{"classes":["ACTION","ASSETS","ACTOR"],"annotations":[null,["Mixcloud data discovered on sale on crime forum;",{"entities":[[28,47,"ACTION"]]}],["checks stolen from purse by nurse;",{"entities":[[0,6,"ASSETS"],[7,24,"ACTION"],[28,33,"ACTOR"]]}],["Akorn Inc., a niche pharmaceutical company Lake Forest, IL, has had a customer database with more than 50,000 records compromised by a hacker who is offering to sell the data to the highest bidder or back to the company, whichever comes first. The database was offered up on a dark web forum by a person known for using SQL Injection and other techniques to target vulnerable companies. Going by the alias \"Mufasa\" the hacker posted basic details on the data earlier this week, noting that it was an Akorn customer database, complete with business related information, including DEA numbers. This is the same hacker who claimed responsibility for the breach at iiNEt, Australia's second largest ISP, earlier this month. DEA registration numbers are assigned to healthcare providers in order to help track controlled substances. While the DEA primarily uses them for tracking, the medical industry uses them as a unique identifier for those who can prescribe narcotics, such as oxycodone, meperidine, or fentanyl, among others. Salted Hash first learned about the incident thanks to a tip form Israeli threat intelligence firm, CyberInt. We reached out to the hacker offering to sell the data, and learned that the breach occurred due to SQL Injection vulnerabilities on the company website. \"Every PHP file on their website was vulnerable to [SQL Injection],\" Mufasa told Salted Hash, \"they had no security whatsoever.\" When contacted by Salted Hash for comment, Akorn confirmed the breach and stated that they were notifying customers. \"Although much of the information acquired is publicly available, we are in the process of notifying our valued customers about this incident,\" Akorn said in a statement. The company added that they're also cooperating fully with law enforcement officials, including the DEA. The compromised data includes customer email address, username, password, business address, and DEA number. There was no financial data stored in the database, which is good because it was being housed with no encryption at all. Screenshots of the records shared with Salted Hash show all fields in clear text, including passwords. It's also possible that due to duplicates, the total number of records is as low as 35,000, but Akorn couldn't comment on exact figures. Given the type of data that has been compromised, phishing is certainly a potential risk in this case, due to the fact that medical practitioners have access to patient records and other sensitive data. Moreover, there is a risk __ albeit slight __ that someone could use the DEA numbers and other information to obtain drugs. However, prescriptions are monitored, so if the same DEA number was to be used more than normal or for drugs not normally prescribed, the fraudster would be caught almost immediately. Unfortunately, sometimes the red flags on a given number can take weeks to be raised. When asked if they had any offers for the data, Mufasa told Salted Hash that there were some offers on the table, but expressed some hesitation about selling the records. However, if someone were to offer the right price, Mufasa would sell. Moreover, if Akorn wanted to purchase the data back, the price is $5,000 USD, Mufasa added. Commenting on why the data was taken in the first place, Mufasa said that they wanted to teach Akorn a lesson in security and to encourage them to use encryption. \"...640mil on buying a company and they couldn't invest in some [website] security.\" The database theft at Akorn is just the latest in a sting of issues for the company. Last month, the company recalled more than 360,000 units of antibiotics made by Hi-Tech Pharmacal, which Akorn bought in 2013 for $640 million. And in April, the company faced a number of class action suits after they overstated their financial results for the last three quarters of 2014. Update: On June 4, Akorn informed the New Hampshire Attorney General that four employee email accounts were compromised earlier this year, and that the incident lasted several weekends before it was detected around April 20. On May 1, the company discovered that personal information was compromised during the earlier incident, but the exact scope of the compromise (e.g. number of records) was not disclosed. However, the notice does say the incident compromised PII (names, Social Security Number, etc.) for the persons \"whose e-mail accounts were compromised (and their associates and relatives) and for additional persons whose information was in human resources and/or payroll-related records.\" When asked for comment in order to confirm this as a separate incident, or as something related to this more recent incident, the company declined to respond.;",{"entities":[[133,141,"ACTOR"],[146,174,"ACTION"],[259,293,"ACTION"],[297,305,"ACTOR"],[316,335,"ACTION"],[340,388,"ACTION"],[399,428,"ACTOR"],[429,479,"ACTION"],[603,618,"ACTOR"],[623,660,"ACTION"],[1160,1170,"ACTOR"],[1171,1196,"ACTION"],[1226,1271,"ACTION"],[1275,1295,"ASSETS"],[1304,1312,"ASSETS"],[1322,1329,"ASSETS"],[1366,1372,"ACTOR"],[2941,2947,"ACTOR"],[2948,3005,"ACTION"],[3011,3063,"ACTION"],[3115,3121,"ACTOR"],[3213,3219,"ACTOR"],[3284,3290,"ACTOR"],[3291,3348,"ACTION"],[3456,3463,"ASSETS"],[3477,3489,"ASSETS"],[3490,3495,"ACTION"]]}],["The business cards for the new Sikeston CBOC are wrong and there are some mis-faxed documents that went to another business (Trailer Express). No information on who's and how much information was mis-faxed.;",{"entities":[[0,18,"ASSETS"],[45,123,"ACTION"],[192,206,"ACTION"]]}],["According to a spokesperson, on January 8, the billing manager took a laptop home with her, with permission. But on the way home, she stopped off to visit an ill friend for 10 minutes, leaving the laptop on the front seat of her locked car. In that short timeframe, someone smashed the window of the car and stole the laptop. The theft was reported to the organization on January 9. UHCS reported the theft to the police and even hired a private detective to try to recover it. As of today, however, the laptop has not been recovered. Frustratingly for everyone, that laptop had password protection but no encryption as it was one of the last remaining laptops scheduled to be updated to add encryption. It took the agency time to compile exactly what information was on the laptop, but using a roaming profile, they were able to determine that data on clients going back to 2002 were on the device. For some clients, the information may have been just a name and address, while for others it may have been name and date of birth, or name and Social Security number. According to the spokesperson, there were very few diagnostic codes or treatment service codes on the laptop. All told, records on 1,318 United Home Care Services of Southwest Florida clients and 12,299 clients of United HomeCare Services, Inc. were on the stolen laptop The 13,617 affected clients were sent a notification letter in February in compliance with Florida’s privacy rule that requires notification within 45 days. On March 8, they were sent a second letter to comply with HIPAA.;",{"entities":[[68,76,"ASSETS"],[193,203,"ASSETS"],[236,240,"ASSETS"],[266,273,"ACTOR"],[274,303,"ACTION"],[308,325,"ACTION"],[500,510,"ASSETS"],[563,574,"ASSETS"],[653,660,"ASSETS"],[772,782,"ASSETS"],[1166,1177,"ASSETS"],[1322,1339,"ASSETS"]]}],["As posted on MetroPlus Health Plans web site: Recently, MetroPlus Health Plan experienced a possible security breach involving some personal information (including name, member identification number, date of birth and social security number) of a number of our members. A MetroPlus employee, while attempting to work off site, sent an e-mail with this information to their personal e-mail account instead of their MetroPlus assigned e-mail account. This action was done in violation of MetroPlus policy and the appropriate disciplinary action has been taken. There is no evidence that information has been misused, and we believe that the likelihood of such misuse is low. We informed affected members immediately about this incident, and have offered reimbursement of a one-year membership in Experians Triple Alert credit monitoring product to all impacted members. MetroPlus takes the protection of personal information very seriously, and we have implemented additional measures to protect that information. We are committed to fully protecting all of the information entrusted to us. For additional information regarding this matter, please contact MetroPlus Customer Services at 1-855-544-0599 or email at Contact Us. According to HHSs public breach tool, the incident occurred on September 6th, and 31,980 members were affected by the incident.;",{"entities":[[79,117,"ACTION"],[258,270,"ASSETS"],[271,291,"ACTOR"],[328,397,"ACTION"],[455,503,"ACTION"],[688,704,"ASSETS"]]}],["Veteran A was mailed his appointment letter along with Veteran B's medical consultation sheet. Veteran Bs full name, full SSN, date of birth, address, and phone number was inappropriate disclosed. Privacy Office will investigate. 01/07/13: Veteran B will be sent a letter offering credit protection services. NOTE: There were a total of 19 Mis-Mailed incidents this reporting period. Because of repetition, the other 18 are not included in this report, but are included in the \"Mis-Mailed Incidents\" count at the end of this report. In all incidents, Veterans will receive a notification letter and/or credit monitoring will be offered if appropriate.;",{"entities":[[10,20,"ACTION"],[25,43,"ASSETS"],[67,94,"ASSETS"],[168,196,"ACTION"],[480,500,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["CALGARY __ A 15-year-old Calgary teen has been arrested and charged with hacking into public school board servers between November 2014 and March 2015. Advertisement Related _ cbe Hacking scare at Calgary public school board _ Anonymous, founded in 2003, operates as a leaderless hacktivist group __ made of up of 'anons' from all corners of the world. Without any leadership, or ranking within the association, anyone can join Anonymous if they wish to join.'Anonymous' claims responsibility for cyber attack that shut down government websites Global News The teen allegedly hacked into the Calgary Board of Education (CBE) servers using phishing e-mails and credentials. Police say once in the server, he accessed corporate and personal information, but wouldn't elaborate on the type of records that were obtained. \"He did commit crimes in the sense that he accessed [information] unlawfully, but with the information he gained, we're not aware of any additional crimes that were committed,\" said Staff Sgt. Ryan Jepson. \"Other than__screenshots that were sent to the media, I'm not aware of what else may have been done with the information.