HIPAA Breach News

New York Nursing Center and Phoenix Children’s Hospital Affected by Phishing Attacks

Village Center for Care dba VillageCare Rehabilitative and Nursing Center (VRNC) and Village Senior Services Corporation dba VillageCareMAX (VCMAX) have fallen victim to a business email compromise (BEC) attack. BEC attacks involve the impersonation of an executive, either using the executive’s genuine email account compromised in a previous attack or by spoofing the executive’s email address.

An unauthorized individual, pretending to be member of the executive team, requested sensitive information on VRNC patients and VCMAX members. Believing the request to be legitimate, the employee responded and provided the information as requested. VCMAX and VRNC were alerted to a potential BEC attack on or around December 30, 2019.

The investigation confirmed the request was not genuine and sensitive information on VRNC patients and VCMAX members had been impermissibly disclosed. The information sent via email included the names and Medicaid ID numbers of 2,645 VCMAX members and first and last names, dates of birth, insurance provider names, and Insurance ID numbers of 674 VRNC patients.

There have been no reports of misuse of personal information, but all affected individuals have been advised to be vigilant and check accounts, credit reports, and explanation of benefits statements for signs of fraudulent activity. VCMAX and VRNC are reviewing and enhancing their policies and procedures to prevent further attacks of this nature in the future.

1,860 Individuals Impacted by Phishing Attack on Phoenix Children’s Hospital

The email accounts of seven employees of Phoenix Children’s Hospital have been compromised as a result of a targeted phishing campaign between September 5 and September 20, 2019.

Upon discovery of the breach, a leading computer forensic firm was engaged to investigate the extent of the breach. The hospital learned on November 15, 2019 that the compromised accounts contained the protected health information of 1,860 current and former patients which may have been viewed or obtained by the attackers.

The accounts were found to contain patient names, personal information and, for some individuals, limited health information and Social Security numbers.

On January 14, 2020, Phoenix Children’s Hospital started notifying affected patients by mail. Complimentary credit monitoring and identity theft protection services have been offered to patients whose Social Security number was potentially compromised.

The post New York Nursing Center and Phoenix Children’s Hospital Affected by Phishing Attacks appeared first on HIPAA Journal.

Malware Attack Results in Corruption of Medical Records: 30,000 Patients Affected

On November 21, 2019, Fondren Orthopedic Group, an association of private orthopedic surgery practitioners in Houston and the surrounding areas, experienced a cyberattack that affected certain parts of its IT system.

In a substitute breach notice posted on its website, the incident was described as a malware attack that damaged the medical records of certain patients. Prompt action was taken to contain the infection and its systems were restored; however, the medical records corrupted by the malware could not be recovered and have been permanently lost.

The corrupted records included patients’ names, addresses, telephone numbers, health insurance information, and diagnosis and treatment information. All patients affected by the incident were current or former patients of Dr. K. Matthew Warnock.

Third party forensic investigators were engaged to assist with the investigation and found no evidence of unauthorized data access or exfiltration of data. Fondren Orthopedic Group is reviewing data security policies and procedures and will be enhancing its security protocols to improve resilience to malware attacks. Affected patients have been notified and informed that they will need to complete new patient forms and supply details of their medical histories when they next visit Dr. Warnock.

The cyberattack has been reported to the HHS’ Office for Civil Rights. The breach summary shows up to 30,049 patients have been affected.

Access Health CT Notifies 1,100 About Unspecified Data Breach

Access Health CT, the health insurance marketplace in Connecticut, has notified approximately 1,100 consumers that some of their protected health information was exposed in a data breach.

In its substitute breach notice, Access Health CT apologized for any inconvenience caused by the breach and said affected individuals have been offered free access to services to help them protect their personal information. The breach notice did not explain the nature of the breach, when it occurred, nor the types of information that were compromised.

The notice states, “Several efforts to improve security are already in place, with longer-term initiatives planned regarding system changes and more frequent Information Technology (IT) security training to improve data protection and security awareness.”

