Georgia fertility clinic breach exposes sensitive patient info
Around 38,000 patients data at risk
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
A fertility clinic based in Georgia has admitted hackers stole data holding sensitive patient information during a ransomware attack.
In a statement to patients, Reproductive Biology Associates, LLC, (RBA) said the breach affected about 38,000 patients. The clinic said it became aware of a potential data incident in mid-April when it discovered a file server holding embryology data was encrypted and inaccessible.
“We quickly determined that this was the result of a ransomware attack and shut down the affected server, thus terminating the actor’s access, within the same business day,” the statement read.
Further investigations found that hackers accessed its systems on April 7 and then a server containing protected health information on April 10. On June 7, the organization determined whose personal information was affected.
While the organization did not say if it paid a ransom, it said in the notification that it was communicating with the hackers, it managed to regain access to files. and confirmed with whoever accessed its systems that all exposed data was deleted and is no longer in its possession.
During the investigation, the organization determined the data stolen in the ransomware attack included patients’ full names, addresses, Social Security numbers, laboratory results, and information relating to the handling of human tissue.
The RBA has engaged with a professional IT services firm to conduct interviews and analyze forensic data related to the incident. It is also offering affected individuals free identity monitoring services.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Jamie Akhtar, CEO and co-founder of CyberSmart, told ITPro there is a growing trend with ransomware attacks to not solely encrypt data but also steal it and threaten to release it if the victim doesn’t pay the ransom. This double-extortion attack places further pressure on the victim to pay up.
“In this case, it seems RBA has paid the ransom and received confirmation from the cybercriminals that all exposed data has been deleted. However, we cannot take their word for it. RBA has done well to set up monitoring measures to detect any misuse of exposed data, but customers should also remain vigilant, particularly to spear-phishing attacks which can open a new, fresh pipeline of cybercrime for the involved parties,” he said.
Javvad Malik, a security awareness advocate at KnowBe4, told ITPro it's essential that all organizations take the threat of cyber attacks seriously and put in place layers of security to help protect, detect, and respond to any threats in a timely manner. These should be a mix of technical, procedural, and human controls to maximize the chances of preventing an incident.
“Organizations such as fertility clinics may consider themselves as lower risk than, say, hospitals, but the truth is that they have just as much sensitive personal information that is of value to criminals and can disrupt daily operations,” Malik said.
“Once data has been accessed by criminals, even if an organization can restore from backup or pay a ransom, there is no limitation of what the criminals can do with the stolen data. This can include selling the data on to other criminals or using the data themselves to attack unsuspecting victims."
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Palo Alto Networks CEO hails ‘the end of identity silos’ as firm closes CyberArk acquisitionNews Palo Alto Networks' CEO Nikesh Arora says the $25bn CyberArk acquisition heralds "the end of identity silos" for customers, enabling them to supercharge privileged access management.
-
Google says hacker groups are using Gemini to augment attacksNews Google Threat Intelligence Group has shut down repeated attempts to misuse the Gemini model family
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