\" Police encourage any victims or people who think they may've been a victim to report it to police. The teen has been charged with: _Personation _Unlawfully altering data _Unlawfully obtaining a computer service _Unlawfully used a computer system with intent to commit the offence by willfully destroying data _Use a computer password that would enable him to commit the offence of fraudulently and without colour of right obtaining directly or indirectly the computer network Jepson said the offences didn't require a \"high degree of sophistication\" on the part of the suspect. \"What is required is a computer and access to the internet, and beyond that, not a high degree of sophistication. Some self-training and you're off to the races, so to speak.\" The teen can't be identified under the Youth Criminal Justice Act; he has been released on bail with conditions. His next court appearance is set for July 23. Global News was contacted by someone in mid-March, who claimed they saw student information dumped on a Facebook site before it was subsequently deleted. The person said they saw student information including email addresses, student grades and other personal information. The CBE issued the following statement in March: \"We have received information from a person alleging to have obtained unauthorized access to a school information system. This claim is being actively investigated. We are also complying with all of our obligations under the Freedom of Information and Protection of Privacy Act. This person may be seeking notoriety and publicity for his/her actions.\" Police say no further details will be released \"in relation to how the suspect gained access to the server.\" Police say the CBE took steps at the time of the incident to notify parents of students who were impacted. Jepson said the Calgary cybercrime unit worked on 416 files last year, and is on pace to exceed that number in 2015. ;",{"entities":[[13,37,"ACTOR"],[73,80,"ACTION"],[106,113,"ASSETS"],[195,202,"ACTION"],[246,255,"ACTOR"],[490,528,"ACTION"],[534,543,"ACTION"],[544,563,"ASSETS"],[583,591,"ACTOR"],[651,658,"ASSETS"],[659,698,"ACTION"],[718,728,"ASSETS"],[733,776,"ACTION"],[853,866,"ACTION"],[888,921,"ACTION"],[1058,1103,"ACTION"],[1275,1283,"ACTOR"],[1307,1319,"ACTION"],[1320,1345,"ACTION"],[1346,1386,"ACTION"],[1387,1421,"ACTION"],[1427,1484,"ACTION"],[1485,1509,"ACTION"],[1532,1569,"ACTION"],[1934,1942,"ACTOR"],[2166,2211,"ACTION"],[2222,2247,"ACTION"],[2472,2511,"ACTION"],[2512,2540,"ASSETS"],[2851,2864,"ACTION"],[2868,2880,"ASSETS"]]}],["Organisation for Security and Cooperation in Europe suffered DoS attack on Wednesday.;",{"entities":[[61,71,"ACTION"]]}],[";",{"entities":[]}],["This letter is to notify you that some of your confidential information may have been released by the Employment Development Department (EDD) in a notice mailed to an employer for whom you did not work. Our analysis of records shows that between September 14, 2013, and October 9, 2013, your full name and social security number (SSN) may have been mailed to an incorrect employer.;",{"entities":[[72,94,"ACTION"],[335,381,"ACTION"]]}],["Voter data accessible via the back-end pathway ;",{"entities":[[0,21,"ACTION"],[26,46,"ASSETS"]]}],["Six individuals were charged late last week with “skimming” more than $200,000 from victims who used their credit or debit cards at Wrigley Field and other Chicago restaurants. A press release from Illinois’ Attorney General Lisa Madigan on Friday alleged that Joseph Woods, 32, was the scheme’s ringleader. Woods paid employees to skim information from credit and debit cards used at restaurants around Greater Chicago. Woods gathered this information and later used it to make counterfeit credit cards which he, and an accomplice, Alex Houston, 22, allegedly used to make illegal purchases with. Woods’ employees, Britain Woods, 33, Essence Houston, 28, Jenette Farrar, 34, and Kenyetta Davis, 31, all of Chicago, were also arraigned on Friday. The four defendants held jobs at 'The Friendly Confines' of Wrigley Field and Ralph Lauren Restaurant, along with local Taco Bell and McDonald’s restaurants. While working there, the employees swiped cards using a small reader given to them by Woods. Bank accounts hit by the scheme include those with Chase, U.S. Bank, Citibank, Harris Bank, American Express, Bank of America and Fifth Third Bank. While the press release isn't exactly clear how many individuals were affected by the scam, a report from a local CBS affiliate, citing a statement from Assistant Attorney General Ansh Vaidya, claims a few dozen victims were affected from 2007 to 2011.;",{"entities":[[0,15,"ACTOR"],[107,128,"ASSETS"],[262,274,"ACTOR"],[309,314,"ACTOR"],[315,349,"ACTION"],[355,377,"ASSETS"],[422,427,"ACTOR"],[428,453,"ACTION"],[464,491,"ACTION"],[492,504,"ASSETS"],[534,546,"ACTOR"],[552,592,"ACTION"],[600,616,"ACTOR"],[618,631,"ACTOR"],[637,652,"ACTOR"],[658,672,"ACTOR"],[682,696,"ACTOR"],[942,989,"ACTION"],[993,999,"ACTOR"]]}],["Social worker called and indicated that she had faxed referral information on a patient to a private fax number instead of the Nursing home. The private individual contacted us stating that he received this information in error and wanted to insure that we did not make this mistake again. The gentleman was asked to destroy this information and was thanked for letting us know.;",{"entities":[[0,13,"ACTOR"],[40,87,"ACTION"],[193,227,"ACTION"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,36,"ACTOR"],[47,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[173,215,"ACTION"]]}],["ransomware by unknown action, but blackmail data leaked as well.;",{"entities":[[0,28,"ACTION"],[34,55,"ACTION"]]}],["There has been a breach of security of Deutsche Telekom employees' personal data, Handelsblatt reported. A company spokesman confirmed a report in Manager Magazin to this effect, and said a limited number of staff members have had access to employees' personal data that ought to have been kept in anonymous form only. He added that there were no signs that the information had been misused. He said the supervisory board had apologised to staff. An external auditor will be commissioned to investigate the privacy breach, and the works council wants a lawyer to be involved, too. Handelsblatt said this case is embarassing to the company as CEO Rene Obermann has expanded data protection in recent years and even set up a separate directorate for the issue. Three years ago, a former security head was sentenced for participating in illegal spying on journalists and employee representatives on the supervisory board.;",{"entities":[[0,23,"ACTION"],[188,221,"ACTOR"],[222,265,"ACTION"],[779,799,"ACTOR"],[814,849,"ACTION"]]}],["Hackers attacked a popular Chinese video-sharing site, breaching millions of private data including encrypted passwords.;",{"entities":[[0,7,"ACTOR"],[8,16,"ACTION"],[49,53,"ASSETS"],[55,64,"ACTION"]]}],["ATM skimming suspect caught on tape;",{"entities":[[0,3,"ASSETS"],[4,20,"ACTOR"]]}],["A Veteran accidently grabbed the appointment list with his records at the front desk. He returned the list to the VA.;",{"entities":[[0,9,"ACTOR"],[10,28,"ACTION"],[29,49,"ASSETS"],[86,88,"ACTOR"],[89,106,"ACTION"]]}],["6,300 Metro Schools teachers may have been stolen by a former Tennessee Department of Treasury employee, though state officials believe those details were not sent elsewhere.;",{"entities":[[29,49,"ACTION"],[53,103,"ACTOR"]]}],["AOL releases search histories for 650,000 subscribers. The identifications of the subscribers were not disclosed, but many were identified by analyzing the search histories. ;",{"entities":[[0,3,"ACTOR"],[123,173,"ACTION"]]}],["We recently learned that one of our service providers, was the victim of an illegal and unauthorized intrusion into its network (“Network Intrusion”) during the first quarter of 2011. Given the size and complexity of the issues, they have continued to investigate the scope and extent of the Network Intrusion. As a result, the service provider recently notified us that they have determined that an unauthorized person had access to files which contain some or all of the following information about you: name, address, birthdate, phone number, drivers license number, passport number, and Social Security Number.;",{"entities":[[76,110,"ACTION"],[120,127,"ASSETS"],[129,148,"ACTION"],[293,311,"ACTION"],[398,420,"ACTOR"],[421,440,"ACTION"]]}],["Adobe said Wednesday it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database. The information was released on Tuesday on Pastebin by a self-proclaimed Egyptian hacker named \"ViruS_HimA.\" The hacker, who claimed the database accessed holds more than 150,000 records, posted links to several websites hosting a text file with 230 records. \"We have seen the claim and are investigating,\" said Wiebke Lips, senior manager with Adobe's corporate communications. The hacker only released records with email addresses ending in \"adobe.com,\" \".mil\" and \".gov.\" A look at the 230 records showed the full names, titles, organizations, email addresses, usernames and encrypted passwords of users in a variety of U.S. government agencies, including the departments of Transportation and Homeland Security, the U.S. State Department, the Federal Aviation Administration and state-level agencies, among others. The published passwords are MD5 hashes, or cryptographic representations, of the actual plain-text passwords. It's a good security practice to only store hashes rather than the plain-text passwords, but those hashes can be converted back to their original state using free password-cracking tools and enough computing power. Shorter passwords are easier to crack, especially if they contain no special characters and are, for example, just a word composed of lower-case letters. Many MD5 hashes that have already been reversed are available in lists freely available on the internet. Some of the MD5 hashes released in the text file revealed simple passwords. That's particularly dangerous given that people tend to reuse passwords for other services. Hackers will typically try to use stolen credentials on sites such as Facebook and Twitter to see if they're valid. Given that the data released on Tuesday includes names and organizations, hackers could act fast in an attempt to steal other information. An email request for an interview with ViruS_HimA wasn't immediately returned. The hacker wrote there's another data leak soon to be released from Yahoo. ;",{"entities":[[107,134,"ACTION"],[140,159,"ASSETS"],[161,189,"ACTION"],[218,269,"ACTOR"],[270,280,"ACTOR"],[294,306,"ASSETS"],[542,552,"ACTOR"],[558,595,"ACTION"],[1578,1592,"ASSETS"],[1628,1645,"ASSETS"],[1738,1745,"ACTOR"],[1772,1790,"ASSETS"],[1904,1909,"ASSETS"],[1929,1936,"ACTOR"],[1966,1993,"ACTION"],[2034,2044,"ACTOR"],[2074,2084,"ACTOR"]]}],["While disposing trash, a Veteran noticed files in a dumpster on campus. date of birth, and home address). The files were dated 2007 