Former Ubiquiti dev charged for trying to extort his employer
New malware hides as legit nginx process on e-commerce servers
Nine WiFi routers used by millions were vulnerable to 226 flaws
Emotet now spreads via fake Adobe Windows App Installer packages
Microsoft Edge now bashes Google Chrome when you download it
Phishing actors start exploiting the Omicron COVID-19 variant
Twitter removes 3,400 accounts used in govt propaganda campaigns
Hackers use in-house Zoho ServiceDesk exploit to drop webshells
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Search Redirect
Remove the Search Redirect
Remove the Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
Planned Parenthood
​Planned Parenthood Los Angeles has disclosed a data breach after suffering a ransomware attack in October that exposed the personal information of approximately 400,000 patients.
According to a data breach notification sent to Planned Parenthood Los Angeles (‘PPLA’) patients, the cyberattack occurred between October 9th and 17th, allowing threat actors to steal files from the compromised network.
“On October 17, 2021, we identified suspicious activity on our computer network. We immediately took our systems offline, notified law enforcement, and a third-party cybersecurity firm was engaged to assist in our investigation,” explained the notification sent to affected patients.
“The investigation determined that an unauthorized person gained access to our network between October 9, 2021 and October 17, 2021, and exfiltrated some files from our systems during that time.”
However, it wasn’t until November 4th that PPLA determined that the stolen files contained patients’ personal information, including their “address, insurance information, date of birth, and clinical information, such as diagnosis, procedure, and/or prescription information.”
In a statement to the Washington Post, who first reported on the breach, PPLA spokesperson John Erickson said the stolen files contained the personal data of approximately 400,000 patients and the breach was caused by a ransomware attack.
When threat actors conduct ransomware attacks, they lurk in a compromised network for days, if not weeks, while quietly stealing files and uploading them to their servers.
Once they have finished harvesting valuable data, the threat actors deploy ransomware to encrypt all the devices on the network.
They then use the stolen data as leverage to scare victims into paying a ransom, or the data will be publicly released on a ransomware gang’s data leak site.
It is unknown what ransomware gang is responsible for the attack and whether a ransom has been paid.
However, if a ransom is not paid, we will likely learn who is responsible after the data is published.
As the stolen data is said to contain medical information, including the procedures undertaken at PPLA, the public release of the data could significantly impact affected patients.
While no financial information was exposed by the breach, names, addresses, date of birth, and health information was accessed that could allow threat actors to perform more targeted attacks.
Due to this, all affected patients should be on the lookout for strange emails or SMS texts regarding their PPLA visits, health information, or other related information.
If patients receive any emails claiming to be from PPLA and asking for sensitive information, they should immediately contact Planned Parenthood to see if the emails are legitimate.
DNA testing firm discloses data breach affecting 2.1 million people
Marine services provider Swire Pacific Offshore hit by ransomware
Utah medical center hit by data breach affecting 582k patients
7 million Robinhood user email addresses for sale on hacker forum
Robinhood discloses data breach impacting 7 million customers
Not a member yet? Register Now
Former Ubiquiti dev charged for trying to extort his employer
Microsoft Exchange servers hacked to deploy BlackByte ransomware
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


You May Also Like

Firefox users can't reach — here's what to do

Microsoft December 2021 Patch Tuesday fixes 6 zero-days, 67 flawsNew ransomware now…

Researchers discover 14 new data-stealing web browser attacks

FBI: Cuba ransomware breached 49 US critical infrastructure orgsResearchers discover 14 new…

Tor’s main site blocked in Russia as censorship widens

Emotet now drops Cobalt Strike, fast forwards ransomware attacksSonicWall ‘strongly urges’ customers…

Facebook to delete 1 billion faceprints in Face Recognition shutdown

CISA orders federal agencies to fix hundreds of exploited security flawsUS sanctions…