207K Rehoboth McKinley Patients Tied to Conti Ransomware, Data Leak | TechTarget (2024)

Two months after the Conti ransomware hacking group leaked data they claim to have stolen from Rehoboth McKinley Christian Health Care Services (RMCHCS), 207,195 patients are being notified of the attempted data extortion stemming from their personal information.

As the FBI recently warned, the Conti group has been actively targeting the healthcare sector for the last year, claiming at least 16 healthcare-related entities.

In mid-February, Conti actors posted 2 percent of the overall data they asserted came from a hack on the New Mexico provider. The dark web posting included files titled 'passports', 'driver’s licenses', and 'bill of sale'.

At the time, the threat actors’ legitimate internet posting, examined by HealthITSecurity.com, showed complete, scanned documents in their entirety -- unredacted and without restrictions. The post included scans of patient documents, including patient treatments, diagnoses, and similarly sensitive information, including echocardiogram reports.

The notice explains that RMCHCS learned of the data leak on the same day as the public. Officials said they found that patient information had been removed from its network, after an ongoing hack that the security team was already investigating at the time of the leak.

The cyberattack drove RMCHCS into EHR downtime procedures, raising several concerns as the nonprofit hospital serves the Navajo nation, which was ravaged by the pandemic.

The hospital lost access to patient records and other computer systems during the attack. At the time, officials said the hospital was continuing to provide patient care without disruption.

After the exposure and attack, RMCHCS employed a third-party forensic firm to assist with the remediation efforts and investigation. The review found the attackers first gained access to the system on January 21, proliferating across the network for about two weeks until February 5.

During that time, the Conti actors gathered patient-related information and removed it from the network. On April 5, the investigators determined just whatindividuals were impacted by the hack.

The notice confirms that the hackers gained access to and stole highly sensitive patient data, including Social Security numbers, passports, health insurance information, contact details, medical information, records numbers, financial account information, and other data.

All impacted patients will receive free identity monitoring and restoration services. RMCHCS notified law enforcement after the incident, and following the online data leak, the FBI launched its own investigation. The notice does not inform patients of these elements and the potential impact of the data leak.

RMCHCS has since improved its security and monitoring, as well as hardened defense to prevent a recurrence.

CaptureRx Breach Tally: More than 1.6M Patients Impacted

The CaptureRX data breach tally has been reported to the Department of Health and Human Services as impacting 1.66 million patients.

As more information becomes available, the impact of the CaptureRx incident is on par with the Accellion FTA hack. Both vendor breaches are easily the two largest data breaches in the healthcare sector this year, so far.

As previously reported, the vendor was hit with a ransomware attack in February 2021 and affected the data of multiple healthcare clients.

Its notice did not detail when it first discovered the intrusion but that the investigation concluded in February, after the attacker accessed and stole information from its system. Officials said the impacted data included patient names, dates of birth,and prescription information.

CaptureRx is reviewing its security policies and enhancing its security processes, in addition to retraining its staff.

For now, the HHS-reportedimpacted healthcare entities include:

- Faxton St. Luke’s Healthcare (17,655)

- Jordan Valley Community Health Center (12,000)

- Trinity Health System - Twin City (9,579)

- Hudson Headwaters Health Network (8,100)

- UPMC Cole (7,376)

- Gifford Health Care in Vermont (6,777)

- Ascension St. Joseph Hospital (5,807)

- Brownsville Community Health Center in Texas (4,258)

- Thrifty Drug Stores (3,958)

- Ascension St. Agnes Healthcare (2,821)

- Hidalgo Medical Services (2,179)

- Our Lady of Lourdes Memorial Hospital (1,745)

- Ascension Standish Hospital (1,705)

Prestige Medical Reports Avaddon Data Leak to HHS

Prestige Medical Group has reported a data breach to HHS as impacting 34,203 patients. The notice stems from the previously reported data extortion attempt and leak by Avaddon ransomware threat actors in early April 2021.

Its website does not have a notice posted on the incident. But in April, Avaddon actors claimed they had obtained medical information tied to Prestige clients, doctor’s notes, employee information, and financial data from the provider, as well as other sensitive information.

Health Plan of San Joaquin Notifies 420K Individuals of October 2020 Email Hack

About 420,000 individuals tied to the Health Plan of San Joaquin (HPSJ) were recently notified that their data was potentially compromised after the hack of several employee email accounts in October 2020. The notice does not explain the delay in reporting.