through 2011, and appear to have originated from the Patient Business Office.;",{"entities":[[33,60,"ACTION"],[107,116,"ASSETS"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Stolen laptop;",{"entities":[[0,6,"ACTION"],[7,13,"ASSETS"]]}],["Medisys Health Group reported a ransomware attack impacting the information of 60,000 patients;",{"entities":[[32,49,"ACTION"],[86,94,"ASSETS"]]}],["The Casino Rama Resort in Ontario said the hacker claimed to have stolen financial reports, patron credit inquiries, collection and debt information, payroll and other data in an intrusion it first became aware of on Friday.;",{"entities":[[39,49,"ACTOR"],[58,72,"ACTION"],[73,90,"ASSETS"],[176,188,"ACTION"]]}],["Internal actors, conspiring with external actors used access to customer PII to add themselves as authorized users of victim payment cards.;",{"entities":[[0,15,"ACTOR"],[17,32,"ACTION"],[33,48,"ACTOR"],[49,76,"ACTION"],[77,115,"ACTION"],[119,125,"ASSETS"],[126,140,"ASSETS"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["CPA firm discloses breach of customer data, no information provided on how data was compromised, nor who was responsible.;",{"entities":[[19,25,"ACTION"],[29,37,"ASSETS"]]}],["The Texas Department of State Health Services (DSHS) recently announced that it's investigating a former DSHS Mount Pleasant clinic employee who is alleged to have stolen credit card and other personal information from clients. The former employee, Selena Patino, was arrested on January 4 on fraud and credit card abuse charges. She had worked in the DSHS Mount Pleasant clinic since 2008, then was hired by the Northeast Texas Public Health District in October 2012. She was fired on January 3.;",{"entities":[[96,140,"ACTOR"],[156,170,"ACTION"],[171,182,"ASSETS"],[219,227,"ASSETS"],[229,248,"ACTOR"],[250,263,"ACTOR"],[294,321,"ACTION"],[331,334,"ACTOR"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["ATM Overlay that actually captured physical card was installed then retrieved;",{"entities":[[0,3,"ASSETS"],[35,48,"ASSETS"],[49,77,"ACTION"]]}],["There has been a new finding in an investigation by the Privacy Commissioner of New Zealand that is especially worth noting for it's \"small breach, big impact\" value. Because the health agency is not named, it's not clear to me whether this incident had been reported in the media and on this site previously: The complainant, who had been employed by a large health agency, was notified by the agency that a former colleague of hers had been dismissed for accessing her health records without proper reason. The complainant and her former colleague had worked in administrative roles, but had access to health records and medical information. The records 'browsed' by the complainant's former work-mate included extremely sensitive emergency department and mental health information about the complainant. The complainant's records were accessed on numerous occasions between 2012 and 2013. This showed a pattern of behaviour and gave meaning and context to some comments her former colleagues had made about her health while they worked together. After finding out about this the complainant asked for an audit of access to her records so she could be sure no other staff she had worked with had inappropriately accessed her health information. The access audit revealed a further instance of browsing of the complainant's health information by another former colleague over the same time period. This was especially distressing for the complainant because it renewed the complainant's concerns that her colleagues had treated her unfairly and had been sharing her sensitive health information with each other. Rule 5 Security safeguards Rule 5 of the Health Information Privacy Code 1994 requires an agency to ensure reasonable security safeguards exist to prevent loss, unauthorised access or disclosure of the health information it holds. Assessing what is reasonable depends on the sensitivity or confidentiality of the information involved and the ease with which safeguards could be put in place to protect the information. The agency's current policies and practices, including any staff training, are also relevant. Under rule 5, an agency has an ongoing responsibility to develop and maintain appropriate security safeguards for their information. System audits, staff training, policies and technology upgrades are some of the tools an agency can employ to help maintain a good privacy culture and ensure trust and confidence in the security and privacy of health information. Inappropriate access to information by employees, called 'employee browsing', is a problem for many large agencies. It is important agencies take a proactive approach to information security and make continuing efforts to put in place and improve their security processes. Although the health agency took a proactive, sympathetic and responsible approach to the interference with the complainant's privacy, it had limited processes in place to catch inappropriate access to their files. The extent of the browsing and length of time before detection also indicated the safeguards in place were not adequate. The browsing took place over several months and was not an isolated incident. The fact that people she worked with were responsible heightened the complainant's feelings of violation and humiliation.;",{"entities":[[408,434,"ACTOR"],[458,509,"ACTION"],[595,644,"ACTION"],[671,705,"ACTOR"],[835,870,"ACTION"],[975,996,"ACTOR"],[1197,1249,"ACTION"],[1351,1375,"ACTOR"],[1506,1520,"ACTOR"],[1550,1616,"ACTION"],[2980,2986,"ASSETS"]]}],["Japanese web portal suffers data breach of customer information. Brute force was the cited method used in the article.;",{"entities":[[9,19,"ASSETS"],[20,64,"ACTION"],[65,97,"ACTION"]]}],["Web.com disclosed a breach which resulted in unauthorized access to client data;",{"entities":[[0,7,"ASSETS"],[20,26,"ACTION"],[45,64,"ACTION"]]}],["Employee steals customer credit card and makes unauthorized purchases;",{"entities":[[0,8,"ACTOR"],[9,15,"ACTION"],[16,24,"ASSETS"],[25,36,"ASSETS"],[41,69,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["website hacked and information sold on dark web;",{"entities":[[0,7,"ASSETS"],[8,14,"ACTION"],[19,47,"ACTION"]]}],["The Dr. R. Burnham & Associate s Medical Clinic in Lacombe has informed Alberta Health Services that a portable hard drive recently stolen from this clinic contained ba ckup copies of Alberta Health Services’ Central Alberta Pain & Rehabilitation Institute (CAPRI) client records. The CAPRI program is co - located in the Dr. Burnham clinic. Although there is no indication that data stored on this portable hard drive data has been accessed at this time, AHS is reminding CAPRI clients to be vigilant about their personal information following this theft.;",{"entities":[[103,122,"ASSETS"],[132,138,"ACTION"],[265,280,"ASSETS"],[399,418,"ASSETS"],[424,441,"ACTION"]]}],["More than 700 public patients and hundreds more in the private system have had their privacy breached after letters from their specialists to GPs were found dumped in a Sydney bin.;",{"entities":[[70,101,"ACTION"],[108,115,"ASSETS"],[157,180,"ACTION"]]}],["Patients who visited Sutter Health's Alta Bates Summit Medical Center, Sutter Delta Medical Center, or Eden Medical Center may have had their names, Social Security numbers, dates of birth, gender, addresses, zip codes, home phone numbers, marital status, names of employers, and work phone numbers exposed. The Alameda County Sheriff's office notified Sutter Health of the potential breach on May 23. It is unclear what the source of the breach might be.UPDATE (06/10/2013): The information was found during a narcotics raid. The personal information of nearly 4,500 patients was discovered.;",{"entities":[[0,8,"ASSETS"],[299,307,"ACTION"],[385,391,"ACTION"],[437,447,"ACTION"]]}],["A company that sends out SMSes and emails on Nedbank’s behalf may have been hit by a data breach. The “data security incident” may have released the names, ID numbers, telephone numbers, physical and/or email addresses of 1.7 million Nedbank clients. In a statement on Thursday morning, Nedbank said that there was a “data incident” at the direct marketing company Computer Facilities, which sends emails and cellphone messages on its behalf. “No Nedbank systems or client bank accounts have been compromised in any manner whatsoever or are at risk as a result of this data issue at Computer Facilities.” Forensic experts have been appointed to conduct an extensive investigation and the bank is also working with the relevant regulators and authorities, Nedbank CEO Mike Brown said. Nedbank Group Chief Information Officer Fred Swanepoel said Computer Facilities did not have any links to Nedbank’s systems. As a further precautionary measure, Computer Facilities’ systems have been disconnected from the internet until further notice. Clients’ bank accounts are not at risk and they do not need to take any further action other than continuing to be vigilant against attempts at fraud, Nedbank said. Two years ago, hackers seized insurance company Liberty's email repository and demanded a \"ransom\" in exchange for the data. Other incidents included the theft of 60 million South Africans’ personal data via a holding company for several real estate firms including Realty1, ERA and Aida. The personal records of almost 1 million South African drivers were also reportedly compromised through the online traffic fine website ViewFine, while in 2017 Ster-Kinekor's website was also exposed for lacking data security. At the end of last year, many South Africans who view pornography on their mobile phones were affected by a massive breach. A local company reportedly leaked a large database of web browsing history along with mobile-phone identifiers, and in some cases social media usernames, allowing some individuals to be identified – and linked to the pornography they viewed.;",{"entities":[[66,97,"ACTION"],[102,126,"ACTION"],[318,333,"ACTION"],[366,385,"ASSETS"],[393,428,"ACTION"],[585,606,"ASSETS"],[847,866,"ASSETS"],[893,911,"ASSETS"],[948,976,"ASSETS"],[1222,1229,"ACTOR"],[1230,1281,"ACTION"],[1286,1304,"ACTION"],[1358,1367,"ACTION"],[1560,1592,"ACTION"],[1672,1679,"ASSETS"],[1680,1723,"ACTION"],[1815,1849,"ACTION"],[1877,1883,"ACTION"],[1892,1900,"ASSETS"],[1936,1948,"ASSETS"],[1980,1992,"ASSETS"],[2053,2091,"ACTION"]]}],["The Johnson City School System faced a similar situation in February when the wrong personal information cards were inadvertently sent home with Woodland Elementary School students. Debra Bentley, the systems supervisor of instruction and communication, said some students in six classes at Woodland were sent home with the wrong emergency cards, which can include students addresses, home telephone numbers and Social Security numbers. The principal asked staff to send students emergency contact cards home in the childrens communication folders, hoping parents would review them and send corrections or