DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The University of North Carolina- Chapel Hill School of Medicine Notifying Patients After 2018 Phishing Incident

Posted on November 13, 2019 by Dissent

Some readers may have trouble accessing a notice from the School of Medicine at the University of North Carolina — Chapel Hill due to an issue with Chrome, so I’m embedding the whole notification below.  TL;DR version:  some employees fell for a phishing attack and their email accounts may have been accessed between May 17, 2018 and June 18, 2018. UNC does not state when they first discovered the breach — only that they first confirmed on September 13, 2019 that accounts had been accessed and PHI was present in those employees’ email accounts. They are notifying 3,716 patients whose PII or PHI was in the affected employees’ email accounts. The PII/PHI may have included:

patients’ names and dates of birth, and demographic data such as addresses, health insurance information, health information, Social Security numbers, financial account information and/or credit card information.

School of Medicine notifies patients about data breach from phishing incident - UNC News _ UNC News
Category: Health DataPhishingU.S.

Post navigation

← TX: PNGISD technology held for ransom
Analyzing Careless Users, An Often Overlooked Threat →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Beverly Hills Plastic Surgeon Jaime Schwartz M.D. Sued for Not Timely Notifying Patients of Two Hacks
  • BlackBasta Ransomware Chatlogs Leaked Online
  • Niva Bupa investigates alleged data leak after cyber threat
  • CPPA Brings Enforcement Action Against National Public Data
  • HHS Office for Civil Rights Imposes a $1,500,000 Civil Money Penalty Against Warby Parker in HIPAA Cybersecurity Hacking Investigation
  • Hackers Claim Data Breach at Bulgaria’s Supreme Administrative Court
  • No need to hack when it’s leaking, Thursday edition: DM Clinical Research
  • Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors
  • Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
  • FBI and CISA Warn of Ghost Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple pulls encryption feature from UK over government spying demands
  • CPPA Brings Enforcement Action Against National Public Data
  • Lawsuits Trying to Stop DOGE Access to Personal Data: Explained
  • CPPA Sponsors Crucial Personal Information Protection Bill
  • Family’s claims that San Diego County secretly filmed child in hospital room survive, judge rules
  • Are Employees Receiving Regular Data Protection Training? Are They AI Literate?
  • Data Broker Privacy Compliance: Our Top 5 List

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.