New York Health Insurer Must Repay $7.7M After Using Excluded Medicaid Provider
A health insurer has been ordered to repay almost $7.7 million to the New York state Medicaid program after using a company run by a social worker who had lost his license and been excluded from the Medicaid program. The New York-based health insurance company Fidelis Care, a subsidiary of Centene Corp, administers managed health care plans available to residents of New York, including individuals enrolled in the New York State Medical Assistance Program (Medicaid). The Medicaid Managed Care/Family Health Plus/HIV Special Needs Plan/Health and Recovery Plan Model contract with the New York Department of Health requires Fidelis Care to ensure that providers used for Medicaid-reimbursed services and their owners are appropriately licensed to practice by the state and have not been excluded from the Medicaid program. The Medicaid Fraud Control Unit investigated Fidelis Care and determined that, from February 7, 2019, to July 30, 2021, Fidelis Care used a company called Cornerstone Herkimer LLC, whose sole owner and director was Ward Halverson. Ward Halverson had his license to...
FBI Issues Warning About BEC Attacks as Losses Increase to $55.5 Billion
The Federal Bureau of Investigation (FBI) has issued a warning to businesses about business email compromise (BEC) scams, which have resulted in losses of almost $55.5 billion over the past decade. BEC is a sophisticated scam that targets businesses and individuals. While the aim of the scam may be to obtain sensitive information, these attacks are commonly conducted on individuals who perform legitimate transfer-of-funds requests and trick them into making fraudulent wire transfers. These attacks commonly start with phishing attempts with social engineering techniques used to compromise email accounts. Accounts may also be accessed using stolen credentials or through computer intrusions. Once access is gained to a suitable email account, emails are searched to find information that can be used in the scam. The scammer may monitor the account for communications, hijack message threads and take over conversations, and copy the writing style of the account holder to make their requests more realistic. The account owner is impersonated, and emails are sent to individuals responsible...
Illinois Bone & Joint Institute Hacking Incident Affects 568,000 Patients
A data breach has been reported by the Illinois Bone & Joint Institute that affects more than 182,000 individuals. A network security incident has been reported by Access Sports Medicine & Orthopedics in New Hampshire that affects 88,044 individuals. Illinois Bone & Joint Institute The Illinois Bone & Joint Institute (IJBI), which operates over 100 clinics in the Chicagoland area, announced it detected unauthorized access to certain computer systems on July 4, 2024. Hackers first gained access to its network on May 30, 2024, and were ejected on July 4, 2024. IJBI said its facilities remained open throughout and care continued to be provided to patients. The forensic investigation confirmed that files were copied from its network, which included the information of patients and dependents of those individuals, including names, addresses, dates of birth, Social Security numbers, diagnosis and treatment information, and health insurance/claims information. No evidence has been found to indicate any misuse of the stolen data. Complimentary credit monitoring services have...
Goodwin Living and L.A. County Department of Mental Health Suffer Email Breaches
Goodwin Living and the Los Angeles County Department of Mental Health have recently reported breaches of their email environments and the exposure and potential theft of patient data. Goodwin Living, Virginia Goodwin House Incorporated, which does business as Goodwin Living and provides hospice care, home health, and rehab services, has discovered unauthorized access to an employee email account. The forensic investigation confirmed unauthorized access to the account from October 2, 2023, to October 18, 2023. Following the investigation, the compromised account was manually reviewed to identify the individuals affected and the types of data involved, and that process was completed on July 30, 2024. The review confirmed that the account contained the protected health information of 7,170 patients, which an unauthorized third party may have viewed or acquired. The information involved varied from individual to individual and included first and last names combined with addresses, phone numbers, email addresses, dates of birth, Social Security numbers, driver’s license numbers,...
Two More Healthcare Orgs Attacked by RansomHub
The RansomHub ransomware group has recently claimed responsibility for attacks on two healthcare providers, Millinocket Regional Hospital in Maine and Cardiology of Virginia in Midlothian. Millinocket Regional Hospital was added to the group’s data leak site on July 25, 2024, and the stolen data (1.8 GB) has been uploaded to the site, indicating the ransom was not paid. This week, Millinocket Regional Hospital confirmed that it detected unauthorized access to its network on or around July 21, 2024. The forensic investigation confirmed that the compromised parts of the network included patient data such as names, addresses, Social Security numbers, health insurance information, and treatment information. Complimentary credit monitoring and identity theft protection services have been offered to the affected individuals and their data security policies and procedures have been reviewed and enhanced. It is currently unclear how many individuals have been affected. Cardiology of Virginia was added to RansomHub’s data leak site on September 7, 2024, and the cardiology practice has been...