First discovered on October 23, 2020, officials said an attacker gained access to multiple employee email accounts for several weeks between September 26 and October 12, 2020. The actor logged into these accounts and accessed the information the accounts contained.

Upon discovery, HPSJ changed all email passwords to block the account access and launched a review to determine if any information was impacted during the incident. The notice does not explain if the investigation found any evidence of access or other nefarious activity.

The accounts contained information that varied by individual and could include member names, member ID numbers, claim ID numbers, dates of birth, lab results, medical ID numbers, prescriptions, treatments, driver’s licenses, government-issued IDs, financial account details, health insurance information, record numbers, username and passwords, and SSNs.

More Providers Added to Netgain Incident

SAC Health Systems and San Diego Family Care (SDFC) recently reported to HHS that their patient information was compromised by the ransomware attack on third-party tech services vendor Netgain in late 2020.

The first breach notices stemming from the Netgain incident were released in early February 2021. At the time, officials from Ramsey County, Minnesota reported that Netgain informed them of thesecurity incident in December 2020.

A hacker had attempted to extort a ransom demand from Netgain, after exploiting an application used by Netgain’s clients. Just 8,700 Ramsey County residents were impacted by the incident, but other clients soon began reporting the incident and the impact expanded.

About 300,000 patients of Woodcreek Provider Services and Elara Caring were affected by the hack, as well as 157,939 patients of Allina Health’s Apple Valley Clinic. The affected patients also included 293,516 from Health Center Partners of Southern California, a business associate of SDFC.

The latest notices from SAC Health and SDFC show 28,128 SAC patients were included in the compromise, as well as 125,500 SDFC patients.

The compromised data varies by patient and could include names, contact details, SSNs, driver’s licenses, state IDs, tax identification numbers, electronic signatures, financial account information, health insurance policy numbers, subscriber numbers, and other medical data.

SAC Health also ceased using Netgain as a vendor as a result of the ransomware incident.

ZocDoc Programming Errors Exposes Data of 7,600 Patients

New York-based ZocDoc recently notified 7,600 patients that programming errors on its provider portal caused their data to be exposed for an undisclosed period of time, almost one year ago.

ZocDoc provides an online service that enables individuals to find and schedule in-person telemedicine appointments for both medical and dental healthcare. The impacted platform allows providers to list available appointment times, and each registered practice is allowed to access the ZocDoc system to view patient-inputted information.

In August 2020, officials said they learned programming errors within its platform allow current and former staff members to access the provider portal, after their access was intended to be limited, removed, or deleted.

The exposed data could include names, contact information, appointment history, and other sensitive information, including insurance member IDs, SSNs, and relevant medical history provided through ZocDoc.

ZocDoc does not collect or store credit card, radiological or diagnostic information, medical records, or other financial data.

Upon discovery, ZocDoc launched an investigation of its software and code, then repaired the programming errors. The impacted usernames and credentials can no longer access the platform. Officials said they’ve since bolstered the security practices.

Notably, the notice does not explain the near-year long wait between discovering the errors and notifying patients. Under HIPAA, covered entities and business associates are required to report data breaches impacting more than 500 patients in 60 days and without delay.

The medical practices impacted by these flaws have been notified and encouraged to conduct an internal assessment as “an additional precaution.”

207K Rehoboth McKinley Patients Tied to Conti Ransomware, Data Leak | TechTarget (2024)

FAQs

What is a conti ransomware attack? ›

The Conti malware, once deployed on a victim device, not only encrypts data on the device, but also spreads to other devices on the network, obfuscates its presence, and provides a remote attacker control over its actions on the objective. All versions of Microsoft Windows are known to be affected.

What is Conti used for? ›

Conti ransomware can utilize command line options to allow an attacker control over how it scans and encrypts files. Conti ransomware has used API calls during execution. Conti actors have been observed gaining unauthorized access to victim networks through stolen RDP credentials.

Can ransomware leak data? ›

To pressure victims into paying the ransom, cyber criminals want organisations to believe that data will be leaked if the ransom is not paid. If the demand is ignored, it's highly likely that criminals will publish some (or all) of the data on a data leak site (DLS) on the dark web.

Who are the victims of Conti ransomware? ›

Conti was a ransomware variant used to attack more than 900 victims worldwide, including victims in approximately 47 states, the District of Columbia, Puerto Rico, and approximately 31 foreign countries.

