Security

Cyber-crime

185K people's sensitive data in the pits after ransomware raid on Cherry Health

Extent of information seized will be a concern for those affected


Ransomware strikes at yet another US healthcare organization led to the theft of sensitive data belonging to just shy of 185,000 people.

Michigan-based Cherry Health reported a data breach to regulators on Wednesday caused by a ransomware attack back in December 2023.

The health center, which operates across six counties within the state, also revealed the scale of the sensitive data stolen by the group. In addition to names, email and home addresses, phone numbers, and dates of birth, data that could be used to increase the perceived legitimacy of a phishing campaign was also gathered:

All of these data points were mentioned in a template notification letter [PDF] prepared for bulk distribution. However, Cherry Health's report to the Office of the Maine Attorney General suggests that simply listing "financial account information" may have been underplaying the severity here.

The filing in Maine mentioned bank account or credit/debit card numbers were stolen in combination with one of the following: security code, access code, password, or PIN for the account.

The healthcare organization said in the letter: "We take the privacy of information in our care very seriously. At this time, there is no evidence that any of your information has been, or will be, misused. In an abundance of caution, we are providing you information about the incident, our response, and steps you can take to further protect your information should you feel it is necessary to do so.

"On December 21, 2023, Cherry Health experienced a network disruption, that affected our ability to access certain systems. Upon learning of this, we immediately began an investigation with the support of third-party specialists. Through the investigation, we learned that some data we maintain was accessed improperly. We then took steps to determine the types of information that were at risk and the individuals to whom it pertained. On March 25, 2024, this process was completed, and we worked to notify you as soon as possible."

Individuals caught up in the data breach have been offered the requisite 12 months of credit monitoring, and according to the HTML in the letter template, it seems some may be offered up to 24 months.

The attack type was listed as ransomware, but no criminal crew has yet stepped forward to claim responsible.

However, in common ransomware scenarios, stolen data is used as leverage to extort a victim. If they pay, the data doesn't get published – it's known as the double extortion method, which has proven quite successful for criminals in recent years.

The attack comes fresh off the heels of the massively disruptive incident at Change Healthcare, which this week was revealed to have cost parent company UnitedHealth $872 million in remediation costs to date. ®

Send us news
6 Comments

Like whitebox servers, rent-a-crew crime 'affiliates' have commoditized ransomware

Which is why taking down chiefs and infra behind big name brand operations isn't working

Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand

Feds warn gang still rampant and now cracked 300+ victims around the world

Qilin ransomware gang boasts of cyberattacks on cancer clinic, Ob-Gyn facility

'No regrets' crew continues extorting victims, leaking highly sensitive data

Extortion crew threatened to inform Edward Snowden (?!) if victim didn't pay up

Don't laugh. This kind of warning shows crims are getting desperate

'Uber for nurses' exposes 86K+ medical records, PII in open S3 bucket for months

Non-password-protected, unencrypted 108GB database … what could possibly go wrong

Rhysida pwns two US healthcare orgs, extracts over 300K patients' data

Terabytes of sensitive info remain available for download

Uncle Sam charges alleged Garantex admins after crypto-exchange web seizures

$96B in transactions, some even labeled 'dirty funds,' since 2019, say prosecutors

Cybercrims now licking stamps and sending extortion demands in snail mail

First crooks gave up encrypting data, and just stole it – now they don't even bother pilfering info. Sheesh!

Microsoft signed a dodgy driver and now ransomware scum are exploiting it

Five flaws found in Paragon Partition Manager's kernel-level .sys

New kids on the ransomware block channel Lockbit to raid Fortinet firewalls

It's March already and you haven't patched?

International cops seize ransomware crooks' favorite Russian crypto exchange

Did US Secret Service not get the memo, or?

Allstate Insurance sued for delivering personal info on a platter, in plaintext, to anyone who went looking for it

Crooks built bots to exploit astoundingly bad quotation website and made off with data on thousands