The post Malware Attack Results in Corruption of Medical Records: 30,000 Patients Affected appeared first on HIPAA Journal.

Data Breaches Reported by Manchester Ophthalmology, UnitedHealthcare, and Cook County Health

Manchester Ophthalmology in Connecticut has experienced a cyberattack in which the attackers may have gained access to patient information.  The eye care provider became aware of the cyberattack on November 25, 2019 when employees noticed unusual activity on the network. Assisted by a third-party technology firm, it was determined later that day that hackers had gained access to its systems and attempted to deploy ransomware. Access was first gained to the network on November 22, 2019 and continued until November 25. Remote access was rapidly terminated before information was encrypted.

The investigation found no evidence to suggest any patient information was accessed or downloaded by the attackers, but during the investigation it was determined that certain patient information had not been backed up and could not be recovered. The types of data lost included names, patient-created medical histories, and details of the care those patients received at Manchester Ophthalmology.

Patients have been advised to exercise caution and monitor their accounts and explanation of benefits statements for any sign of fraudulent use of their information. Manchester Ophthalmology has provided further training to employees to ensure the proper backup of all information.

The breach report submitted to the Department of Health and Human Services’ Office for Civil Rights indicates up to 6,846 patients were affected by the security breach.

UnitedHealthcare Alerts Patients About 2019 Data Breach

On January 31, 2020, the Minnetonka, MN health insurer, UnitedHealthcare, announced it was the victim of a data breach in 2019 in which the private information of some of its customers in South Carolina was potentially compromised.

UnitedHealthcare was notified about the data breach on December 10, 2019 and determined that at some point between July 30, 2019 and Nov 13, 2019 an unauthorized individual gained access to the health information of certain members through its member portal. Only members’ first and last names, health plan information, and medical claims data was compromised.

UnitedHealthcare said it is assisting with the law enforcement investigation and steps have been taken to prevent further breaches of this nature in the future. The HHS’ Office for Civil Rights Breach portal indicates 934 individuals were affected by the breach.

2,713 Individuals Informed of Cook County Health Mailing Error

Chicago, IL-based Cook County Health has started notifying 2,713 individuals that some of their protected health information was sent to a third-party vendor in error. The information related to individuals participating in a #keepingitLITE study and was sent to a vendor who was due to assist with mailing study information.

The list of study participants, which was limited to names, addresses, and email addresses, was sent before a business associate agreement was in place. A business associate agreement confirms that a vendor agrees to implement safeguards to ensure the privacy and security of any information. Without the BAA, satisfactory assurances that those safeguards were in place had not been received by Cook County Health.

Action has now been taken to ensure similar errors are prevented in the future.

The post Data Breaches Reported by Manchester Ophthalmology, UnitedHealthcare, and Cook County Health appeared first on HIPAA Journal.

Website Error Exposed Personal and Health Data of LabCorp Patients

Researchers at TechCrunch have identified a security flaw in a website hosting an internal customer relationship management system used by the clinical laboratory network LabCorp. While the system was password protected, the researchers found a flaw in the part of the system that pulled patient files from the back-end system. The flaw allowed patient data to be accessed without requiring a password and the web address was visible to search engines.

Google had cached only one document containing the health data of a patient, but by changing the document number in the web address the researchers were able to open other documents containing patient health information.

The researchers examined a small selection of files to see what types of data had been exposed. The documents mostly contained information about patients who had tests conducted by LabCorp’s Integrated Oncology specialty testing unit. The documents contained personal information such as names and dates of birth, lab test results and diagnostic data, and for some patients, Social Security numbers.

TechCrunch researchers used computer commands to determine the number of documents accessible on the website. They structured the commands to return information about the properties of the files, rather than opening the documents, to avoid accessing patient information. The analysis revealed around 10,000 documents could potentially be accessed.

TechCrunch notified LabCorp about the issue and the server was taken offline while the flaw was corrected. The link to the exposed data has not yet been removed from Google, but it is no longer active and cannot be used to view patient data.