updates back to the school, but some cards were put in the wrong folders and went home with the wrong students. The administration later offered to pay for one-year subscriptions to LifeLocks services for each family affected.. Read more: Personal records of all Elizabethton students accidentally emailed to parent | Johnson City Press http://www.johnsoncitypress.com/article/118907/personal-records-of-all-elizabethton-students-accidentally-emailed-to-parent#ixzz3D6VV4VAQ Follow us: @JCPress on Twitter | JohnsonCityPress on Facebook;",{"entities":[[78,134,"ACTION"],[300,345,"ACTION"],[457,462,"ACTOR"],[638,678,"ACTION"],[683,717,"ACTION"],[849,865,"ASSETS"],[895,918,"ACTION"]]}],["Virus outbreak in medical office affects devices that stored medical information. No evidence suggests that data compromise occurred. ;",{"entities":[[0,14,"ACTION"],[41,48,"ASSETS"]]}],["The personal information of up to 7,000 households receiving assistance from the state Department of Social and Health Services (DSHS) was sent in error to incorrect or old addresses, according the state Economic Services Administration (ESA). The administration confirmed in a news statement released Thursday that the private information of at least 2,600 and possibly up to 7,000 client households may have been compromised when a coding error caused letters to be mailed to previous addresses. The letters were mailed between Aug. 19 and Oct. 26 when the error was discovered and corrected, according to the state. ESA said the majority of the letters contained the clients name, address and identification number. Some, however, may have also included home phone numbers, contact information, date of birth, Social Security number, medical diagnosis or disability, other medical, chemical dependency or treatment information, employment or earnings information, and what public-assistance services the client was receiving.;",{"entities":[[135,182,"ACTION"],[245,263,"ACTOR"],[402,427,"ACTION"],[433,454,"ACTION"],[455,462,"ASSETS"],[463,499,"ACTION"],[501,512,"ASSETS"],[513,524,"ACTION"],[648,659,"ASSETS"]]}],["A Nevada medical lab technician who had previously been convicted for Medicaid fraud has been indicted on charges of committing identity theft tied to credit card fraud while out on parole. Legal experts say the case is a reminder to healthcare entities and their business associates to conduct background checks on prospective employees and take other measures to prevent and detect breaches involving insiders. In an Oct. 28 statement, the U.S. Department of Justice said a federal grand jury on Oct. 27 indicted Sherice Joan Williams, of North Las Vegas, on one count of illegal use and disclosure of patient health information and one count of aggravated identity theft. Williams pleaded not guilty to the charges. The FBI handled the investigation in collaboration with local police. Prosecutors say Williams, between about Dec. 1, 2014, and Jan. 27, 2015, while working as a laboratory technician at an unnamed Las Vegas pediatric cardiology practice, allegedly accessed a patient's information without authorization and then used it to apply for credit cards without the patient's knowledge. Criminal History Previously, Williams was convicted on a felony charge of submitting false Medicaid claims, according to a Nov. 4, 2013, statement from the Nevada's state attorney general's office. She was then sentenced to serve 12 to 48 months in prison and pay about $10,000 in restitution, penalties and costs. In that case, prosecutors alleged that Williams, while working for a North Las Vegas behavioral health services firm, had submitted false documentation for services she never provided to a Medicaid recipient. The investigation found that Williams submitted progress notes and subsequent Medicaid claims for time periods where the Medicaid recipient was not receiving the behavioral health services, according to a statement from the Nevada state attorney general's office. The fraud occurred between February and May 2012. Nevada parole board records indicate that even though Williams was sentenced in November 2013 to serve one to four years for the Medicaid fraud crimes, she was granted parole from a state prison a few weeks later, on Nov. 25, 2013, and then was released from prison on Jan. 22, 2014. Parole was granted because Williams had earned credits while serving another concurrent sentence for a previous fraud-related case, a Nevada parole board spokesman says. Parole records indicate that Williams' parole was subsequently revoked on March 19, 2015, and she is currently serving out her Medicaid fraud sentence, the spokesman says. Crane Pomerantz, assistant U.S. Attorney in the Nevada district who is lead prosecutor in the Williams case, declined to comment on the case or the defendant's previous criminal record, and how that potentially could affect sentencing if Williams is convicted on the new ID theft and criminal HIPAA violations. In a statement, prosecutors note that if convicted, Williams faces up to 10 years in prison on the health information charge and a minimum of two years consecutive on the aggravated identity theft charge, plus maximum fines of $250,000 on each count. Preventive Measures Healthcare fraud experts say the Williams case is a warning to other healthcare entities and business associates about the need to scrutinize prospective and current workforce members. \"In commentary to the HIPAA Security Rule, the Department of Health and Human Services states that 'the need for and extent of a screening process is normally based on an assessment of risk, cost, benefit, and feasibility as well as other protective measures in place,'\" notes privacy attorney Adam Greene of the law firm David Wright Tremaine. \"Organizations may wish to consider what information individuals will have access to, and what is the risk that they will use that information for their own financial gain, such as for identity theft purposes. This may lead to more focused background checks, with more stringent standards applied to workforce members who will have access to Social Security numbers, credit card numbers and other high-risk information.\" While background checks can help vet employees, they're not foolproof, notes privacy attorney Kirk Nahra of the law firm Wiley Rein. \"Background checks are important, and healthcare companies should do them generally, but they aren't perfect,\" he says. \"Insider threats are a real and significant issue. In my personal experience, insider problems are far more likely to lead to actual harm than many external breaches.\" Insiders with bad intentions can take exactly what they need for bad purposes, Nahra says. \"This is a consistent and ongoing problem,\" he says. As a result, healthcare organizations must educate their staff on the consequences of inappropriate data access and then monitor their activity, he says. \"People have to know they will get caught and that they will get fired,\" he says. \"But it is hard to balance access to data to get your job done with strong controls and an effective monitoring problem.\" The recent attention on major cyberattacks in the healthcare sector should not divert organizations from addressing insider threats, Nahra stresses. \"But sometimes the focus on hackers ... distracts from this current, ongoing, significant problem with insider threats.\" ;",{"entities":[[0,31,"ACTOR"],[32,84,"ACTION"],[117,142,"ACTION"],[151,162,"ASSETS"],[163,168,"ACTION"],[404,413,"ACTOR"],[576,632,"ACTION"],[661,676,"ACTION"],[677,685,"ACTOR"],[808,816,"ACTOR"],[1056,1068,"ASSETS"],[1132,1144,"ACTOR"],[1177,1209,"ACTION"],[1301,1304,"ACTOR"],[1458,1466,"ACTOR"],[1537,1570,"ACTION"],[1657,1665,"ACTOR"],[1997,2005,"ACTOR"],[2095,2098,"ACTOR"],[2254,2262,"ACTOR"],[2492,2495,"ACTOR"],[2665,2673,"ACTOR"],[2809,2817,"ACTOR"],[2855,2881,"ACTION"],[2935,2943,"ACTOR"],[3188,3196,"ACTOR"],[3799,3858,"ACTION"],[3860,3896,"ACTION"],[4363,4371,"ACTOR"],[4441,4448,"ACTOR"],[4532,4540,"ACTOR"],[4541,4609,"ACTION"],[4733,4738,"ASSETS"],[4762,4787,"ACTION"],[5066,5078,"ACTION"],[5213,5220,"ACTOR"]]}],["SSN emailed to vendor;",{"entities":[[0,21,"ACTION"]]}],[";",{"entities":[]}],["NASHVILLE, TN (WSMV) - Thousands of Comcast customers are believed to be the victims of identity theft. A Midstate woman who worked for the cable company faces charges for leaking customers' personal information. Valerie Nichols, of Pleasant View, has been arrested as part of a multi-state conspiracy involving stealing Comcast customers' personal information and selling it to co-conspirators who set up fraudulent accounts in Louisiana. Nichols worked at the Comcast call center near Opryland. According to the sheriff's department in Caddo Parish, LA, Nichols stole customer information and sold it to a contractor that was paid to open new accounts for Comcast in the Shreveport area. That information was used to set up more than 3,000 fake accounts. The Caddo Parish Sheriff's Department said 10 people have been arrested so far. Officials said this is a multi-million dollar conspiracy. The problem was first discovered when customers came forward saying they were getting collection notices for accounts they didn't know existed. Nichols is currently in jail in Louisiana. Comcast issued a statement commending the sheriff's department for aggressively pursuing the case. Comcast said it has contacted the people affected and will provide them with credit monitoring services. ;",{"entities":[[45,54,"ASSETS"],[89,104,"ACTION"],[106,137,"ACTOR"],[216,231,"ACTOR"],[294,323,"ACTION"],[368,397,"ACTION"],[402,428,"ACTION"],[444,451,"ACTOR"],[561,568,"ACTOR"],[569,595,"ACTION"],[600,623,"ACTION"],[696,762,"ACTION"],[859,901,"ACTION"],[941,950,"ASSETS"],[971,1046,"ACTION"],[1048,1055,"ACTOR"],[1226,1241,"ASSETS"]]}],["School networks brought down for 1 day due to DoS attack.;",{"entities":[[7,15,"ASSETS"],[16,28,"ACTION"],[46,57,"ACTION"]]}],["Connecticut-based Middlesex Hospital recently reported that four of its employees had fallen victim to a phishing scam. The incident was discovered on October 9, 2015, and may affect 946 patients. Information potentially exposed includes names, addresses, dates of birth, medical record numbers, medications, dates of service, and/or diagnoses. Full medical records and Social Security numbers were not affected. \"All patients involved in the breach have been notified and are being offered free credit monitoring for one year, as a precaution,\" Middlesex said in a statement. \"The Hospital is taking all necessary steps to help prevent a similar occurrence in the future.