• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Fertility Clinic Hit with Ransomware

You are here: Home / General Cyber Security News / Fertility Clinic Hit with Ransomware
February 17, 2022

A fertility clinic based in New York Metropolis is notifying people that their personalized info could have been compromised and perhaps stolen through a recent cyber-attack.

Extend Fertility, specializing in IVF and freezing eggs and embryos, was strike with ransomware in December 2021. The clinic employed 3rd-party electronic forensic experts to figure out the incident’s mother nature and scope.

“On December 20 2021, we uncovered a ransomware incident that impacted our networks and servers which contained shielded health and fitness and individual data of some of our individuals,” said Increase Fertility in a information breach notice.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Immediately after discovering the incident, we quickly took actions to safe and safely and securely restore our devices and functions.”

A month-extended investigation into the attack observed that cyber-criminals had entry to servers on which the secured well being data (PHI) and particular info of some of the clinic’s people was stored.

“The investigation decided that on or about December 15, 2021, an unauthorized specific accessed our units and most likely attained some facts,” explained Extend Fertility.

“We have carried out an comprehensive investigation of our data files to identify what information and facts was involved and to determine individuals whose details was possibly impacted.”

Facts potentially compromised in the security incident involves initial and final name, gender, household handle, phone range, email address, and date of delivery, health-related record, prognosis and therapy facts, dates of assistance, lab test results, prescription details, provider title, health care account selection and economical information and facts.

The complete extent of the attack has not however been engaged as the facts investigation is ongoing. Even so, the clinic has started informing individuals whose details may well have been viewed and/or attained. 

The clinic did not condition how a lot of individuals had been impacted by the incident. Positioning the cyber-attack in a broader context, Increase Fertility explained itself as “a single of the many healthcare suppliers confronting the impacts of the evolving cyber danger landscape.”

The clinic is supplying complimentary credit rating monitoring and identity security solutions to people today impacted or included in the incident. Increase Fertility mentioned that it had not found out any evidence to suggest that any affected individual information and facts impacted by the attack has been made use of for identification theft or fiscal fraud.


Some elements of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «baby golang based botnet already pulling in $3k/month for operators Baby Golang-Based Botnet Already Pulling in $3K/Month for Operators
Next Post: Data Privacy Lawsuit Could Cost Meta $90m Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.