Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Breaches

Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen

Compromised data includes names, dates of birth, Social Security numbers, health and insurance information, and driver’s license numbers.

Kentucky healthcare organization Norton Healthcare is informing about 2.5 million individuals that their personal information was compromised in a ransomware data extortion hack earlier this year.

The incident was identified on May 9, 2023, and involved unauthorized access to certain network storage systems for two days, the company said.

The Louisville-based Norton Norton Healthcare, which runs 140 locations in Greater Louisville and Southern Indiana, said it determined that the attackers exfiltrated files containing the personal information of current and former patients and employees, and dependents.

In mid-November, Norton Healthcare determined that the compromised information included names, contact information, dates of birth, Social Security numbers, health and insurance information, and medical identification numbers.

“In some instances, the data may also have included driver’s license numbers or other government ID numbers, financial account numbers, and digital signatures,” the organization said in an incident notice posted on its website.

According Norton Healthcare, its medical record system and the Norton MyChart application service (which allows patients to access their medical records from their mobile devices) were not affected.

Advertisement. Scroll to continue reading.

While the notice did not say how many individuals were affected, Norton Healthcare informed the Maine Attorney General’s Office that the attackers stole the personal information of 2.5 million individuals.

The organization said that it did not pay the ransom demands.

In May 2023, shortly after the incident occurred, the BlackCat/Alphv ransomware group claimed responsibility for the incident, threatening to leak roughly 4.7 terabytes of data allegedly stolen from Norton Healthcare.

The Tor-based BlackCat/Alphv leak site has been inaccessible since December 7, following what is believed to be a law enforcement takedown operation. According to Cisco, BlackCat was the second most active ransomware group this year.

Related: Ransomware Group Files SEC Complaint Over Victim’s Failure to Disclose Data Breach

Related: Ransomware Group Starts Leaking Data From Japanese Watchmaking Giant Seiko

Related: Ransomware Gang Takes Credit for February Reddit Hack

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.