DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Primary Health & Wellness Center, LLC’s public notice of ransomware incident

Posted on January 19, 2024 by Dissent

In the process of researching breach reports submitted to HHS, DataBreaches came across a public notice for an incident affecting Primary Health & Wellness Center, LLC in Maryland. The covered entity is to be commended for the details and transparency in their notice, although they do not name the threat actor/group involved or any details of any ransom demand received.  DataBreaches.net has not found this incident claimed by any ransomware group as yet. The incident was reported to HHS on December 17 as affecting 4,792 patients.


Public Notice

Published in The Baltimore Sun on December 20, 2023

Location

Baltimore County, Maryland

Notice Text

Patient HIPAA Notice Regarding Protected Health Information Primary Health & Wellness Center, LLC On October 20, 2023, Primary Health & Wellness Center, LLC (PHWC) identified that its network server was encrypted with ransomware. The server contained medical records for patients from 2018 to present. The data included patient names, addresses, dates of birth, Social Security Numbers, and medical records.

In response to this incident, PHWC retained a computer forensics incident response team, and the FBI was also notified.

Upon information and belief, the threat actor variant was Phobos, and the threat actor was able to encrypt the server through remote desktop.

The remote access was disabled and secured, and no further vulnerabilities were identified. Following examination, no definitive indicators of exfiltration of patient data or protective health information were observed. In addition, threat actors utilizing the Phobos ransomware are not known to exfiltrate patient data.

Although PHWC has no evidence that any patient data or protected health information was acquired, exfiltrated, or misused for the purpose of committing fraud or identity theft, PHWC is writing to formally report the incident and to provide patients guidance on what they can do to help protect their data. To date, there has been no indication that any patient data or protected health information was improperly utilized by any person.

PHWC has also taken steps to ensure that similar incidents do not occur in the future. However, as a precautionary measure, patients should remain vigilant to protect against potential fraud or identity theft by, among other things, reviewing their account statements and monitoring credit reports closely. Individuals should promptly report any suspected fraudulent activity or identity theft to proper law enforcement authorities. Patients may also wish to review the tips provided by the Federal Trade Commission on fraud alerts, security/credit freezes, and steps that they can take to avoid identity theft. PHWC is fully committed to the preservation of the confidentiality and security of patient data.

We take our responsibilities pursuant to the Health Information Portability and Accountability Act and the Maryland Confidentiality of Medical Records Act very seriously, and we genuinely apologize for this incident and inconvenience. If you have any questions or concerns regarding this matter, additional information is available via a confidential, toll-free inquiry line at 888-721-8267 from 9:00 a.m. to 9:00 p.m. Eastern Standard Time, Monday through Friday.

12/20/23 7549415

No related posts.

Category: Breach IncidentsHealth DataMalwareU.S.

Post navigation

← Raptor Technologies’ unsecured blob exposure was worse than they acknowledged. Here’s what we know — and don’t know — so far.
Owner of BreachedForums sentenced to time served plus 20 years supervised release with special conditions →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.