may have been reported in the news under a related entity’s name, Amara Medical Aesthetics. Neither name appears on HHS’s public breach tool at this time, however.


Related:

  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • Uncovering Qilin attack methods exposed through multiple cases
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
Category: Breach IncidentsCommentaries and AnalysesHealth DataMalwareOf NoteU.S.

Post navigation

← Alibaba-Backed Bigbasket Suffers Major Data Loss in Cyberattack
Eight months after ransomware attack, Advanced Urgent Care of Florida Keys notifies patients →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.