Malicious Actor Steals Patient Data from Multiple Ernest Health Hospitals
Ernest Health, the operator of rehabilitation and long-term acute care hospitals in Arizona, California, Colorado, Idaho, Indiana, Montana, New Mexico, Ohio, South Carolina, Texas, Utah, Wisconsin, and Wyoming, has started notifying patients about a recent data security incident involving their personal and protected health information. Ernest Health identified unauthorized activity in its computer systems on February 1, 2024, and the forensic investigation confirmed there had been unauthorized access to systems containing patient data between January 16, 2024, and February 4, 2024, and files were acquired in the attack that included patient information. For the majority of the affected individuals, the compromised data was limited to names, addresses, dates of birth, medical record numbers, health insurance plan member IDs, claims data, diagnosis, and prescription information. Some patients also had their Social Security and/or driver’s license numbers compromised. The security incident affected patients at multiple hospitals in the network, including: Affected Ernest Health...
Weak Cloud Security Controls at the Administration for Children and Families Have Put Sensitive Data at Risk
The Department of Health and Human Services (HHS) Administration for Children and Families (ACF) has put the sensitive data of families and children at risk by failing to address security gaps in its cloud environment, according to a recent audit by the HHS Office of Inspector General (HHS-OIG). HHS-OIG is conducting a series of audits of HHS divisions to determine if they have implemented effective cybersecurity controls for their cloud environments and are compliant with federal security requirements and guidelines. For the audit, HHS-OIG reviewed ACF’s cloud inventory, policies and procedures, and the configuration settings of ACF vulnerability scanners. Penetration tests were also conducted internally and externally on selected cloud information systems and web applications, and phishing tests were conducted on ACF personnel. While ACF had implemented security controls to protect its cloud information systems and data, HHS-OIG identified gaps in its security controls and vulnerabilities that could be exploited by malicious actors to gain access to systems and the sensitive data...
City of Hope Cyberattack Affects 827,000 Individuals
City of Hope, a non-profit clinical research and cancer treatment center in Duarte, California, has confirmed that the personal and protected health information of 827,149 individuals was compromised in a 2023 cyberattack. Suspicious activity was detected within some of its systems on October 13, 2023, and after securing the systems and implementing mitigation measures, a forensic investigation was launched to determine the nature and scope of the incident. A third-party cybersecurity firm assisted with the investigation and confirmed there had been unauthorized access to some of its systems between September 19, 2023, and October 12, 2023. During that time, copies of certain files were exfiltrated from its systems. The delay in issuing notifications was due to the time required to conduct a detailed review of all files on the compromised systems to determine the extent of the data breach. The investigation is ongoing, but City of Hope has confirmed that the files contained personal and protected health information. The types of data involved varied from individual to individual...
Senators Demand Answers from the United Network for Organ Sharing About 1 Million+ Record Data Breach
U.S. Senators Chuck Grassley (R-IA) and Ron Wyden (D-OR) have written to the United Network for Organ Sharing (ONOS), which administers the Organ Procurement and Transplantation Network (OPTN), demanding answers about a recently identified data breach and criticized ONOS for its apparent inability to operate the OPTN. The Senators previously wrote to ONOS in January 2022 to express their concerns about OPTN systems, which were in desperate need of modernization to protect them from cyberattacks. There is only a short window of opportunity for matching donors with patients in need of transplants, and any disruption to the system – a ransomware attack for example – could result in the loss of many lives. The Senators also voiced their concerns with the White House Chief Information Officer in February 2022 about the technology in use and the cybersecurity measures to protect the OPTN from cyberattacks. In September of that year, the HHS Office of Inspector General (OIG) published a report that called for the Health Resources and Services Administration (HRSA) to improve...
Lamoille Health Partners Settles Class Action Data Breach Lawsuit for $540,000
Lamoille Health Partners, a Vermont health system serving patients in Lamoille County, has agreed to settle a lawsuit that was filed in response to a June 2022 ransomware attack in which the protected health information of 59,381 patients was exposed and potentially stolen. Hackers gained access to the Lamoille Health Partners network between June 12, 2022, and June 13, 2022, and used ransomware to encrypt files. The attack exposed names, addresses, dates of birth, Social Security numbers, health insurance information, and medical treatment information. The affected individuals were notified about the breach in August 2022 and individuals who had their Social Security numbers exposed were offered complimentary identity protection and credit monitoring services. A lawsuit – Marshall v Lamoille Health Partners Inc. – was filed in the U.S. District Court for the District of Vermont on September 1, 2022, in response to the breach that alleged Lamoille Health Partners was negligent by failing to implement reasonable and appropriate cybersecurity measures and follow security...



