MU Health Care based in Missouri has suffered a phishing attack that caused the compromise of a few employee email accounts between May 4 and May 6, 2020. An investigation of the incident unveiled the compromised email accounts included patient data like names, birth dates, account numbers, health insurance information, Social Security numbers, and driver’s license numbers.
MU Health Care has advised all impacted patients and has given them free of charge credit monitoring services. To date, there are no reports received that indicate the misuse of any patient information.
The affected email accounts comprised the protected health information (PHI) of 5,074 persons.
Data Leaked Subsequent to the University Hospital SunCrypt Ransomware Attack
University Hospital is a teaching hospital located in Newark, NJ that has encountered a ransomware attack. The attack in September 2020 used the SunCrypt ransomware. Before the usage of ransomware, the attackers downloaded approximately 48,000 files, several of which were shared on the hacker’s data leak webpage.
The number of patients affected by the incident is still uncertain at this time. But the leaked information did contain some patient records, which include names, Social Security numbers, dates of birth, driver’s license numbers, and various data.
The attack looks like it commenced with a phishing email that triggered the download of TrickBot Trojan with the. SunCrypt ransomware being installed as a secondary payload.
PHI of 4,806 Persons Likely Compromised in UCare Minnesota Phishing Attack
The non-profit health plan, UCare Minnesota, has suffered a phishing attack affecting the email accounts of several workers. A breach investigation was initiated upon detection of suspicious network activity in April 2020. On May 4, 2020, UCare Minnesota confirmed that an unauthorized individual accessed some email accounts. The email accounts were promptly secured and were put through an assessment to determine if the attackers viewed member data.
UCare Minnesota found out on September 1, 2020 that the content in the email accounts included the following personal data and PHI of 4,806 people: names, healthcare provider names, diagnosis details, medical insurance ID numbers and birth dates.
There is no information discovered that identify suggest the exfiltration or improper use of any data by the persons behind the attack. UCare Minnesota has re-educated the staff about phishing attacks and has improved email security.
Nebraska Medicine Encounters Cyberattack
Nebraska Medicine has publicized that it has experienced a cyberattack that shutdown of its computer systems. The cyberattack took place on September 25, 2020 and resulted in an outage that brought about considerable information technology system breakdowns.
Without having access to vital IT systems, Nebraska Medicine had to put off visits for patients who have elective surgeries or had some other non-emergent health issues. Nebraska Medicine gave a report on September 24 stating normal procedures would return to “in days”. The urgent room had open up and no ER patients were redirected to elective measures or had other non-emergent health problems facilities.
It is not clear whether patient records were accessed or stolen, nevertheless, Nebraska Medicine established that no patient records had been removed or destroyed and that all patient information may be retrieved from backups.