Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

3.3 Million Impacted by Ransomware Attack at California Healthcare Provider

The personal and health information of more than 3.3 million individuals was stolen in a ransomware attack at Regal Medical Group.

The personally identifiable information (PII) and protected health information (PHI) of more than 3.3 million individuals was stolen in a ransomware attack at California healthcare provider Regal Medical Group.

The incident took place on December 1, 2022, but was discovered only a week later, and impacted the Regal Medical Group and affiliates Lakeside Medical Organization, Affiliated Doctors of Orange County and Greater Covina Medical Group.

On February 1, Regal started sending breach notification letters to the impacted individuals, informing them that their data had been compromised in the incident.

Affected PII and PHI includes names, addresses, birth dates, phone numbers, Social Security numbers, diagnosis and treatment information, health plan member numbers, laboratory test results, prescription details, and radiology reports.

“On Friday, December 2, 2022, we noticed difficulty in accessing some of our servers. After extensive review, malware was detected on some of our servers, which we later learned resulted in the threat actor accessing and exfiltrating certain data from our systems,” Regal says in the notification letter.

On February 1, Regal informed the US Department of Health and Human Services about the incident, saying that more than 3.3 million individuals might have been impacted.

Advertisement. Scroll to continue reading.

What the healthcare provider has not revealed was the type of ransomware that was used in the cyberattack and whether a ransom was paid.

However, it mentions in the notification letter that it worked with vendors to restore access to the impacted systems, which suggests that backups might have been used instead.

According to a recent report from Emsisoft, over 200 government, education, and healthcare organizations in the US fell victim to ransomware attacks last year.

Last year, the US warned of Daixin Team and Royal ransomware attacks targeting healthcare providers, but other ransomware families are known to target the healthcare sector as well.

Last week, the US and South Korea issued a joint alert on North Korean government-backed threat actors using the Maui and H0lyGh0st ransomware in attacks targeting healthcare and other critical infrastructure organizations.

Related: Patient Information Compromised in Data Breach at San Diego Healthcare Provider

Related: Data Breach at Louisiana Healthcare Provider Impacts 270,000 Patients

Related: FBI Warns of Cyberattacks Targeting Healthcare Payment Processors

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.