DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Was BrightStar Care attacked by two different groups — or was there only one breach?

Posted on February 2, 2024 by Dissent

On January 24, DataBreaches was contacted by a spokesperson for AlphV (“BlackCat”) to see if this site would be interested in reporting on a breach involving BrightStar Care (“BrightStar”). BrightStar had been added to their dark web leak site that day but without any proof of claim. The spokesperson was offering to show DataBreaches data that was described as containing a lot of patient information. Given that BrightStar offers a range of services for different needs, and has locations in most (but not all) states, any breach might involve patient data.  Before viewing any data, though, DataBreaches asked AlphV some questions, and learned that the attack was in early January, but it did not involve any encryption of files. AlphV’s spokesperson stated that they exfiltrated 24 GB of data from all of BrightStar Care’s four brands, obtaining “lots of confidential sensitive patient data.” They would later revise the claim about obtaining a lot of patient data.

Although BrightStar has four brands — BrightStar® Home Care, BrightStar® Senior Living, BrightStar Care Homes™, and BrightStar® Medical Staffing– each franchise office is independently owned and operated.  Whether patient data from all franchises is centrally stored with corporate providing security was, and remains unconfirmed by BrightStar.

In any event, the spokesperson claimed that they sent BrightStar the negotiation chat URL to use, but that BrightStar never responded at all, and so never even saw any price to delete data.  When DataBreaches asked how they could be sure that BrightStar ever saw the communication with the URL, they answered that the used Docusign, which provided a read receipt via email.

Image: DataBreaches.net

When DataBreaches inspected some of the data, it appeared to all be from an account on a server from the directory “Shelly Sun.” Shelly Sun is the CEO and co-founder of BrightStar. While the data appeared to contain some company-related files and documents as well as some personal information, there did not appear to be any patient databases or employee databases in the directory. As breaches went, this did not seem to be a particularly significant one in terms of potential impact.

Image: DataBreaches.net.

But on January 24, the same day AlphV listed BrightStar on their leak site, Sieged Sec posted something on Telegram channel with two screencaps as proof. Their post read, in part:  “oops, accidentally breached a healthcare company~  don’t worry, we won’t be leaking any data from healthcare again ^-^ but this 80GB of client and staff data looks pretty delicious~ ”

They also included a note to BrightStar Care:

dear BrightStar Care,
we’ve left a note in your files so you can secure your data.
yours truly, the gay cats at SiegedSec

DataBreaches reached out to SiegedSec, whose spokeperson expressed surprise. “I’m surprised to hear BlackCat’s breach is unrelated considering the timing, but I also wouldnt be surprised if BrightStar was breached twice,” they wrote.  In response to questions from DataBreaches, they volunteered that they breached the BrightStar Care branch, “specifically in Kentucky.” They were uncertain whether they only accessed an independently owned franchise or a central network for multiple franchises.

Neither SiegedSec nor AlphV were willing to reveal how they gained access to BrightStar.  And neither got any direct response from BrightStar to their communications, but SiegedSec believes that BrightStar “certainly took notice and fixed the initial access method after a couple of days from the attack,” adding, ” BrightStar hasn’t contacted or acknowledged me at all, despite leaving them my contact info. ”  Perhaps they thought thanking SiegedSec would be inappropriate.

When asked, AlphV’s spokesperson said that they, too, no longer had access.

Of note, and despite the wording of SiegedSec’s Telegram post, SiegedSec informed DataBreaches that they did not download any data. “I took a look around their files but I had no intention to keep their data.”

So will BrightStar decide that this is a reportable breach under HIPAA or not?  Unless DataBreaches missed some data, there may not be much PHI in the data AlphV claimed to exfiltrate.  And because DataBreaches did not examine every file in the AlphV data, this site could not determine whether the two files SiegedSec posted were also in the AlphV data.

Was this really one breach or was it, as claimed, two breaches by different threat actors?  DataBreaches would love to know if BrightStar would just respond to inquiries. DataBreaches called BrightStar this week and was told that there was no phone extension for any executives but the customer service representative would take a message and submit it. DataBreaches left a detailed message that this site was inquiring about two alleged data breaches by different criminal groups and that both had provided some data to support their claims.

No call or reply was received.

Related posts:

  • The Five Families disrupted after SiegedSec hacked; SiegedSec thrown out, Blog Hijacked (1)
  • Furry hackers who leaked Project 2025 firm’s data fear leader raided by feds
  • SiegedSec continues #OpJane efforts
  • “I’m Not Pro-Russia and I’m Not a Terrorist!” —- InfraGard and Airbus Hacker “USDoD” Unveils His New Campaigns
Category: Breach IncidentsCommentaries and AnalysesHackHealth DataU.S.

Post navigation

← CT: Groton schools’ internet outage from ‘cyber-attack’ under investigation
Lurie Children’s Hospital took systems offline after cyberattack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.