Article Details

Scrape Timestamp (UTC): 2024-11-20 00:33:42.823

Source: https://www.theregister.com/2024/11/20/equinox_patients_employees_data/

Original Article Text

Click to Toggle View

Healthcare org Equinox notifies 21K patients and staff of data theft. Ransomware scum LockBit claims it did the dirty deed. Equinox, a New York State health and human services organization, has begun notifying over 21 thousand clients and staff that cyber criminals stole their health, financial, and personal information in a "data security incident" nearly seven months ago. Adding insult to injury, it appears the LockBit ransomware gang – which was supposed to have been shut down at the time of the incident – may be to blame. Equinox provides mental health and addiction services, domestic violence support, food and housing, and other community services for kids, adults, and families in New York state's capital region. It has ten locations, including residential facilities, and serves 3,500 people annually. On Friday, it began sending notification letters to 21,565 clients and employees, alerting them that scumbags stole digital files containing their personal info – name, address, date of birth, Social Security number, driver's license or other government identification number, passport number, financial account information, health insurance information, medical treatment or diagnosis information, and/or medication-related information. The incident, according to a copy of the letter on the Equinox website, occurred on April 29 and disrupted the org's network access. Equinox says it "immediately" secured its IT environment, hired a top-notch cyber security firm, and started an investigation. "As a result of the investigation, Equinox learned that certain files in its network may have been accessed or downloaded without authorization," the notification reads [PDF]. By September 16, Equinox had reviewed the possibly stolen files, and "determined that some individuals' personal and/or protected health information may have been affected as a result of this incident." Cue the data breach letters – and, we'd guess, lawsuits, since the breach does involve protected health info. Equinox, not to be confused with businesses of the same name, such as the gym chain, did not respond to The Register's inquiries about the security breach, including if it was a ransomware infection. On May 18, the LockBit 3.0 ransomware group listed Equinox on its data leak site, claiming to have swiped 49GB of data. The lowlife group updated the listing on August 11, according to DataBreaches.net, and gave the organization until August 25 to respond before eventually leaking 31.8GB of files. It's worth noting that all of this happened after the high-profile disruption of LockBit back in February. It just illustrates how difficult it is to stop the ransomware scourge despite arrests and infrastructure seizures. As of August, LockBit 3.0 was still the year’s most prolific encryption and extortion gang, according to Palo Alto Networks' Unit 42.

Daily Brief Summary

DATA BREACH // Equinox Health Notifies Thousands After Data Theft by LockBit

Equinox, a health services organization, has started informing 21,565 patients and employees about a data security incident where personal and medical information was compromised.

The LockBit ransomware gang, previously thought to be shut down, claimed responsibility for stealing 49GB of data from Equinox, which affected individuals' sensitive information including Social Security numbers and health records.

The breach was first detected on April 29, significantly disrupting Equinox's network access and leading to an immediate security lockdown and investigation by a top-tier cybersecurity firm.

By September 16, Equinox concluded the review of the potentially stolen files, confirming that certain personal and protected health information was at risk.

Letters were sent out to affected parties, and there may be potential lawsuits due to the breach involving protected health information.

Despite international efforts to dismantle the LockBit operation earlier in the year, the group remains active, evidencing the ongoing challenge of curbing ransomware activities globally.