What happens if you are attacked by ransomware? ›

Financial Losses: Ransomware attacks are designed to force their victims to pay a ransom. Additionally, companies can lose money due to the costs of remediating the infection, lost business, and potential legal fees. Data Loss: Some ransomware attacks encrypt data as part of their extortion efforts.

What is in Everol Conti patches? ›

The active ingredients contained in Evorel Conti patches are: 3.2mg estradiol hemihydrate, 11.2mg norethisterone acetate. The patch will release 50mcg estradiol and 170mcg norethisterone per day.

What is the use of Conti tablet? ›

FEMOSTON-CONTI contains the active ingredients estradiol and dydrogesterone. It is used to relieve the discomfort many women feel during and after the menopause. It also helps to prevent thinning of the bones, which can cause fractures. It is used by women who still have a uterus (womb).

Does data leak mean hacked? ›

Yes, it means your data has ended up in a data breach, and unauthorized individuals can access your accounts and personal information.

Can ransomware steal passwords? ›

If a cybercriminal can crack a weak password that secures access to an organization's network, they'll be able to inject the network with ransomware. The compromised credentials that have led to the most ransomware attacks are Remote Desktop Protocol (RDP) credentials.

Can ransomware spread through WiFi? ›

Yes, ransomware can move through wifi networks to infect computers. Ransomware attacks that sleuth through wifi can disrupt entire networks, leading to severe business consequences. Malicious code that translates to ransomware can also spread across different wifi networks, operating as a computer worm does.

What is the end of Conti ransomware? ›

But on 19 May 2022, Conti's websites were no longer working. It has been argued that following Russia's invasion of Ukraine, potential victims feared violating sanctions imposed on Russia by the US and Europe.

What are Conti cyber threat actors? ›

Conti actors have used Kerboros attacks in attempts to obtain Administrator file hashes, using Router Scan, a penetration testing tool and other hacking tools. Legitimate Windows tools such as PowerShell and Command Prompt are also used to execute command line commands and scripts and use API calls during execution.

Top Articles
Dr wants me back at L&D - November 2024 Babies | Forums | What to Expect
Ultimate Guide to the AP Calculus BC Exam 2024
Wyoming Dot Webcams
Kokomoscanner
Conan Foal
Best Places To Get Free Furniture Near Me | Low Income Families
Ups Advance Auto Parts
Munsif Epaper Urdu Daily Online Today
Amazon Warehouse Locations - Most Comprehensive List 2023
50 budget recipes to feed a large crowd
Gopher Hockey Forum
Colossians 2 Amplified
Craiglist Tulsa Ok
Henry Ford Hospital: Ein Meisterwerk von Frida Kahlo
Clarita Amish Auction 2023
Faotp Meaning In Text
Smart fan mode msi, what's it for and does it need to be activated?
Mid-Autumn Festival 2024: The Best Lantern Displays and Carnivals in Hong Kong 
Bingo Kans Berekenen
Build it online for your customers – a new way to do business with Dell | Dell
Justified - Streams, Episodenguide und News zur Serie
Publix In San Antonio Texas
How 'The Jordan Rules' inspired template for Raiders' 'Mahomes Rules'
Hyb Urban Dictionary
ASVAB Test: The Definitive Guide (updated 2024) by Mometrix
Bay State Neurology
Ipayonline Azsdu Net
Unmhealth My Mysecurebill
7148646793
Marukai Honolulu Weekly Ads
Deshaun Watson Stats, News and Video - QB | NFL.com
Www Muslima Com
Are Huntington Home Candles Toxic
$200K In Rupees
Cooktopcove Com
Entourage Yearbook Login
Crystal Westbrooks Nipple
Texas Longhorns Soccer Schedule
Los Alamos Beach in Torremolinos: A Perfect Mediterranean Escape - Mama Málaga
Blackboard Bristol
10 Teacher Tips to Encourage Self-Awareness in Teens | EVERFI
2026 Rankings Update: Tyran Stokes cements No. 1 status, Brandon McCoy, NBA legacies lead loaded SoCal class
Ssndob Cm
Rabbi Raps
Erica Mena Net Worth Forbes
Craigslist Boats Rochester
Cambridge Assessor Database
8 Internet Celebrities who fell prey to Leaked Video Scandals
Parabroom Side Effects
Potassium | History, Uses, Facts, Physical & Chemical Characteristics
Lenscrafters Westchester Mall
Daniel 3 Nkjv
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6191

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.