The is the second major security incident to be experienced by LabCorp in the past 12 months. The records of LabCorp patients were exposed in the 26 million-record breach at American Medical Collection Agency (AMCA) in March 2019. 7.7 million LabCorp patients were initially thought to have been affected, but the breach was reported to the HHS’ Office for Civil Rights as having affected up to 10,251,7847 LabCorp patients.

The post Website Error Exposed Personal and Health Data of LabCorp Patients appeared first on HIPAA Journal.

Iowa Department of Human Services Notifies 4,484 Patients About Improper Disposal Incident

The Iowa Department of Human Services has notified 4,784 individuals about the potential exposure of some of their protected health information.

On November 25, 2019, a member of staff disposed of documents containing the protected health information of Dallas County clients in a regular garbage dumpster, instead of sending the records for shredding. By the time the improper disposal incident was discovered, the dumpster had been emptied. An investigation was launched which revealed the custodial employee who disposed of the paperwork was unaware that the documents contained confidential information.

It was not possible to determine exactly which patients were affected, so notification letters were sent to all individuals potentially impacted by the breach. The documents likely contained information such as names, dates of birth, mailing addresses, driver’s license numbers, Social Security numbers, disability information, medical information, banking and wage information, receipt of Medicaid, mental health information, provider names, prescriptions, and substance abuse and illegal drug use information.

Clearbrook Nursing Home Residents Notified of Impermissible Disclosure of Prescription Information

688 residents of the Cedarbrook nursing home in Lehigh County, PA are being notified that their prescription information was accidentally shared with companies interested in tendering for the nursing home’s pharmacy contract.

An email was sent to 16 companies in December 2018 with an incorrect file attachment. The correct file contained invoice information detailing the medications prescribed in October through November. The file attached to the email included the names of the patients who received those medications.

The error was discovered promptly, and requests were sent to all 16 companies asking for the file to be deleted. All 16 companies, which were HIPAA-covered entities, confirmed that the file had been deleted.

All affected individuals have been notified about the privacy breach out of an abundance of caution. The risk of misuse of patient information is believed to be very low. Procurement procedures have now been updated and require all outgoing contract information to be checked by a supervisor prior to being sent.

The post Iowa Department of Human Services Notifies 4,484 Patients About Improper Disposal Incident appeared first on HIPAA Journal.

Beaumont Health Discovers 20-Month Insider Breach

Beaumont Health, a not-for-profit 8-hospital health system based in Southfield, MI, has discovered a former employee has accessed the medical records patients without authorization and is understood to have shared protected health information with another individual.

An internal investigation was launched when it was discovered medical records had been accessed without authorization. A review of the former employee’s access logs revealed the unauthorized access first occurred on February 1, 2017 and continued until October 22, 2019. The breach was discovered in December 2018.

Beaumont Health said its internal investigation determined on December 10, 2019 that the medical records of 1,182 patients were accessed over a period of 20 months. The information potentially obtained and disclosed included names, addresses, contact telephone numbers, dates of birth, email addresses, health insurance information, reason why medical care was sought, and Social Security numbers.

The individual to whom the information was believed to have been disclosed was affiliated with a personal injury lawyer. Most of the patients whose records were accessed had sought treatment for injuries sustained in motor vehicle accidents.

When unauthorized access was confirmed, the employee was fired for violating hospital policies and HIPAA Rules. The incident has been reported to law enforcement and Beaumont Health said it will assist law enforcement if prosecution is pursued. The matter has also been reported to the Michigan Health and Hospital Association.

All patients affected by the incident have been notified by mail. Credit monitoring and identity theft protection services have been offered to patients whose Social Security number was compromised. Patients have been advised to be alert to the risk of identity theft and fraud and have been advised to check their explanation of benefits statements and accounts carefully and to report any suspected cases of misuse of their information.

Beaumont Health has taken steps to update internal policies and procedures to prevent similar incidents from occurring in the future.

