• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Scripps Notifying 147K People of Data Breach

You are here: Home / General Cyber Security News / Scripps Notifying 147K People of Data Breach
June 2, 2021

A California healthcare service provider is informing far more than 147,000 individuals that their own knowledge might have been exposed in a latest cyber-attack.

Scripps Well being, which operates five acute-treatment hospitals in San Diego, among the other facilities, took most of its network offline after detecting a ransomware infection at the beginning of Might. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The San Diego–based nonprofit system suspended entry to a number of programs, which includes MyScripps and scripps.org. 

Although the greater part of Scripps’ network has now been restored, the attack triggered 4 months of disruption, with patient appointments’ owning to be canceled or rescheduled. Workers had been forced to count on offline documentation solutions, and ambulances experienced to be diverted, triggering a surge of clients at other local facilities.

Soon after understanding that Personalized Identifiable Information (PII) was uncovered in the attack, Scripps has begun the course of action of notifying 147,267 folks that their information may perhaps have been compromised. 

Facts uncovered involves well being information, Social Security quantities, driver’s license quantities, and monetary information. 

In a letter mailed to people Tuesday, Scripps mentioned that an investigation into the security incident had decided that an unauthorized particular person had acquired obtain to the health care provider’s network and exfiltrated copies of some files prior to deploying ransomware.

The company said: “Importantly, this incident did not final result in unauthorized accessibility to Scripps’ electronic health-related report software, Epic. However, wellness info and private money details was obtained via other documents stored on our network.”

Scripps said that when it had not found proof that any of the exposed information had been employed to commit fraud, it would be featuring credit history checking to some men and women impacted by the attack. 

“For the much less than 2.5% of individuals whose Social Security range and/or driver’s license amount ended up concerned, we will be giving complimentary credit rating monitoring and identification defense help expert services,” reported the firm. 

The investigation into what files were exposed is ongoing, and Scripps stated the variety of individuals whose data was breached could increase. 

“We have kicked off an intensive handbook evaluate of all those files. This is a time-intense system that will very likely acquire numerous months, but we will notify affected people and entities as immediately as probable in accordance with relevant regulatory necessities,” the company said.


Some sections of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «revil ransomware ground down jbs: sources REvil Ransomware Ground Down JBS: Sources
Next Post: Teen Crashes Florida School District’s Network Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.