Cybercrime , Fraud Management & Cybercrime , Healthcare

Victim Count Doubles in Heart Institute Data Theft Hack

Tennessee Practice So Far Faces 5 Proposed Class Action Lawsuits
Victim Count Doubles in Heart Institute Data Theft Hack
Image: The Chattanooga Heart Institute

The number of people affected by a Tennessee cardiac care clinic hack has more than doubled to 411,000 since the healthcare group first reported the incident to regulators in July. Cybercriminal group Karakurt claimed responsibility for the attack, which has so far triggered five class action suits.

See Also: 9 Common Security & Compliance Risks and What You Can Do to Overcome Them

The Chattanooga Heart Institute told the Maine attorney general in a supplemental data breach report filed on Oct. 6 that the total number of affected individuals in a cyberattack on its IT network discovered in April 17 had risen to nearly 411,400 people - including 47 Maine residents.

The Chattanooga, Tennessee-based group in July reported to the U.S. Department of Health and Human Services and the Maine state regulator that the incident had affected 170,450 individuals, including five Maine residents (see: Tennessee Heart Clinic Tells 170,000 of Hacking, Data Breach).

The Chattanooga Heart Institute includes three vascular surgeons and 27 cardiologists at four locations in Tennessee and one in Georgia. In its breach notice, the cardiac practice said its ongoing investigation into the incident had determined that an "unauthorized third party" gained access to its network between March 8 and March 16 and obtained copies of some of the data from its systems containing confidential patient information.

The firm said hackers did not retrieve data directly from the group's electronic medical record system. Potentially compromised information includes name, mailing address, email address, phone number, birthdate, driver's license number, Social Security number, account information, health insurance information, diagnosis and condition information, lab results, medications and other clinical, demographic or financial information.

The cardiac care clinic so far faces five proposed federal class action lawsuits involving the incident. The lawsuits allege, among other claims, that the clinic was negligent in its failure to protect plaintiffs' and class members' sensitive information.

"Since defendant's discovery of the attack, Karakurt, a financially motivated cybercrime group that steals data before demanding payment from victims by threatening its publication, has publicly claimed responsibility for it," alleges the lawsuit filed by plaintiff Stephen Cahill on Aug. 15 in a Tennessee federal court.

"This criminal group relies exclusively on data theft to extort victims but does not deploy ransomware to encrypt files and systems. Instead, the group exploits vulnerabilities or weak credentials of the computer network. Once inside the network, it uses off-the-shelf tools and applications, often native to the victim system, to meet its objectives," the lawsuit complaint alleges.

"Plaintiff and class members have been damaged by the compromise and exfiltration of their private information in the data breach, and by the severe disruption to their lives as a direct and foreseeable consequence of this data breach," the complaint alleges. As a result of the data breach, plaintiffs and class members face a heightened and imminent risk of fraud and identity theft, among other crimes, the lawsuit alleges.

The HHS' Health Sector Cybersecurity Coordination Center issued an alert in August 2022, warning that the "relatively new cybercrime group" had carried out attacks globally, including against several U.S.-based healthcare and public health sector entities.

Cahill's lawsuit, as well as the other proposed class actions, seeks damages and a court order for The Chattanooga Heart Institute to improve its data security practices.

An attorney representing The Chattanooga Heart Institute did not immediately respond to Information Security Media Group's request for comment and for additional details about the incident, including why the number of affected individuals has climbed so steeply since July.

Regulatory attorney Paul Hales of the Hales Law Group, which is not involved in The Chattanooga Heart Institute case, said several factors are likely contributing to why the number of individuals affected by the breach has climbed so dramatically as the investigation into the incident continues.

"Protected health information received by The Chattanooga Heart Institute resides in a vast information network including Chattanooga's business associates and the Organized Health Care Arrangement in which Chattanooga participates," he said. "The ongoing investigation may be discovering disclosures of PHI from multiple locations compromised by the cyberattack. Malicious software is designed to migrate stealthily through information systems."

Notification of all major HIPAA breaches must be made within 60 days of discovery, including subsequent breaches discovered during an ongoing investigation, he said. Sometimes additional critical information about a data breach is uncovered as the investigation continues, after initial breach notification and reporting have been done.

"Expert forensic analysis, including examination of the systemwide procedural safeguards is necessary to highlight vulnerabilities in Chattanooga's extended health information system that caused the breach," he said.


About the Author

Marianne Kolbasuk McGee

Marianne Kolbasuk McGee

Executive Editor, HealthcareInfoSecurity, ISMG

McGee is executive editor of Information Security Media Group's HealthcareInfoSecurity.com media site. She has about 30 years of IT journalism experience, with a focus on healthcare information technology issues for more than 15 years. Before joining ISMG in 2012, she was a reporter at InformationWeek magazine and news site and played a lead role in the launch of InformationWeek's healthcare IT media site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.