Former VA Employee Sentenced for Leaking Medical Records of Former Army Major

A former employee of the Department of Veteran Affairs’ Benefits Administration has been sentenced for accessing the medical records of veterans without authorization and for leaking the medical records of a former U.S. Army major who ran for Congress in West Virginia in 2018.

Jeffrey Miller, 40, of Huntington, WV, pleaded guilty to accessing the medical records of 6 veterans, including the former Army Major, Richard Ojeda. Photographs of the records were taken and sent to an acquaintance. The image of Ojeda’s medical records was subsequently distributed to high-ranking Republicans in an attempt to influence his 2018 campaign for the 3rd Congressional District in West Virginia.

Miller was sentenced on January 21, 2020 in federal court and will serve 6 months in jail.

The post Beaumont Health Discovers 20-Month Insider Breach appeared first on HIPAA Journal.

Nearly 200,000 Patients Impacted by PIH Health Phishing Attack

PIH Health, a 2-hospital nonprofit healthcare network based in Whittier, CA, has started notifying nearly 200,000 patients about a potential breach of their personal and protected health information in June 2019.

On June 18, 2019, PIH Health discovered the email accounts of certain employees had been accessed by unauthorized individuals as a result of a targeted phishing attack on its employees. The email accounts were immediately secured and an investigation was launched to determine the nature and extent of the breach.

PIH Health engaged leading cybersecurity experts to assist with the investigation and was notified on October 2, 2019, that the email accounts were subject to unauthorized access between June 11, 2019 and June 18, 2019.

The email accounts were then reviewed by the same cybersecurity experts to determine whether they contained any patient information. The review was completed on November 12, 2019. PIH Health then attempted to obtain up to date contact information for current and former patients affected by the breach. Notifications were sent by mail to those individuals on January 10, 2020.

The phishing attack has been reported to the Department of Health and Human Services Office for Civil Rights. The summary on the OCR breach portal indicates up to 199,548 patients were potentially affected by the attack.

Patients have been advised to monitor their account statements and to report any suspected fraudulent account activity. Patients have also been offered complimentary credit monitoring and identity theft protection services through Kroll for 12 months.

“The privacy and protection of private information is a top priority for PIH Health,” wrote PIH Health in its substitute breach notification. “PIH Health deeply regrets any inconvenience or concern this incident may cause.”

The post Nearly 200,000 Patients Impacted by PIH Health Phishing Attack appeared first on HIPAA Journal.

December 2019 Healthcare Data Breach Report

There were 38 healthcare data breaches of 500 or more records reported to the Department of Health and Human Services’ Office for Civil Rights in December 2019, an increase of 8.57% from November 2019.

While the number of breaches increased, there was a major reduction in the number of exposed healthcare records, falling from 607,728 records in November 2019 to 393,189 records in December 2019 – A drop of 35.30%. In December the mean breach size was 10,347 records and the median breach size was 3,650 records.

It has been a particularly bad year for healthcare data breaches. 2019 was the second worst ever year for healthcare data breaches in terms of the number of patients impacted by breaches. 41,232,527 healthcare records were exposed, stolen, or impermissibly disclosed in 2019. That’s 195.61% more than 2018. More healthcare records were breached in 2019 than in the previous three years combined.

healthcare records exposed by year

The number of reported data breaches also increased 36.12% year-over-year, from 371 breaches in 2018 to 505 breaches in 2019. That makes 2019 the worst every year in terms of the number of reported healthcare data breaches.

Healthcare data breaches in 2019

Largest Healthcare Data Breaches in December 2019

The largest healthcare data breach reported in December affected Truman Medical Center in Kansas City, MO and involved the protected health information of 114,466 patients. The records were stored on a company-owned laptop computer that was stolen from the vehicle of an employee. The laptop was password-protected but was not encrypted.

8 of the top 10 breaches in December were hacking/IT incidents. The Adventist Health Simi Valley, Healthcare Administrative Partners, Cheyenne Regional Medical Center, SEES Group, and Sinai Health System breaches were due to phishing attacks. Roosevelt General Hospital discovered malware on an imaging server and Children’s Choice Pediatrics experienced a ransomware attack.