\";",{"entities":[[60,81,"ASSETS"],[82,119,"ACTION"],[198,229,"ACTION"],[445,451,"ACTION"]]}],["First, Minochy Delanois, 29, pulled her Tiger Woods-impersonator boyfriend through the rough telling cops he'd harassed her and had even threatened to send nude pics of her to her bosses at NYU Langone Medical Center after she dumped him. But now, a little more than a year later, the charges against Canh Oxelson, the head of college counseling at Horace Mann School, have been dismissed and Delanois is the one in cuffs. \"These records showed that when she purported to be a victim, she had taken a part of one exchange about the photographs out of context and in fact she had been harassing him,\" said prosecutor Laura Millendorf at Delanois' arraignment Tuesday in Manhattan Supreme Court. Delanois, a nurse, had been relentlessly texting the Tiger Woods look-alike at all hours, \"throwing insults at him about his sexual abilities and adoption as a child,\" the prosecutor said. It was Delanois who first threatened to call Oxelson's employer, and he responded by reminding her he had the nude pictures, Millendorf said. Oxelson, 43, had originally been accused of texting Delanois the nude shots of herself with the messages, \"Good luck loser\" and \"Can't wait for folks to see this one,\" according to the now-dismissed criminal complaint. Oxelson, a Harvard grad, had made good money impersonating the disgraced golf great for more than a decade, earning as much as $3,000 an appearance. Investigators soon discovered Delanois had allegedly stolen medical records of patients in a desperate bid to keep Oxelson in her clutches. \"She told him she was pregnant with his child and showed him images of a positive pregnancy test, ultrasound and hospital lab work to prove it to him,\" Millendorf said. NYU fired the nurse, who faces raps for falsifying business records, computer trespass, forgery, petit larceny and harassment. She turned herself in to the Manhattan DA's Office on Tuesday morning. \"She still truly is the victim,\" said defense lawyer Michael Jaccarino. \"She denies the version of events that prosecutors are alleging.\";",{"entities":[[7,23,"ACTOR"],[107,120,"ACTION"],[138,173,"ACTION"],[458,486,"ACTION"],[531,561,"ACTION"],[574,600,"ACTION"],[639,647,"ACTOR"],[698,706,"ACTOR"],[788,863,"ACTION"],[895,903,"ACTOR"],[914,927,"ACTION"],[994,1011,"ASSETS"],[1091,1105,"ASSETS"],[1430,1438,"ACTOR"],[1453,1487,"ACTION"],[1751,1778,"ACTION"],[1780,1797,"ACTION"],[1799,1806,"ACTION"],[1808,1837,"ACTION"]]}],["The PHI of 1,426 Cancer Care Northwest (CCNW) is potentially at risk after the healthcare provider realized that a notebook containing the information was missing. Information in the notebook included patient names, dates of birth, patient ID numbers, diagnoses, and some treatment information.-;",{"entities":[[75,98,"ACTOR"],[115,123,"ASSETS"],[151,163,"ACTION"],[183,191,"ASSETS"]]}],["Kaiser Permanente says 600 Riverside area members affected by data breach;",{"entities":[[42,49,"ASSETS"],[62,73,"ACTION"]]}],["A computer within the hospital used to track library cards was accessed without authorization. There was no indication that the information was used for any purpose. The info did not include PII or any other sensitive information apart from name and addresses of users.;",{"entities":[[2,10,"ASSETS"],[59,94,"ACTION"],[263,269,"ASSETS"]]}],["ATM skimming operation was conducted in CT by Romanian-based criminal group.;",{"entities":[[0,3,"ASSETS"],[4,22,"ACTION"],[46,76,"ACTOR"]]}],["On February 17, 2012, our client, Washington University in St. Louis discovered that an employee was copying electronic files onto an external hard drive. While the employee was authorized to see the data in these files, they were not authorized to copy the first onto an external drive that he brought to the office. The information contained names, SSNs, addresses, and DOB. ;",{"entities":[[85,96,"ACTOR"],[97,108,"ACTION"],[109,125,"ASSETS"],[134,154,"ASSETS"],[162,174,"ACTOR"],[215,220,"ASSETS"],[247,254,"ACTION"]]}],["A man guessed or accessed the Social Security numbers of Macy's customers in order to exploit a Macy's policy for the purpose of making fraudulent purchases. He then created ID cards that paired his picture with the customer information. A Macy's policy allowed him to charge purchases to the accounts of other Macy's customers by using their Social Security numbers and showing his falsified IDs. ;",{"entities":[[0,5,"ACTOR"],[6,53,"ACTION"],[57,73,"ASSETS"],[83,93,"ACTION"],[136,157,"ACTION"],[159,161,"ACTOR"],[167,183,"ACTION"],[189,238,"ACTION"],[256,287,"ACTION"],[313,329,"ASSETS"],[330,368,"ACTION"],[373,399,"ACTION"]]}],["The private information of an estimated 10.3 million users of online shopping mall Interpark has been stolen by a hacker group. The information includes names, addresses, email addresses, dates of birth and phone numbers. Police launched an investigation after learning about the massive data theft. The e-commerce company apologized Monday. \"On July 11, Interpark became aware that some of our user information had been stolen by a hacker group through an advanced persistent threat attack, and reported the hack to the police the next day,\" said Interpark on its website. An advanced persistent threat (APT) attack is carried out on a compromised system over a long period of time without detection, instead of making a onetime hit. According to the National Police Agency's Cyber Bureau, the attack began in early May. Interpark only became aware of this when the hackers demanded 3 billion won worth of Bitcoins, a cyber currency that is traded like hard cash. The company said highly sensitive information such as resident registration numbers and account passwords were not stolen.;",{"entities":[[93,108,"ACTION"],[109,127,"ACTOR"],[277,300,"ACTION"],[415,430,"ACTION"],[431,448,"ACTOR"],[449,493,"ACTION"],[581,620,"ACTION"],[641,659,"ASSETS"],[796,806,"ACTION"],[868,879,"ACTOR"],[880,920,"ACTION"]]}],["The letter sent out to customers doesn't specify what happened. It only notes that certain Experian consumer information \"may have been accessed without proper authorization.\" The data includes names, addresses, social security numbers, dates of birth and account numbers. Experian is working with Defense Contracts South and law enforcement on investigating the incident. Experian is providing two years of complementary credit monitoring and report through the company's ProtectMyID Elite product. DataBreaches believes someone might have compromised Defense Contracts South database login credentials. It's also worth noting that Experian doesn't usually offer complementary enrollment in the ProtectMyID service. This means that the company has either changed its incident response plan, or this breach is more serious than it appears to be.;",{"entities":[[122,174,"ACTION"],[524,531,"ACTOR"],[532,554,"ACTION"],[579,587,"ASSETS"]]}],["The American College of Cardiology has notified 1,400 institutions some patient data may have been compromised after the data was inadvertently made available to a third party vendor. During a software redesign of the ACC's national cardiovascular data registry, a table of patient data was copied into the software test environment sometime between 2009 and 2010, and the incident was discovered in December;",{"entities":[[89,110,"ACTION"],[126,161,"ACTION"],[164,183,"ACTOR"],[264,303,"ACTION"],[304,333,"ASSETS"]]}],["Hundreds of customers have had money stolen from their bank accounts by a skimming card gang. Officials from AIB, Bank of Ireland and Ulster Bank have contacted customers in Co Donegal after what they believe was an elaborate swindle. Gardai believe skimming devices were put on banklink machines in Donegal town up to six months ago but the con is only coming to light.;",{"entities":[[12,21,"ASSETS"],[31,43,"ACTION"],[69,93,"ACTOR"],[214,235,"ACTION"],[252,280,"ACTION"],[281,298,"ASSETS"]]}],["Two veterans' paperwork was found in the trash can located in an area outside the agent cashier's cage. The traffic is mostly veterans in this area. It is in the opinion of this writer that the paperwork was placed there by the veterans, not realizing the implications of discarding paperwork containing sensitive information. The paperwork contained the veterans' names, addresses, partial social security numbers, and protected health information.;",{"entities":[[14,23,"ASSETS"],[24,46,"ACTION"],[194,203,"ASSETS"],[204,220,"ACTION"],[224,236,"ACTOR"],[283,292,"ASSETS"],[327,340,"ASSETS"]]}],["Marin Medical Practices Concepts electronic medical record system hacked, ransom paid The computer records of Marin Medical Practice Concepts, a Novato company that provides medical billing and electronic medical records services to many Marin physicians, were hacked on July 26. As a result, some Marin doctors were unable to access their patients' medical records for more than a week. information includes vital signs, limited clinical history, documentation of physical examinations, and any record of the communication between patients and their physician during a visit in that 15 day period. Although no financial or personal patient information was found to be compromised, one of the company's backup systems failed during the data-restoration process; the data loss occurred at the time of the system restore due to a faulty backup system not due to the malware;",{"entities":[[44,65,"ASSETS"],[66,72,"ACTION"],[74,85,"ACTION"],[87,99,"ASSETS"],[257,268,"ACTION"],[313,334,"ACTION"],[450,488,"ASSETS"],[666,683,"ACTION"],[696,720,"ASSETS"],[721,763,"ACTION"],[765,821,"ACTION"],[829,851,"ACTION"]]}],["At least 16 hospitals in the United Kingdom are being forced to divert emergency patients today after computer systems there were infected with ransomware, a type of malicious software that encrypts a victim’s documents, images, music and other files unless the victim pays for a key to unlock them. The ransomware is using an NSA exploit leaked by The Shadow Brokers, and has made tens of thousands of victims worldwide, including the Russian Interior Ministry, Chinese universities, Hungarian telcos, FedEx branches, and more. Cybersecurity firm Avast said it had identified more than 75,000 ransomware attacks in 99 countries, making it one of the broadest and most damaging cyberattacks in history. Avast said the majority of the attacks targeted Russia, Ukraine and Taiwan. But U.K. hospitals, Chinese universities and global firms like Fedex (FDX) also reported they had come under assault.;",{"entities":[[44,70,"ACTION"],[102,118,"ASSETS"],[130,154,"ACTION"],[201,219,"ASSETS"],[221,227,"ASSETS"],[245,250,"ASSETS"],[269,299,"ACTION"],[347,368,"ACTOR"],[596,614,"ACTION"],[680,692,"ACTION"],[732,743,"ACTION"],[875,898,"ACTION"]]}],[";",{"entities":[]}],[";",{"entities":[]}],["Veteran A was provided Veteran B's medication.;",{"entities":[[10,22,"ACTION"],[35,46,"ASSETS"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,46,"ACTION"]]}],["PHETCHABUN: Officials have rushed to downplay the theft by a hacker of more than 10,000 patients' personal details from Phetchabun Hospital, describing the information as \"not important\". Phetchabun governor Krit Kongmuang was among those who responded to initial reports on social media that the data of 16 million patients of the Public Health Ministry had been hacked and put up for