Montgomery General Hospital Suffers Ransomware Attack and Data Leak
Montgomery General Hospital in West Virginia has suffered a cyberattack that saw unauthorized individuals gain access to its IT systems on or around February 28, 2023, and deploy ransomware on or around March 1, 2023. The attackers gained access to certain servers, exfiltrated files, and encrypted data. Montgomery General Hospital engaged a third-party security firm to assist with the investigation to determine the extent of the breach and has confirmed that its cloud-based electronic medical record system was not affected. The exfiltrated files mostly contained historical data, including budget documents, cost reports, and vendor payments; however, some of the files contained patient information. At this stage of the investigation, the extent to which patient information has been compromised is still being determined. The hospital has confirmed that notifications will be sent to affected patients ahead of the 60-day reporting deadline of the Breach Notification Rule and credit monitoring services will be offered to individuals whose Social Security numbers were involved....
DoJ Updates Guidance for the Evaluation of Corporate Compliance Programs
The Department of Justice has updated its guidance for the Evaluation of Corporate Compliance Programs to incorporate directions given by the “Monaco Memo” – e.g. to consider the existence and application of compensation claw back policies and to investigate how organizations monitor the potential misuse of personal mobile devices in the workplace. The Evaluation of Corporate Compliance Programs is a document produced by the Department of Justice’s Criminal Division to guide federal prosecutors on factors they should evaluate when considering a resolution agreement. Although intended for the Criminal Division, other agencies within the DoJ have been encouraged to refer to the guidance when prosecuting non-criminal cases. In the context of how the Evaluation of Corporate Compliance Programs might impact healthcare organizations, two of the agencies encouraged to refer to the guidance are the Civil Division – which prosecutes civil cases of fraud against the Government (i.e., Medicare fraud) – and the Civil Rights Division, which enforces laws prohibiting discrimination in federally...
Microsoft Will Block Dangerous File Types in OneNote Documents
Last year, Microsoft started blocking macros by default in Office files delivered via the Internet to make it harder for malicious actors to use macros for delivering malware. In response, threat actors have been looking for alternative methods for malware delivery, such as OneNote files. OneNote is a digital note-taking application that is part of the Microsoft Office suite and it has been proving popular for malware distribution because executable files can be embedded in OneNote documents. These files are usually hidden behind design elements in the documents, such as buttons instructing users to click to view the content. The user is informed that they need to double-click the button, but doing so executes the hidden embedded executable file behind the button. If executed, the hidden executable file downloads a malicious payload from a remote server. In recent weeks, several campaigns have been detected that use OneNote attachments for distributing malware, including AsyncRat, Emotet, and QBot. In response to the increasing misuse of OneNote files in phishing campaigns,...
Hospitals Notify Patients About 2021 Phishing Attack on Adelanto HealthCare Ventures
Several hospitals have started notifying patients about a data breach at the consulting company, Adelanto HealthCare Ventures (AHCV). AHCV has offices in Washington D.C., Nashville, Tennessee, and Austin and Laredo in Texas, and provides transactional advisory support and other services. AHCV provided services to an unnamed business associate of the affected hospitals. According to the breach notifications recently issued by the hospitals, their business associate provided AHCV with claim information on their patients to allow AHCV to perform its contracted services. On November 5, 2021, AHCV determined that the email accounts of two of its employees had been accessed by unauthorized individuals after the employees responded to phishing emails. AHCV launched an investigation into the data breach but initially concluded that the email accounts did not contain any protected health information. On December 21, 2021, AHCV determined that one of the email accounts did contain patient information, which may have been accessed in the attack. It took until August 19, 2022, for AHCV to...
Judge Denies Class Certification in CareFirst Data Breach Lawsuit
A U.S. District Court Judge has denied class certification in a long-running legal battle against CareFirst BlueCross BlueShield over its 2014 data breach that affected 1.1 million plan members. The breach in question was due to a spear phishing attack in April 2014, which allowed unauthorized individuals to access a database that contained the names, birthdates, email addresses, and subscriber ID numbers of around 1.1 million individuals who were registered to use CareFirst’s websites and online services. The lawsuit was initially filed in 2015 but was dismissed by a lower court in 2016 due to lack of injury, but was resurrected by a federal appeals court in 2017. In 2018, the U.S. Supreme Court declined CareFirst’s request for review and the case was returned to the District Court for the District of Columbia and was allowed to proceed. The lawsuit alleged CareFirst had failed to implement appropriate security measures and made several errors that allowed hackers to breach its network and access the data of its customers, and as a result of the data breach, class members face an...