The Colorado Department of Human Services breach was due to a coding error on a mailing and Texas Family Psychology Associates discovered an unauthorized individual had accessed its electronic medical record system.

Name of Covered Entity Covered Entity Type Type of Breach Individuals Affected
Truman Medical Center, Incorporated Healthcare Provider Theft 114,466
Adventist Health Simi Valley Healthcare Provider Hacking/IT Incident 62,000
Roosevelt General Hospital Healthcare Provider Hacking/IT Incident 28,847
Healthcare Administrative Partners Business Associate Hacking/IT Incident 17,693
Cheyenne Regional Medical Center Healthcare Provider Hacking/IT Incident 17,549
SEES Group, LLC Healthcare Provider Hacking/IT Incident 13,000
PediHEalth, PLLC, dba Children’s Choice Pediatrics Healthcare Provider Hacking/IT Incident 12,689
Sinai Health System Healthcare Provider Hacking/IT Incident 12,578
Colorado Department of Human Services Healthcare Provider Hacking/IT Incident 12,230
Texas Family Psychology Associates, P.C. Healthcare Provider Unauthorized Access/Disclosure 12,000

 

Entities Affected by December 2019 Healthcare Data Breaches

28 healthcare providers reported breaches of 500 or more healthcare records in December. Four health plans were affected by data breaches and 6 business associates of covered entities reported a breach. One additional breach had some business associate involvement, but the breach was reported by the covered entity.

December 2019 Healthcare Data Breaches by Covered Entity

Causes of December 2019 Healthcare Data Breaches

There were 21 hacking/IT incidents reported by HIPAA-covered entities and business associates in December. 226,774 healthcare records were exposed or stolen in those incidents. The mean breach size was 10,798 records and the median breach size was 5,991 records. The incidents mostly consisted of phishing attacks, ransomware and malware infections, and coding errors.

There were 11 cases of unauthorized accessing of healthcare data and impermissible disclosures of protected health information due to a mix of insider errors and malicious actions by employees. These incidents involved 46,364 healthcare records. The mean breach size was 4,214 records and the median breach size was 3,500 records.

There were two theft incidents reported and three incidents involving lost electronic devices and paperwork containing protected health information. 118,877 records were lost or stolen in those incidents. The mean breach size was 23,775 records and the median breach size was 1,100 records. There was also one case of incorrect disposal of paperwork involving documents containing the PHI of 1,174 patients.

Causes of December 2019 healthcare data breaches

Location of Breached Protected Health Information

The chart below clearly indicates the difficulty healthcare organizations have securing their email systems and protecting them against unauthorized access. The majority of the email incidents in December 2019 were phishing attacks in which unauthorized individuals obtained the login credentials of employees and used them to remotely access their email accounts.

Email security solutions can block the majority of phishing and malware-laced emails, but some phishing emails will slip through the net. It is therefore important – and a requirement of HIPAA – to provide regular security awareness training to employees to help them identify malicious emails. Multi-factor authentication should also be implemented. In the event to email credentials being obtained by unauthorized individuals, in the vast majority of cases, MFA will prevent those credentials from being used to remotely access email accounts.

Location of Breached PHI - December 2019

December 2019 Healthcare Data Breaches by State

December data breaches were reported by HIPAA-covered entities and business associates in 22 states and the District of Columbia. Texas was the worst affected with 4 breaches, 4 breaches were reported by entities based in California and Illinois, Florida experienced 3 breaches, and two breaches were reported by entities based in Colorado, Georgia, and Tennessee.

A single breach was reported by entities based in Alaska, Connecticut, Louisiana, Maryland, Michigan, Missouri, New Mexico, New York, Ohio, Oklahoma, Pennsylvania, North Carolina, South Carolina, Washington, Wyoming, and District of Columbia.

HIPAA Enforcement Activity in December 2019

The Department of Health and Human Services’ Office for Civil Right closed December with two further enforcement actions against covered entities that were discovered to have violated the HIPAA Rules.