sale on Sunday. On Tuesday morning Mr Krit quoted the Phetchabun public health office as reporting that data was lost from Phetchabun Hospital, but involved nowhere near as many as 16 million patients. It was only records of patient admissions and discharges, he said. It was not important. \"There will be an investigation and legal action,\" the Phetchabun governor said. The provincial health office did not yet know if or how the stolen information was used, he said. Reports on social media said the personal information of about 16 million patients of the Public Health Ministry had been stolen and put up for sale for US$500, to be paid in a crypto currency. Dr Thongchai Keeratihattayakorn, deputy permanent secretary for public health, said at the Public Health Ministry in Nonthaburi in the afternoon that the hacked information was not in the primary database the hospital used to provide public services, and the hospital continued to operate as normal. The details were in files stored on a separate server used by hospital staff in their daily tasks, he said. \"It did not contain information about patient treatment or results of laboratory tests,\" Dr Thongchai said. \"It only showed if doctors' inspection charts were completed. The data relates to 10,095 patients and includes names, family names, dates of admission and discharge,\" Dr Thongchai said. He then admitted the stolen data also included diagnoses of patients' symptoms. Possible damage included misuse of the stolen names, family names, phone numbers and medical welfare details, he said. Hacked information also included databases of patient appointments, names, family names and phone numbers, along with doctors' shifts and the cost of orthopaedic surgery for 692 patients at the hospital. The risks posed by the theft were still being studied. The data was backed up. The hospital's information system was being examined, Dr Thongchai said. He apologised for the incident. Dr Anant Kanoksilp, information technology director at the Public Health Ministry, said the web-based database that was hacked used an open source programme and was vulnerable. Other servers used by the hospital were not hacked, he said. The attacked server had been disconnected from the outside and the attacker had not demanded any ransom from the hospital, Dr Anant said. Sutthipong Wasusophaphon, deputy secretary-general of the National Health Commission, said that personal health data was confidential and could not be legally disclosed except under specific conditions. Breaches could cause damage and infringe on individuals’ rights. Penaties included a prison term of up to six months and/or a fine of 10,000 baht under the National Health Act, he said.;",{"entities":[[46,55,"ACTION"],[56,67,"ACTOR"],[356,394,"ACTION"],[497,505,"ACTION"],[974,1020,"ACTION"],[1022,1054,"ACTION"],[1252,1260,"ASSETS"],[1404,1410,"ASSETS"],[1779,1808,"ACTION"],[1852,1888,"ACTION"],[1963,1995,"ACTION"],[1996,2005,"ASSETS"],[2187,2196,"ACTION"],[2263,2281,"ASSETS"],[2443,2465,"ASSETS"],[2471,2481,"ACTION"],[2538,2545,"ASSETS"],[2607,2613,"ASSETS"],[2614,2635,"ACTION"],[2657,2669,"ACTOR"],[2670,2715,"ACTION"]]}],["Cleveland Medical Associates Attacked with Ransomware;",{"entities":[[29,53,"ACTION"]]}],["Hackers have got their hands on nearly 6,000 private videos of newborn babies and uploaded them to a video-sharing website, according to a Tuesday report by online news outlet Phoenix New Media. The videos were recorded by the Anhui Women and Children Health Hospital in Hefei, the eastern provincial capital, and were part of a project intended for parents to check in on their hospitalized children. The hospital posted a message to its WeChat public account on Monday in which they apologized to parents and said they had reported the incident to the police. That post has since been deleted. ;",{"entities":[[0,7,"ACTOR"],[8,31,"ACTION"],[45,59,"ASSETS"],[82,122,"ACTION"],[196,206,"ASSETS"],[224,239,"ACTOR"]]}],["Eye test records and personal contact details of hundreds of military personnel including soldiers posted overseas were sent to China in a significant data security breach. ;",{"entities":[[9,16,"ASSETS"],[128,133,"ACTOR"],[134,172,"ACTION"]]}],["Bangalore: Hackers claiming to represent the Syrian Electronic Army have reportedly hacked database of Truecaller, worlds largest collaborative telephone directory. According to the initial reports, the hackers were able to take data from seven databases which include the main one that keeps 450 GB of information.;",{"entities":[[11,18,"ACTOR"],[19,40,"ACTION"],[41,67,"ACTOR"],[84,90,"ACTION"],[91,99,"ASSETS"],[199,210,"ACTOR"],[211,233,"ACTION"],[245,254,"ASSETS"]]}],["Anonymous hacktivists have initiated a campaign called OpLastResort, a new operation that comes in response to the death of Reddit co-founder Aaron Swartz. The first target of this operation is the website of the United States Sentencing Commission (ussc.gov), which the hackers defaced to display their message of protest against the US government and the justice system. Two weeks ago today, a line was crossed. Two weeks ago today, Aaron Swartz was killed. Killed because he faced an impossible choice. Killed because he was forced into playing a game he could not win -- a twisted and distorted perversion of justice -- a game where the only winning move was not to play, the hackers stated. Anonymous immediately convened an emergency council to discuss our response to this tragedy. After much heavy-hearted discussion, the decision was upheld to engage the United States Department of Justice and its associated executive branches in a game of a similar nature, a game in which the only winning move is not to play, they added. The hacktivists admitted that the FBI had managed to infiltrate certain elements of Anonymous last year. They say that these infiltrations have resulted in disproportionate prosecutions. However, now theyre determined to show the FBI that it hasn't managed to cripple their infrastructure and demoralize them. They claim to have infiltrated several government-owned websites and obtained valuable information, including the details of a number of warheads. As part of this first phase of OpLastResort, the hackers have published some details of one warhead which is allegedly primed and armed. We have not taken this action lightly, nor without consideration of the possible consequences. Should we be forced to reveal the trigger-key to this warhead, we understand that there will be collateral damage, Anonymous threatened. We appreciate that many who work within the justice system believe in those principles that it has lost, corrupted, or abandoned, that they do not bear the full responsibility for the damages caused by their occupation. It is our hope that this warhead need never be detonated. Currently, the website of the USSC still displays the hacktivists' protest message.;",{"entities":[[0,21,"ACTOR"],[196,207,"ASSETS"],[269,280,"ACTOR"],[281,332,"ACTION"],[679,690,"ACTOR"],[700,709,"ACTOR"],[1040,1055,"ACTOR"],[1124,1133,"ACTOR"],[1353,1383,"ACTION"],[1409,1417,"ASSETS"],[1422,1451,"ACTION"],[1547,1558,"ACTOR"],[1559,1586,"ACTION"],[1850,1859,"ACTOR"],[1860,1871,"ACTION"],[2163,2174,"ASSETS"],[2193,2201,"ACTION"],[2202,2217,"ACTOR"]]}],["A state representative has asked Minnesotas legislative auditor to investigate a data privacy breach at the Department of Natural Resources. The DNR announced earlier this week that an employee accessed the drivers or motor vehicle records of about 5,000 Minnesotans without authorization. The DNR says that employee is no longer with the agency, and that it found no evidence that the data was sold, disclosed to others or used for criminal purposes. Rep. Rick Hansen, DFL-South St. Paul, says in a letter to Legislative Auditor Jim Nobles that it would be prudent for him to investigate anyway. Officials havent said why the former employee accessed the records. The DNR sent letters this week to the 5,000 affected Minnesotans. They include several journalists and lawyers, but its not clear why.;",{"entities":[[81,100,"ACTION"],[182,193,"ACTOR"],[194,202,"ACTION"],[232,239,"ASSETS"],[267,289,"ACTION"],[308,316,"ACTOR"],[382,399,"ACTION"],[401,420,"ACTION"],[424,451,"ACTION"],[623,642,"ACTOR"],[643,651,"ACTION"],[652,664,"ASSETS"]]}],["2 employees at restaurant used fake identities to secure jobs for the purpose of skimming customer credit cards. At least 30 cards were used to make fraudulent charges. Business suffered significant reduction in business post-breach and was forced to close. ;",{"entities":[[0,11,"ACTOR"],[26,46,"ACTION"],[66,89,"ACTION"],[99,112,"ASSETS"],[125,130,"ASSETS"],[131,168,"ACTION"],[238,258,"ACTION"]]}],["Authorities say 4 charged in MTA skim scam;",{"entities":[[29,32,"ASSETS"],[33,42,"ACTION"]]}],["PDQ said a hacker exploited part of their computer system and accessed personal information from customers. It is believed the hacker gained entry through an outside technology vendor's remote connection tool.;",{"entities":[[11,17,"ACTOR"],[18,41,"ACTION"],[42,57,"ASSETS"],[62,91,"ACTION"],[124,134,"ACTOR"],[135,155,"ACTION"],[187,210,"ASSETS"]]}],["Usernames, credit card information, email addresses, billing addresses, and/or logins were compromised between 4/3 and 4/7. ESI was accessed by unapproved third parties.;",{"entities":[[11,22,"ASSETS"],[86,102,"ACTION"],[129,141,"ACTION"],[142,170,"ACTOR"]]}],["The company filed legal documents related to bankruptcy proceedings with some of its loan customers that exposed sensitive data to anyone who could read the court documents. They have since submitted redacted versions of the documents and offered credit monitoring services to the involved parties.;",{"entities":[[0,11,"ACTOR"],[24,33,"ASSETS"],[105,127,"ACTION"],[163,173,"ASSETS"],[226,235,"ASSETS"]]}],["Health care fraud schemes that defraud insurance companies in this manner victimize both the insurers and the insured who are forced to pay higher premiums;",{"entities":[[12,58,"ACTION"],[122,139,"ACTION"]]}],["On Feb. 5, Denise Tourneur pleaded guilty to illegitimately accessing the health information of seven individuals on 44 separate occasions at the Kaye Edmonton Clinic where she worked. The situation stemmed from a breach discovered by Alberta Health Services and reported to the Office of the Information and Privacy Commissioner (OIPC) in October 2013. The OIPC completed an offence investigation then referred the matter to Crown prosecutors at Alberta Justice. In April 2015 charges were laid.;",{"entities":[[11,26,"ACTOR"],[42,92,"ACTION"]]}],["K12 Inc left student data exposed through insecure mongodb ;",{"entities":[[0,7,"ACTOR"],[8,33,"ACTION"],[51,58,"ASSETS"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["A VA employee reported two Memphis VAMC staff have accessed her medical records on two different occasions. Complainant stated the suspected VA staff are neither providers nor patient care staff, and should not have accessed her