CommonSpirit Health Says Patient Information Accessed in October 2022 Cyberattack
CommonSpirit Health has provided an update on its October 2022 ransomware attack and has confirmed that the threat actors behind the attack accessed files containing patient information. The attack was detected by CommonSpirit Health on October 2, 2022, and action was immediately taken to secure its network. While the attack caused disruption at its healthcare facilities due to systems being taken offline to contain the incident, CommonSpirit Health said there was no impact on clinic, patient care, and associated systems at Dignity Health, Virginia Mason Medical Center, TriHealth, or Centura Health facilities. The forensic investigation confirmed that the attackers had access to its network between September 16, 2022, and October 3, 2022. CommonSpirit Health has now confirmed that the attackers gained access to parts of its network containing files that included the protected health information of patients of Franciscan Medical Group and Franciscan Health in Washington state, including patients that had received medical services at St. Michael Medical Center (formerly Harrison...
San Juan Regional Medical Center Settles Data Breach Lawsuit
San Juan Regional Medical Center (SJRMC) in Farmington, New Mexico, has proposed a settlement to resolve a class action lawsuit filed in response to a September 2020 data breach that affected 68,792 patients. On September 8, 2020, hackers gained access to the SJRMC network and exfiltrated files that contained patient information such as names, dates of birth, Social Security numbers, driver’s license numbers, passport information, financial account numbers, health insurance information, diagnoses, treatment information, medical record numbers, and patient account numbers. San Juan Regional Medical Center stated at the time that this was a malware, rather than a ransomware attack. Complimentary credit monitoring services were offered to patients for a period of 12 months. A lawsuit – Henderson, et al. v. San Juan Regional Medical Center – was filed on behalf of Jeremy Henderson, a patient of SJRMC and other patients similarly affected by the breach. The lawsuit alleged SJRMC was negligent for failing to adequately secure patient data. While legal action was not taken over a...
LastPass Confirms Customer Data Breached in Hacking Incident
LastPass has confirmed that hackers have gained access to a third-party cloud storage service that contained customer data, although no user passwords were compromised. The hacking incident is linked to the security breach that occurred in August 2022. In August, a hacker successfully compromised a developer account that provided access to the LastPass developer environment. Source code and proprietary technical information were stolen, although no user information was compromised, and password vaults remained secure. The latest announcement by LastPass CEO Karim Toubba is about a separate incident. Information stolen in the August breach allowed access to be gained to a third-party storage service that is shared by LastPass and its affiliate, GoTo (formerly LogMeIn). GoTo issued a similar breach notification in the past few days. LastPass said both incidents were investigated promptly, with assistance provided by the cybersecurity firm Mandiant. The investigation into the breach is ongoing, but it has been confirmed that access was gained to some portions of the information of...
OCR Confirms Use of Website and Other Tracking Technologies Without a BAA is a HIPAA Violation
The HHS’ Office for Civil Rights has issued a bulletin confirming that the use of third-party tracking technologies on websites, web applications, and mobile apps without a business associate agreement (BAA) is a HIPAA violation if the tracking technology collects and transmits individually identifiable health information. Even with a BAA in place, the use of the tracking technology may still violate the HIPAA Rules. The bulletin has been issued in response to the discovery earlier this year that Meta Pixel tracking code was being extensively used on the websites of hospitals and that the code snippet transferred data to Meta, including sensitive patient data. These privacy breaches came to light during an investigation by The Markup and STAT, which found Meta Pixel had been added to the websites of one-third of the top 100 hospitals in the United States and, in 7 cases, the code had been added to password-protected patient portals. The study was limited to the top 100 hospitals, so it is likely that hundreds of hospitals have used the code and have – in all likelihood unwittingly...
Hacking and IT Incidents Affect 563,000 Patients and Health Plan Members
Health Care Management Solutions LLC, a West Virginia-based consulting company focused on improving care quality for vulnerable populations including veterans, has recently reported a data breach to the HHS’ Office for Civil Rights that has affected up to 500,000 individuals. Little is currently known about the data breach as the company has yet to publicly announce the breach. There is no substitute breach notice on the company website. The OCR breach summary indicates this was a hacking incident affecting its network server(s). The extent to which protected health information has been compromised is not yet known. Notifications were issued on November 14, 2022 This post will be updated as and when further information about the incident becomes available. Stanley Street Treatment and Resources Discloses October 2021 Data Breach The Fall River, MA-based addiction and treatment center, Stanley Street Treatment and Resources, Inc. (STAR), has recently announced a data breach that occurred more than a year ago in October 2021. According to the STAR substitute breach notice, the breach...



