DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ransomware attacks of two more medical entities disclosed: one in U.S., one in Canada

Posted on March 4, 2021 by Dissent

It seems that every day, we learn of more ransomware attacks on healthcare entities.  Here are two more.

Arizona:  Cochise Eye and Laser

The most recent update to HHS’s public breach tool included an incident reported by RF Eye, P.C., dba Cochise Eye and Laser.

On February 17, the Arizona entity posted a notice on their web site that disclosed that it had experienced a ransomware attack on January 13.  The type of ransomware was not named but their patient scheduling and billing software were encrypted by the attack.

“There is no evidence that the data was taken, only that it was encrypted, and in some cases deleted, making it impossible for us to access anything in our scheduling system,” the notice states.

As of February 17, the practice was still operating with paper charts.

Everyone seen after January 1st, 2020 will be called to reschedule follow up appointments, as we have no way of knowing when they were originally scheduled.

Names, dates of birth, addresses, phone numbers, and in some cases social security numbers were stored in the practice’s billing software.

Patients have been given some advice on protecting themselves, but do not appear to have been offered any free credit monitoring or identity theft restorations services.

According to their notification to HHS, 100,000 patients have been impacted by this incident.

There is no mention in their notification as to any ransom or extortion demand, and this incident has not shown up on any of the approximately 20 dedicated leak sites used by threat actors.  According to the practice, there was no evidence of any data exfiltration, but we’ve all seen cases where entities did not detect that data had, in fact, been exfiltrated, so that assurance cannot be relied upon with high confidence at this point.  Time will tell.

Manitoba, Canada: Altona Clinic

Pembina Valley reports that  Altona Clinic was the victim of a ransomware attack last Friday (February 26).

At this time, clinic official cannot confirm whether patient information has been compromised, but two separate IT specialists have advised, based on a number of factors, this is unlikely, and the purpose of the attack was most likely to lock the information rather than to access the patient records.

What were those factors? Given how common the double extortion model has become, why would this attack not also exfiltrate data in the hopes of extorting the clinic to pay to keep patient data off the internet?

Clinic officials report information on visits that occurred on Thursday, February 25th was lost as a result of the attack, and they are asking patients who had visits scheduled for that day to call the clinic and book a return appointment.

Now that is another kind of harm– having to come back because your doctor’s notes on your visit were destroyed or locked up.

There is nothing on the clinic’s web site as of the time of this publication. You can read Pembina Valley’s coverage here.

 


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • The Alliance That Wasn’t: A Critical Analysis of ReliaQuest’s Q3 2025 Ransomware Report
  • Heritage Provider Network $49.99M Class Action Settlement
Category: Health DataMalware

Post navigation

← UK: 15 schools in Nottinghamshire crippled by cyber attack
Report: Russian hackers exploit Lithuanian infrastructure →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.