medical records - unless they had need to know;",{"entities":[[40,45,"ACTOR"],[46,79,"ACTION"],[144,149,"ACTOR"]]}],["gas pump skimmer, found by employees before use;",{"entities":[[0,8,"ASSETS"],[9,47,"ACTION"]]}],[" Japanese automaker Honda has put some 2.2 million customers in the United States on a security breach alert after a database containing information on the owners and their cars was hacked, according to reports. The compromised list contained names, login names, e-mail addresses and 17-character Vehicle Identification Number--an automotive industry standard--which was used to send welcome e-mail messages to customers that had registered for an Owner Link account. Another 2.7 million My Acura account users were also affected by the breach, but Honda said the list contained only e-mail addresses. Acura is the company's luxury vehicle brand. According to Honda's notification e-mail to affected customers, the list was managed by a vendor. All Things Digital suggested, but could not confirm, that the vendor in question is e-mail marketing firm Silverpop Systems, which has been linked with the recent hacking incidents including that of fast-food giant McDonald's. In a Web page addressing affected customers, Honda said it would be \"difficult\" for a victim's identity to be stolen based on the information that had been leaked. However, it has warned that customers ought to be wary of unsolicited e-mail messages requesting for personal information such as social security or credit card numbers. Compelling scams an 'obvious danger' Graham Cluley, senior technology consultant at Sophos, pointed out that cybercriminals who possess the list may e-mail the car owners to trick them into clicking on malicious attachments or links, or fool them into handing over personal information. \"If the hackers were able to present themselves as Honda, and reassured you that they were genuine by quoting your Vehicle Identification Number, then as a Honda customer you might very likely click on a link or open an attachment,\" he explained in a blog post. Acura customers, he added, could also be on the receiving end of spam campaigns. Cluley noted that the incident serves as a reminder that companies not only need to have adequate measures in place to protect customer data in their hands, they also need their partners and third-party vendors to \"follow equally stringent best practices\". \"It may not be your company [that] is directly hacked, but it can still be your customers' data that ends up exposed, and your brand name that is tarnished,\" he said. ;",{"entities":[[2,26,"ACTOR"],[83,109,"ACTION"],[118,126,"ASSETS"],[179,189,"ACTION"],[369,422,"ACTION"],[540,546,"ACTION"],[912,929,"ACTION"],[1081,1093,"ACTION"],[1199,1262,"ACTION"],[1421,1435,"ACTOR"],[1457,1496,"ACTION"],[1497,1544,"ACTION"],[1549,1598,"ACTION"],[1604,1615,"ACTOR"],[2238,2256,"ACTION"],[2330,2340,"ASSETS"],[2346,2358,"ACTION"]]}],["A data breach at the Wyoming Department of Health publicly exposed COVID-19, influenza and blood alcohol test data from more than a quarter of Wyomingites and some out of state residents, the department announced Tuesday. The breach occurred when an employee erroneously uploaded files containing that data to the public code-hosting platform GitHub. Data for more than 164,000 individuals was uploaded to the site, according to the health department. More than 145,000 people affected are believed to be Wyoming residents who received a COVID-19 or influenza test between January 2020 and March 2021. Blood alcohol test data involved just over 18,000 people, most of whom are Wyoming residents, according to the health department. ;",{"entities":[[0,13,"ACTION"],[50,66,"ACTION"],[228,234,"ACTION"],[249,260,"ACTOR"],[261,308,"ACTION"],[393,408,"ACTION"],[409,417,"ASSETS"]]}],["On 03/19/15, 03/26/15, and 04/02/15, 61 potential research study participants were sent letters with incorrect addresses on three different occasions. Two participants contacted the facility to say that they received letters that included their address, but another person's name instead of theirs. Because the contact database contained information from Veterans who participated in research years ago, staff assumed that this meant that the addresses in that contact database were no longer valid. However, on the morning of 04/13/15, the primary investigator (PI), regulatory coordinator, and study coordinator reviewed the problem. They cross checked the contact database with the mail out recipient list and discovered that the list had been sorted incorrectly, which resulted in up to 61 instances of Veteran A receiving Veteran B's recruitment letter. The recruitment letter(s) indicate that the study being recruited for is a \"PTSD and Smoking Cessation\" study.;",{"entities":[[88,95,"ASSETS"],[96,150,"ACTION"],[217,224,"ASSETS"],[319,327,"ASSETS"],[469,477,"ASSETS"],[667,675,"ASSETS"],[738,765,"ACTION"]]}],["An employee with authorization/legitimate purpose accessed information pertaining to patients. ;",{"entities":[[0,11,"ACTOR"],[50,94,"ACTION"]]}],["A CD with the diagnostic image of Veteran A was provided to Veteran B. Veteran B took the information to the office of the US Senator. The information disclosed was Veteran A's name, PHI and social security number.;",{"entities":[[0,4,"ASSETS"],[25,70,"ACTION"],[135,164,"ACTION"]]}],[";",{"entities":[]}],["emails leaked ;",{"entities":[[0,13,"ACTION"]]}],["theft of trade secrets ;",{"entities":[[0,22,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,46,"ACTION"]]}],[" city of Sumner has fired a temporary employee after she sent information about 3,600 people, mostly residents, to her personal email. ;",{"entities":[[28,46,"ACTOR"],[47,79,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Canada Revenue Agency hacked using Heartbleed bug to acquire data on 900 people;",{"entities":[[22,65,"ACTION"]]}],["Patient information has even been handed freely to a member of the public, who posed as the ex-partner of locum social worker.;",{"entities":[[20,50,"ACTION"],[51,73,"ACTOR"],[79,126,"ACTION"]]}],[";",{"entities":[]}],["Leadership for Education Equality left public open elastic search database;",{"entities":[[0,33,"ACTOR"],[34,50,"ACTION"],[51,74,"ASSETS"]]}],["Employee A turned in a Travel log of patients traveling on Shuttle Bus to the Community Based Outpatient Clinic (CBOC). The information on the log was the patient name, full Social Security Number, phone number and the Clinic they attended.;",{"entities":[[0,10,"ACTOR"],[11,70,"ACTION"]]}],["Accellion's FTA product was compromised through a series of zero day exploits. Many client's were impacted. A number of those client's data was posted to the name and shame website of the threat actor. Ransomware was deployed to many, and litigation settlements happened.;",{"entities":[[24,78,"ACTION"],[93,107,"ACTION"],[140,153,"ACTION"],[184,201,"ACTOR"],[203,229,"ACTION"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,46,"ACTOR"],[47,85,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[178,215,"ACTION"]]}],["An Indiana mental health organization is sending out HIPAA breach notification letters to about 45,000 people after one of its providers failed to encrypt laptops containing clients' medical data and Social Security numbers. Several laptops were stolen from the administrative office of Aspire Indiana on Nov. 7, 2014. An investigation found that emails on the laptops contained client and employees' Social Security numbers, names and addresses as well as personal health information of Aspire clients. 1,548 of those notified had their Social Security numbers compromised. The organization routinely collects data on HIV care data, substance abuse treatment and mental health services. \"Our organization is committed to maintaining the privacy and security of the personal information in our control, and we sincerely regret this incident occurred,\" said Aspire's president and CEO Rich DeHaven, in a public notice. \"We have taken steps to enhance our security, including upgrading our alarm and security systems.\";",{"entities":[[38,52,"ACTION"],[79,86,"ASSETS"],[137,154,"ACTION"],[155,162,"ASSETS"],[234,241,"ASSETS"],[242,253,"ACTION"],[363,370,"ASSETS"],[564,576,"ACTION"]]}],[";",{"entities":[]}],["magecart attack on e-commerce site;",{"entities":[[0,15,"ACTION"],[30,34,"ASSETS"]]}],["The Singapore Taekwondo Federation has been fined S$30,000 after the NRIC numbers of 782 minors were disclosed via PDF documents on its website;",{"entities":[[96,110,"ACTION"],[115,128,"ASSETS"],[136,143,"ASSETS"]]}],["A CareFirst associate preparing claims for processing for a union group health plan inadvertently mailed claims to the wrong claims administrator. The information contained in the claims included each individual's SSN, name and address, and DOB and medical information.;",{"entities":[[0,21,"ACTOR"],[84,146,"ACTION"]]}],["2 laptops stolen from psychiatrist vehicle;",{"entities":[[2,9,"ASSETS"],[10,34,"ACTION"],[35,42,"ASSETS"]]}],["exposed elastic search database;",{"entities":[[0,22,"ACTION"],[23,31,"ASSETS"]]}],["Personal information of approximately 1,800 hospital patients from across UnityPoint Health's operating regions may be at risk from the security breach in the system, which was discovered Aug. 8 during the course of regular audit, the health system said in a press release. UnityPoint opened a review and discovered that an individual employed by a third-party company and not authorized to access the system, had gained access to the EMR system by using a password of individuals who were authorized to access the system for medical purposes. The unauthorized access occurred from February through August 2013. Information that may have been accessed for the impacted patients include names, home addresses, dates of birth, medical and health insurance account numbers and health information related to patient treatment. ;",{"entities":[[145,151,"ACTION"],[155,165,"ASSETS"],[326,348,"ACTOR"],[393,402,"ACTION"],[407,413,"ASSETS"],[415,432,"ACTION"],[436,450,"ASSETS"],[516,526,"ASSETS"],[554,577,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Mille Lacs Health System email accounts were access by unauthorized external parties;",{"entities":[[25,54,"ACTION"],[55,84,"ACTOR"]]}],["City of Miami Police Officer Malinsky Bazile was found guilty Thursday of using his job to steal hundreds of people's identities and commit identity theft.;",{"entities":[[29,44,"ACTOR"],[74,96,"ACTION"],[97,155,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["University Urology, P.C. of Knoxville, Tenn. released a statement on April 11 that detailed how 1,144 patients data had been exposed in 2013 and early 2014. Though the information was limited to patient names and addresses, University Urology said in statement posted on its website that Social Security Numbers, financial account information, clinical information were not exposed. According to the statement, an administrative assistant had