Email Breaches Reported by Massachusetts and Tennessee Hospitals
McLean Hospital, Delta Specialty Hospital, and FC Compassus have discovered unauthorized access to their email systems and the exposure of patient data. McLean Hospital McLean Hospital in Belmont, MA, a Mass General Brigham affiliate, has notified 2,231 patients about unauthorized access to an email archive that contained the data of patients who received an MRI scan as research participants or through clinical services between June 15, 2020, and February 9, 2024. The unauthorized access was detected on February 8, 2024, and the review of the email archive was completed on May 3, 2024. Notification letters were mailed to the affected individuals on May 21, 2024. The types of data involved varied from individual to individual and may have included names, addresses, phone numbers, email addresses, dates of birth, medical record numbers, Social Security numbers, health insurance information, driver’s license numbers, and some clinical information, such as procedure type, diagnosis, medications, clinical locations, and whether the individual participated in a research study. For...
Patient Data Exposed in Cyberattacks on PruittHealth & Easterseals Central Illinois
PruittHealth has notified patients about a November 2023 ransomware attack and has confirmed that patient data was stolen. Easterseals Central Illinois is investigating a cyberattack that exposed patient data, and IACT Health has been affected by a cyberattack on its business associate Advarra. PruittHealth Confirms Patient Data Was Stolen in November 2023 Ransomware Attack PruittHealth, a health system with 180 care centers facilities in Florida, Georgia, North Carolina, and South Carolina, has confirmed that patient data was stolen in a November 2023 cyberattack. While the “illegal foreign actors” behind the attack were not named in the breach notice, the NoEscape ransomware group claimed responsibility for the attack and said 1.5TB of data was stolen. PruittHealth said it took immediate action when the breach was detected to prevent further unauthorized access and engaged a cybersecurity firm to investigate the incident, which confirmed that files had been infiltrated from its network. The hackers demanded a ransom payment to prevent the release of the stolen data. PruittHealth...
Mobile County Health Department & Special Health Resources of Texas Investigating Cyberattacks
Special Health Resources and Mobile County Health Department are investigating cyberattacks and Palomar Health Medical Group has made progress recovering from its May 5, 2024 cyberattack. Special Health Resources of Texas Special Health Resources of Texas, a network of healthcare centers in East Texas and Southwest Arkansas, has been forced to cancel routine and non-urgent appointments while it deals with a cyberattack that forced its computer systems offline. The disruption caused by the attack was so severe that the difficult decision was taken to temporarily close some of its clinics, including its Jacksonville Care Clinic and Texarkana Care Clinic. The disruption to computer systems and phone lines has continued for 10 days. Special Health Resources alerted patients on June 3, 2024, about “technical difficulties” due to the attack and the disruption to patient services. Special Health Resources said its facilities are now open and are now accepting walk-ins from established patients, but says its dental services are still unavailable. Since phone lines are still...
UK & Canadian Data Regulators Investigate 23andMe Over 2023 Data Breach
Data protection regulators in the United Kingdom and Canada have launched a joint investigation of 23andMe over its 2023 data breach that affected almost 7 million people – around half of its customers. 23andMe is a direct-to-consumer genetic testing company that analyzes customers’ DNA from saliva samples and provides customers insights into their health and ancestry. In October 2023, a hacker claimed to have accessed users’ profile information of users and offered the data for sale. 23andMe investigated the hacker’s claims and determined that its systems had not been compromised; however, customers’ accounts had been accessed in a credential stuffing campaign. Credential stuffing attacks involve using passwords obtained in a breach at one or more companies to log in to accounts on an unrelated platform. This technique will only work if passwords are reused on multiple platforms. 23andMe’s investigation confirmed that around 14,000 user accounts were compromised in a campaign that ran for around 5 months from April 2023 to September 2023. Those users had...
Lynwood Manor Patients Notified About 2021 Data Breach
CRG Lynwood, LLC, an Adrian, MI-based healthcare provider that operates the Lynwood Manor skilled nursing and rehabilitation center has issued notification letters to 6,566 individuals whose data was compromised in a cyberattack that was first detected almost three years ago on July 12, 2021. The cyberattack occurred at a business associate of Lynwood Manor that provided administrative services, including backend operations, staffing, and network infrastructure to Lynwood Manor and various other senior assisted living facilities. The investigation concluded that Lynwood Manor data was not involved, but 14 months later in September 2022, Lynwood Manor was notified that residents’ data had been accessed. Lynwood Manor published a substitute breach notice on its website in November 2022, where it remained while Lynwood Manor worked with a data mining vendor to determine the individuals affected and the types of data involved. The data mining process took until January 31, 2024, to complete, and on February 1, 2024, a third-party notice vendor was engaged to assist with the...



