• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Data Stolen from America’s Largest Fertility Clinic Operator

You are here: Home / General Cyber Security News / Data Stolen from America’s Largest Fertility Clinic Operator

Information like Social Security numbers has been stolen from the largest fertility clinic operator in the United States in a cyber-attack. 

US Fertility runs 55 clinics at many destinations in 10 of America’s 50 states. The company, established in May 2020, is the outcome of a partnership in between private fairness firm Amulet Capital Partners and Shady Grove Fertility. 

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Premium Security 2021

Protect yourself against all threads using AVAST Premium Security. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium.

Get AVAST Premium Security with 60% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cyber-criminals attacked US Fertility’s network with ransomware in September, impacting pretty much fifty percent of its locations. The enterprise responded by getting a number of its servers and workstations offline, launching an investigation into the incident, and notifying federal regulation enforcement.

The corporation provided notice of the incident on November 25, stating: “On September 14, 2020, USF expert an IT security celebration (the “Incident”) that associated the inaccessibility of specific computer devices on our network as a final result of a malware infection. We responded to the Incident immediately and retained third-party computer system forensic experts to guide in our investigation.

“Through our quick investigation and reaction, we established that data on a selection of servers and workstations related to our domain experienced been encrypted by ransomware.”

Digital forensic professionals observed that while the ransomware experienced been activated on September 14, the attackers had 1st gained entry to US Fertility’s network a thirty day period before, on August 12. 

Through the months they put in inside the network, the attackers experienced accessibility to information that contained client info. Sensitive data accessed involved names, addresses, dates of birth, MPI figures, and Social Security figures. 

US Fertility verified that the attackers acquired “a minimal selection of data files” in the course of the interval of unauthorized entry. 

“Be sure to also notice that we have no evidence of precise misuse of any individual’s facts as a outcome of the Incident,” said the business. 

Following the attack, US Fertility fortified the security of its firewall and engaged digital forensic experts to keep an eye on network action and remediate any suspicious exercise.

“We acquire this incident very seriously and are committed to defending the security and confidentiality of overall health details we assemble in offering companies to people,” claimed Mark Segal, main executive officer of USF.


Some areas of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Macos Users Targeted By Oceanlotus Backdoor MacOS Users Targeted By OceanLotus Backdoor
Next Post: Ransomware Attack on Baltimore County Schools Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.