DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Immediate care facility in Chicago hacked in December. Do patients know? (UPDATE1)

Posted on May 18, 2022 by Dissent

Approximately 43,000 patients of an immediate care facility and its associated primary care practice in Chicago may or may not know it yet, but threat actors gained access to protected health information in December and proceeded to remove more than 500 GB of files between December and May 10. Or so the threat actors claim.

On Monday, DataBreaches.net was contacted by an individual who claimed that Michigan Avenue Immediate Care had been hacked.

“Stealed more that 580 GB personal information about  ~43.000 patients  including SSN , Proof ID and lab analyses , TEMPUS Covid information and more info,” the person wrote, using a protonmail account.

A single 13-page file with a named patient’s registration form for Michigan Avenue Immediate Care (MAIC) was attached. The form contained demographic information about the patient with their name, date of birth, address, telephone number, Social Security number, health insurance information, and medical history including lifestyle factors was provided. That file also included a photocopy of the patient’s driver’s license and an April, 2022 date for follow up at Michigan Avenue Primary Care.

Top of patient registration form for MAIC.

Finding no media coverage of any breach, no report to HHS, and nothing on MAIC’s website, DataBreaches reached out to MAIC via email with questions about the claimed attack. Receiving no reply, DataBreaches sent a second inquiry earlier today, only to have it bounce back with a 550:blocked message. DataBreaches then sent a second email from this site’s domain email account. Although that email did not bounce back, no reply has been received.

With no information on MAIC’s or MAPC’s websites about any incident and no reply to emails, DataBreaches asked the threat actors if they would provide additional proof or details. They provided a 2.2 GB archive with protected health information (PHI) of patients. In addition to individual files with PHI, approximately 30 files in the sample were batched insurance claims with each page containing information on more than one patient.  Batched claims included patient name, account number, date of service, provider name, health insurance plan, health insurance policy number, charges, and balance.

Batched insurance claims were found in the leaked data. Redacted by DataBreaches.net .

When asked for information about when the attack occurred, the threat actors replied (as in the original):

We has break his servers on december 2021 . We continued uploading his data until to 10 May . We collected data from Yosi System, Docman , Tempus Covid results and more another info . We demanded not big price for confidential about this breach, but he only delay time, not paying .

Of note, they also informed DataBreaches that they had not encrypted any files.

Although the correspondent wrote to DataBreaches in English, default auto-text in emails such the “original message” divider appeared in Russian.

Somewhat surprisingly, they hesitated when DataBreaches asked how this site should refer to them, but when asked if DataBreaches might know them from any other hack or incident, they promptly replied, “Last our hack is Wycokck Country UG,” referring to the Unified Government of Wyandotte County and Kansas City incident, reported last month. That attack, which was discovered on April 16, was still impacting some government services by April 29.

Eventually, DataBreaches was told that they could be called “Targetware Team,” but  Databreaches is not confident that they used that name with WyCoKC or MAIC.

This post will be updated if MAIC responds to this site’s inquiries or if more information becomes available. As of the time of this publication, it is important to reiterate that they have not confirmed any breach to DataBreaches and if they did have a breach, it is not yet known to DataBreaches whether it was their breach or a third-party vendor’s breach.

Update 1 (May 19): No response has been received from MAIC  yet, but the TAs continue to provide this site with more details and data including more than 5 GB of data from TEMPUS that included COVID-19 test results on patients as well as re-registration forms for patients to be seen at MAPE, and appointment details for patients to be seen at MAPE.

Of note, they informed DataBreaches today that they did not reach out to MAIC until May 1 with their demands. That does not explain, of course, how MAIC did not detect any intrusion or exfiltration going back to December.

In response to DataBreaches’ question as to whether both MAIC and MAPE were attacked (because the TEMPUS system files showed registration files and appointments for MAPE), the spokesperson responded that it was only MAIC that got hit. “They have very weak computer security. Hacking their systems took only 1.5 hours,” the spokesperson added.

As a further update, the TAs claim that they have started selling data. “We already sell all information for now,” they wrote. But when DataBreaches asked if that meant all 580 GB of files that they claimed to have or just the data that they already shared with DataBreaches, the spokesperson responded, “No , we only start selling it yesterday.”

DataBreaches will continue to follow and update this report.

July 1: See update with their notification here.

Related posts:

  • UPDATE: Michigan Avenue Immediate Care in Chicago submits notification concerning 2021 cyberattack
  • “Without Undue Delay,” Part 2
Category: Breach IncidentsHackHealth DataU.S.

Post navigation

← Behavioral health entities in Massachusetts and Ohio reportedly victims of cyberattacks
Washington Local School District in Toledo, Ohio hit by disruptive cyberattack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.