RansomHub Ransomware Group Adds American Clinical Solutions to Data Leak Site
The RansomHub ransomware group claims to have stolen the data of more than 400,000 patients in an attack on American Clinical Solutions, and cyberattacks have been announced by Trionfo Solutions and Brockton Area Multi Services.
American Clinical Solutions
The RansomHub threat group has recently announced on its data leak site that one of its affiliates has breached the network of American Clinical Solutions (ACS), a Boca Raton, FL-based provider of urine and oral fluid drug confirmation testing services.
According to the listing on the data leak site, RansomHub breached ACS’s systems in mid-May and stole the data of more than 500,000 individuals who had samples tested for prescription and narcotic drugs. According to Marco A. De Felice of SuspectFile, the exfiltrated data includes 35 GB of medical records. The documents examined by De Felice included the full name of the patient, their date of birth, gender, patient ID, doctor’s name, name of the clinic that requested the test, and the laboratory results, with some files also including policy numbers, Social Security numbers, insurance data, and phone numbers.
RansomHub claims to have encrypted files on the network and gave a deadline of May 25, 2024, to pay the ransom to prevent the publication of the stolen data. On May 27, 2024, the leak site only included a 67.2 MB sample of the stolen data. While there is no substitute breach notice on the ACS website, the attack has been confirmed. The HHS’ Office for Civil Rights was notified on July 24, 2024, about a hacking/IT incident at ACS that involved the protected health information of 300,000 individuals, mush lower than the 500,000-record claim by RansomHub.
Get The FREE
HIPAA Compliance Checklist
Immediate Delivery of Checklist Link To Your Email Address
Please Enter Correct Email Address
Your Privacy Respected
HIPAA Journal Privacy Policy
Trionfo Solutions, Illinois
Trionfo Solutions, an Itasca, IL-based company that provides software to the insurance industry for generating quotes, comparing plans, and managing employee benefits, has recently reported a data breach to the HHS Office for Civil Rights that has affected 81,588 individuals.
Trionfo explained in its notification letters that an unauthorized third party gained access to some of its internal systems between December 4 and December 6, 2023, and may have viewed or acquired files containing personal information that was provided to Trionfo in connection with employer-sponsored benefits. The data potentially compromised includes names, addresses, email addresses, phone numbers, dates of birth, and Social Security numbers.
While data may have been acquired, Trionfo said it is unaware of any misuse of that data. The affected individuals have been offered complimentary credit monitoring and identity theft protection services as a precaution. Trionfo said it is reviewing and enhancing its technical and administrative safeguards to prevent similar incidents in the future.
Brockton Area Multi Services, Massachusetts
Brockton Area Multi Services, a Massachusetts-based non-profit that provides a range of services to individuals with developmental disabilities and mental and behavioral health issues, has identified unauthorized access to its computer network. Suspicious activity was detected on April 14, 2024, and steps were immediately taken to secure its systems and data and contain the attack. Cybersecurity consultants were engaged to investigate the unauthorized activity to determine the nature and scope of the incident.
The forensic investigation determined that protected health information may have been accessed and acquired, with the subsequent review confirming on April 29, 2024, that the impacted data included names, dates of birth, Social Security numbers, driver’s license/state identification card numbers, account numbers, diagnosis/treatment information, and health insurance information.
The breach report submitted to the Maine Attorney General indicates the personal and protected health information of 21,537 individuals was potentially compromised in the attack. The affected individuals have been offered complimentary credit monitoring and identity theft protection services for 12 months.


