Court of Appeals Revives Chelan-Douglas Health District Data Breach Lawsuit
A Chelan-Douglas Health District data breach lawsuit that was dismissed by the Chelan County Superior Court has been revived by the Washington Court of Appeals. Chelan-Douglas Health District, the public health agency of Wenatchee Valley in Washington state, was sued in June 2022 over a cyberattack and data breach discovered in 2021 that involved the personally identifiable information (PII) and protected health information (PHI) of almost 109,000 individuals. The lawsuit was filed by Sarah Nunley and Michelle Slater individually and on behalf of others affected by the data breach. The plaintiffs contended that they started receiving a large number of spam phone calls and emails related to medical services after the data breach, including calls from individuals claiming to be from the health district. Nunley alleged that her personal information had been used to file for an unauthorized business license. She also claims to have been notified by her credit monitoring service that her Social Security number had been posted twice on dark web sites and there had been “soft pulls” of...
OCR Releases Updated Security Risk Assessment Tool
The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) currently has an enforcement initiative focused on the risk analysis implementation specification of the Security Management Standard of the HIPAA Security Rule. Last week, OCR announced its first enforcement action under that initiative – A $90,000 settlement with Bryan County Ambulance Authority in Oklahoma. Enforcement of the HIPAA Rules, and especially compliance with the HIPAA Security Rule, is a priority for OCR; however, OCR prefers to work with HIPAA-regulated entities to help them comply with the HIPAA Rules. One of the ways that OCR is helping HIPAA-regulated entities comply with the HIPAA Security Rule is through its Security Risk Assessment (SRA) Tool, a new version of which was released by OCR and the Assistant Secretary for Technology Policy (ASTP) last week. Hacking incidents and ransomware attacks continue to increase within the healthcare and public health sector but in many cases, these attacks could have been prevented by conducting a comprehensive and accurate risk analysis and...
CISA Warns of Ongoing Spear Phishing Campaign Using RDP Attachments
A foreign threat actor tracked by Microsoft as Midnight Blizzard (aka APT29, Cozy Bear) is conducting a spear phishing campaign targeting organizations in multiple sectors, including government, defense, academia, non-governmental organizations (NGOs), information technology, and other sectors. Midnight Blizzard is a suspected Russian state-sponsored hacking group that conducts attacks in support of Russia’s Foreign Intelligence Service (SVR). The group is known to use diverse tactics in its espionage operations including bespoke malware and publicly available tools such as Mimikatz and Cobalt Strike. Its current campaign, which has been active since at least October 22, 2024, has involved thousands of spear phishing emails to individuals at more than 100 organizations worldwide. The threat actor poses as a trusted entity, including Microsoft and Amazon Web Services (AWS), and sends emails with a signed remote desktop protocol (RDP) file attachment. The attached RDP configuration file establishes a connection with a server under Midnight Blizzard’s control. According to Microsoft,...
Summit Pathology: 1.8 Million Individuals Affected by Ransomware Attack
Summit Pathology Laboratories, Inc., a Colorado pathology service provider, has confirmed in a breach report to the HHS’ Office for Civil Rights (OCR) that 1,813,538 patients have been affected by an April 2024 cyberattack. Summit Pathology said suspicious activity was identified within its computer environment on or around April 18, 2024, and immediate action was taken to prevent further unauthorized access. A third-party cybersecurity firm was engaged to investigate the incident and determine the nature and scope of the security breach. Summit Pathology said evidence was found that an unauthorized cybercriminal accessed or acquired files containing patient data. The file review confirmed the files contained names, addresses, dates of birth, Social Security numbers, financial information, health insurance information, billing information, and medical information, including diagnoses. According to a notice on the Summit Pathology website, “We will continue to mitigate the impact to consumers and care providers due to cyberattacks on the U.S. health system and Summit Pathology...
OCR Announces First Financial Penalty Under HIPAA Risk Analysis Enforcement Initiative
The HHS Office for Civil Rights (OCR) has confirmed that another settlement has been agreed to resolve a ransomware-related HIPAA violation, its second settlement in as many days. The latest HIPAA enforcement action is the first under OCR’s new risk analysis enforcement initiative and involved a $90,000 financial penalty and the adoption of a corrective action plan for Bryan County Ambulance Authority in Oklahoma. A risk analysis is a required provision of the HIPAA Security Rule – 45 C.F.R. § 164.308(a)(1)(ii)(A) – and one of the most important for security. If a risk analysis is not conducted, it is highly likely that risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (ePHI) will remain unknown and could be exploited by malicious actors to gain access to networks and ePHI. When risks are identified, they must be managed and reduced to a low and acceptable level. OCR’s investigations of large data breaches have shown that a risk analysis is something many HIPAA-regulated entities get wrong. They either...