The first financial penalty of the month to be announced was a settlement with Korunda Medical LLC. This was the second financial penalty imposed on a HIPAA-covered entity under OCR’s HIPAA Right of Access Initiative. OCR investigated Korunda Medical following receipt of a complaint from a patient who had not been provided with a copy of her medical records. OCR issued technical assistance, but a further patient submitted a similar complaint a few days later and a financial penalty was determined to be appropriate. Korunda Medical settled the case for $85,000.

The second penalty was imposed on West Georgia Ambulance for multiple violations of HIPAA Rules. OCR launched an investigation following receipt of a breach notification about the loss of an unencrypted laptop computer. OCR discovered longstanding noncompliance with several aspects of the HIPAA Rules. A risk analysis had not been conducted, there was no security awareness training program for employees, and West Georgia Ambulance had failed to implement HIPAA Security Rule policies and procedures. West Georgia Ambulance settled the case for $65,000.

2019 HIPAA Enforcement Actions

In total, there were 10 financial penalties were imposed on covered entities and business associates in 2019, comprising 2 Civil Monetary Penalties and 8 settlements totaling $12,274,000.

Entity Penalty Penalty Type
West Georgia Ambulance $65,000 Settlement
Korunda Medical, LLC $85,000 Settlement
Sentara Hospitals $2,175,000 Settlement
Texas Department of Aging and Disability Services $1,600,000 Civil Monetary Penalty
University of Rochester Medical Center $3,000,000 Settlement
Jackson Health System $2,154,000 Civil Monetary Penalty
Elite Dental Associates $10,000 Settlement
Bayfront Health St Petersburg $85,000 Settlement
Medical Informatics Engineering $100,000 Settlement
Touchstone Medical imaging $3,000,000 Settlement

Figures for this report were calculated from the U.S. Department of Health and Human Services’ Office for Civil Rights Research Report on January 21, 2020.

The post December 2019 Healthcare Data Breach Report appeared first on HIPAA Journal.

Phishing Attack Reported by Adventist Health Sonora

Adventist Health Sonora in California has discovered an unauthorized individual has gained access to the email account of a hospital associate and potentially viewed patient information.

The email account breach was detected by Adventist Health Sonora’s information security team on September 30, 2019. Immediate action was taken to secure the compromised Office 365 account and an investigation was launched to determine the extent of the breach.

The investigation confirmed that access to the Office 365 account was gained following a response to a phishing email and that it was an isolated incident. No other email accounts or systems were affected.

The purpose of the attack appears to have been to redirect invoice payments and defraud the hospital and its vendors, rather than to obtain sensitive patient information.

According to Adventist Health Sonora, a comprehensive review of the affected account revealed on October 14, 2019 that the account contained the protected health information of 2,653 patients. The types of information exposed included names, dates of birth, medical record numbers, health insurance information, hospital account numbers, and medical information related to the care provided at the hospital.

No evidence was uncovered to suggest any patient information was acquired by the attacker but, out of an abundance of caution, affected patients have been notified and offered complimentary identity theft protection services for 12 months.

Great Plains Health Has Recovered 80% of Systems Impacted by November 2019 Ransomware Attack

Great Plains Health in North Platte, NE, experienced a ransomware attack in November 2019 which saw its network encrypted. The decision was taken not to pay the ransom and instead to restore systems from backups. It has been a time-consuming and painstaking process, but hospital officials have announced that the process is now 80% completed.

Restoration of systems was prioritized with the most important patient systems restored first. It took two weeks for critical patient systems to be recovered. Members of staff worked round the clock to ensure systems were restored in the shortest possible time frame. Throughout the attack and recovery process patients continued to receive medical services and no patients were turned away or redirected to other healthcare facilities.

Hospital officials have now announced that all major IT systems have now been brought back online and the ransomware attack is no longer having any impact on any kind of patient care. Only archives now need to be restored, which contain information rarely used by the hospital.

The post Phishing Attack Reported by Adventist Health Sonora appeared first on HIPAA Journal.