DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

GA: Atlanta Allergy & Asthma hit by Nefilim threat actors

Posted on March 3, 2021 by Dissent

Atlanta Allergy & Asthma (AA&A) proudly proclaims itself to be  the largest allergy group in Atlanta, with 17 locations. “For more than 45 years, we have been the experts in the diagnosis and treatment of allergies, asthma, food allergies, sinusitis, and immunologic diseases,” their site notes.

What their site does not note yet is that they have apparently been attacked by Nefilim (a.k.a. “Nemty”) ransomware threat actors.

As do many other threat actors, Nefilim has a dedicated leak site on the Dark Web where they post the names of victims who have not paid their ransom or extortion demands. Yesterday, AA&A was added to the site with a “teaser” in terms of some of their data.

The 1.3 GB compressed archive extracted to 2.5 GB of data consisting of 597  files with PHI on what appears to be thousands of named patients. The files are not just current or recent billing-related files: spreadsheets organized by type of health insurance, including records on outstanding claims from 2017 and 2018 were also dumped in the “Electronic Remits” folder, as were more than 100 audits, where each audit might be a multi-page detailed review of a patient’s case.

Redacted excerpt from audit
Audit files contained multi-page summaries of a patient’s records. This is a snippet from a 3-page report and was redacted by DataBreaches.net.

All told, the threat actors appear to have cued up approximately 19GB of the covered entity’s files to dump if the practice refuses to pay their extortion demands.

DataBreaches.net reached out to AA&A  last night requesting a comment on the attack or some statement as to how they are responding to it, but has received no reply as yet.  This post will be updated if a reply is received.

 


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Data BreachesProsper Data Breach Impacts 17.6 Million Accounts
Category: Health DataMalwareU.S.

Post navigation

← Security breach prompts lockdown of some Manitoba student databases
PA: Millersville University confirms external cyber attack on network →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • From bad to worse: Doctor Alliance hacked again by same threat actor
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.