DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ransomware attacks of two more medical entities disclosed: one in U.S., one in Canada

Posted on March 4, 2021 by Dissent

It seems that every day, we learn of more ransomware attacks on healthcare entities.  Here are two more.

Arizona:  Cochise Eye and Laser

The most recent update to HHS’s public breach tool included an incident reported by RF Eye, P.C., dba Cochise Eye and Laser.

On February 17, the Arizona entity posted a notice on their web site that disclosed that it had experienced a ransomware attack on January 13.  The type of ransomware was not named but their patient scheduling and billing software were encrypted by the attack.

“There is no evidence that the data was taken, only that it was encrypted, and in some cases deleted, making it impossible for us to access anything in our scheduling system,” the notice states.

As of February 17, the practice was still operating with paper charts.

Everyone seen after January 1st, 2020 will be called to reschedule follow up appointments, as we have no way of knowing when they were originally scheduled.

Names, dates of birth, addresses, phone numbers, and in some cases social security numbers were stored in the practice’s billing software.

Patients have been given some advice on protecting themselves, but do not appear to have been offered any free credit monitoring or identity theft restorations services.

According to their notification to HHS, 100,000 patients have been impacted by this incident.

There is no mention in their notification as to any ransom or extortion demand, and this incident has not shown up on any of the approximately 20 dedicated leak sites used by threat actors.  According to the practice, there was no evidence of any data exfiltration, but we’ve all seen cases where entities did not detect that data had, in fact, been exfiltrated, so that assurance cannot be relied upon with high confidence at this point.  Time will tell.

Manitoba, Canada: Altona Clinic

Pembina Valley reports that  Altona Clinic was the victim of a ransomware attack last Friday (February 26).

At this time, clinic official cannot confirm whether patient information has been compromised, but two separate IT specialists have advised, based on a number of factors, this is unlikely, and the purpose of the attack was most likely to lock the information rather than to access the patient records.

What were those factors? Given how common the double extortion model has become, why would this attack not also exfiltrate data in the hopes of extorting the clinic to pay to keep patient data off the internet?

Clinic officials report information on visits that occurred on Thursday, February 25th was lost as a result of the attack, and they are asking patients who had visits scheduled for that day to call the clinic and book a return appointment.

Now that is another kind of harm– having to come back because your doctor’s notes on your visit were destroyed or locked up.

There is nothing on the clinic’s web site as of the time of this publication. You can read Pembina Valley’s coverage here.

 


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
Category: Health DataMalware

Post navigation

← UK: 15 schools in Nottinghamshire crippled by cyber attack
Report: Russian hackers exploit Lithuanian infrastructure →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.