gathered the data in efforts to sell it to a competing provider to help gain patient business. Patients began calling University Urology on February 13, 2014 to alert the organization that the competing provider had unexpectedly been soliciting their business. We understand that any breach of protected health information is a concern for our patients. We sincerely regret this situation occurred, said Peggy Kares, HIPAA Security Officer at University Urology, P.C. Following the breach, University Urology spoke with the breaching employee, terminated their employment, revoked their access to protected health information (PHI), changed internal passwords and agreed with the competing organization that received the patient information to destroy it. The organization added that employees would be retrained on patient privacy best practices. University Urology, P.C. is notifying by mail the patients impacted by this breach. While it appears that the information subject to the breach was to be used for patient solicitation and there is absolutely no indication that the information may be used for purposes of identity theft, patients may choose to monitor their credit card, bank, or other financial statements for signs of fraud and identity theft. The level of culpability on the part of the competing provider in this breach is the most interesting part, considering it came to an agreement with University Urology. HealthITSecurity.com will post more details on the breach as they come out.;",{"entities":[[102,132,"ACTION"],[412,439,"ACTOR"],[440,461,"ACTION"],[473,483,"ACTION"],[487,507,"ACTOR"],[633,655,"ACTOR"],[656,704,"ACTION"],[729,735,"ACTION"],[924,934,"ACTION"],[966,988,"ACTOR"],[1439,1478,"ACTION"],[1566,1580,"ACTION"],[1619,1630,"ASSETS"],[1747,1769,"ACTOR"]]}],["Veteran A contacted local VA Police over the weekend to report that he had received a package for Veteran B at the home he recently moved into in the last few weeks. Veteran B left no forwarding address. Veteran A attempted to contact the local VA Pharmacy about the issue and was forwarded to a VA employee who told him the package did not contain any medications. Veteran A was told the box only contained adult diapers. The Veteran has reported to the local Privacy Officer his concerns of this disclosure being a Privacy violation.",{"entities":[[71,83,"ACTION"],[84,93,"ASSETS"],[235,256,"ACTOR"],[321,332,"ASSETS"],[385,392,"ASSETS"],[517,534,"ACTION"]]}],["The Pharmacy Service is attempting to contact Veteran B to acquire his new address to re-send the supplies, but there is not an address for next of kin or emergency contacts in the record and the one phone number available is disconnected.;",{"entities":[[0,20,"ACTOR"],[21,45,"ACTION"],[56,106,"ACTION"],[177,187,"ASSETS"],[192,239,"ACTION"]]}],["mass email was sent out without BCC 200 individual;",{"entities":[[0,23,"ACTION"]]}],["CVS Pharmacy reported vandalism at stores in several markets between May 27 and June 8 resulted in the loss of some patient information. The HHS Breach Portal shows the incident affected 21,289 individuals. The missing information included paper prescriptions, filled prescriptions that had been held in pharmacy waiting bins and vaccine consent forms. Information affected during the vandalism included names, birth dates, addresses, medication names and prescriber information in addition to information about primary care providers. CVS Pharmacy has notified impacted patients. The company has not received reports of any evidence that patient information was misused. \"We place the highest priority on protecting the privacy of our patients,\" reads a statement from CVS Health provided to Becker's. \"The privacy and security of their information is very important to us and we take significant measures to protect it from unauthorized uses and disclosures. Although the circumstances surrounding this incident were beyond our control, we are in the process of considering whether additional safeguards are necessary to further enhance protection of our patients' personal health information.\";",{"entities":[[22,41,"ACTION"],[99,110,"ACTION"],[241,260,"ASSETS"],[662,674,"ACTION"],[931,965,"ACTION"]]}],["Maplesoft is investigating a security breach of its administrative database that took place on July 17th, 2012. As a result of the breach, the perpetrators gained access to some email subscription data, including email addresses, first and last names, and company and institution names. Any financial information held by Maplesoft remains secure, and has not been affected by this security breach. The perpetrators appear to be using email addresses they have taken from the database to spread viruses or malware. The perpetrators are posing as Maplesoft in an attempt to have individuals they email click on a link or download a malicious piece of software. Recipients should not respond to these emails and they should not open any attachments or click on any download links. These emails should be deleted immediately. Maplesoft discovered the security breach after some of Maplesofts customers received what appeared to be a spam email. Notification of the spam email was then immediately posted on the Maplesoft website. Upon investigation by Maplesofts IT staff, the security breach was discovered and Maplesoft took immediate corrective actions to stop the breach and prevent further unauthorized access to Maplesofts databases. All of the individuals affected by the security breach have been alerted by Maplesoft directly. Maplesoft takes the security of our customers and contacts personal information very seriously. We are in the process of notifying all individuals whose information may have been compromised, said Jim Cooper, CEO of Maplesoft. We have locked down our systems to prevent further unauthorized access and we are reviewing our security practices and procedures to help ensure this does not happen again. We deeply regret any inconvenience or concerns that this situation may cause our contacts and customers, added Cooper. ;",{"entities":[[27,44,"ACTION"],[67,75,"ASSETS"],[139,155,"ACTOR"],[156,201,"ACTION"],[376,397,"ACTION"],[399,415,"ACTOR"],[472,484,"ASSETS"],[485,514,"ACTION"],[515,531,"ACTOR"],[532,545,"ACTION"],[595,616,"ACTION"],[620,659,"ACTION"],[900,942,"ACTION"],[1020,1028,"ASSETS"],[1072,1091,"ACTION"],[1228,1238,"ASSETS"],[1276,1295,"ACTION"],[1504,1529,"ACTION"]]}],["Ransomware on a software as a service infrastructure.;",{"entities":[[0,10,"ACTION"],[14,24,"ASSETS"]]}],["OOfficials are investigating a security and privacy breach affecting 900 patients who were treated at the Los Angeles County-USC Medical Center's mental health facility. The breach was discovered April 3 during a search of the home of a nurse who was employed at the Augustus F. Hawkins Mental Health Center, said Michael Wilson, a spokesman for the Los Angeles County Department of Health Services. The investigation was not related to county business, he said. The nurse, whose name wasn't released, allegedly stole documents containing patients' names, medical and insurance information, birth dates, Social Security numbers, diagnoses and other personal information. The nurse has since resigned and is no longer working with the hospital, Wilson said. Patients treated at the Hawkins facility between 2011 and 2015 were affected by the breach, he said. It was unclear whether any of the patients' information was misused. A county team assigned to investigate breaches under the Health Insurance Portability and Accountability Act is conducting an internal probe. County officials have notified the patients by letter as well as the California Department of Public Health. A notice of the breach was also posted on the hospital's website. The Los Angeles County district attorney's Cyber Investigation Response Team is looking into the breach, spokeswoman Jane Robison said. Details about the breach were not released because the case is under investigation. County health employees must undergo privacy training as well as follow a series of procedures designed to protect patient confidentiality. \"Despite all of these procedures, these incidents still happen,\" Wilson said. Meanwhile, free credit monitoring services of up to a year were offered to the affected patients.;",{"entities":[[31,58,"ACTION"],[171,181,"ACTION"],[236,243,"ACTOR"],[465,474,"ACTOR"],[504,519,"ACTION"],[520,529,"ASSETS"],[674,683,"ACTOR"],[841,851,"ACTION"],[919,931,"ACTION"],[1197,1207,"ACTION"],[1345,1355,"ACTION"],[1402,1412,"ACTION"]]}],["Website/DB breach leads to disclosure of 391,000;",{"entities":[[0,10,"ASSETS"],[11,17,"ACTION"],[18,37,"ACTION"]]}],["Janitor is blackmailed into gathering documents from a court.;",{"entities":[[8,22,"ACTION"],[28,37,"ACTION"],[38,47,"ASSETS"]]}],["former fire captain accessed the account of a Wells Fargo customer and issued himself an ATM card in that persons name, then made three withdrawals of $800 each from the account.;",{"entities":[[0,19,"ACTOR"],[20,43,"ACTION"],[71,88,"ACTION"],[89,97,"ASSETS"],[120,150,"ACTION"]]}],["Employee A accessed the medical record of a veteran without a need to know outside their normal duties.;",{"entities":[[0,10,"ACTOR"],[11,38,"ACTION"]]}],["Chequlia Motley of Montgomery, Ala., was sentenced yesterday to serve 36 months in prison for conspiracy and aggravated identity theft, announced Assistant Attorney General Kathryn Keneally of the Justice Department’s Tax Division and U.S. Attorney for the Middle District of Alabama George L. Beck Jr. Motley pleaded guilty to those charges in May 2013. According to Motley’s plea agreement, she was a former state employee who stole identities from state databases and sold them to co-conspirators. As evidence presented at the sentencing hearing showed, Motley had previously worked for the Alabama State Employees’ Insurance Board and stole the personal information of over 100 state workers and their family members from the databases maintained by the board. She provided this information to Veronica Temple, Yolanda Moses and Barbara Murry, who used the stolen identities to file false tax returns that fraudulently requested tax refunds from the IRS. Temple, Moses and Murry were previously convicted and each sentenced in February to 57 months in prison. ;",{"entities":[[0,15,"ACTOR"],[94,134,"ACTION"],[305,311,"ACTOR"],[404,427,"ACTOR"],[432,453,"ACTION"],[460,469,"ASSETS"],[474,503,"ACTION"],[561,567,"ACTOR"],[643,648,"ACTION"],[730,743,"ASSETS"],[774,802,"ACTION"],[803,818,"ACTOR"],[820,833,"ACTOR"],[838,851,"ACTOR"],[853,883,"ACTION"],[884,909,"ACTION"],[915,937,"ACTION"],[973,978,"ACTOR"],[983,988,"ACTOR"]]}],["The website of the Jamaica Information Service (JIS) has been hacked, but the management is seeking to assure that critical information has not been compromised. A visit to the website revealed the following message: \"hacked by Holako\". However, the perpetrator of the attack was not immediately clear. On a subsequent visit, another message appeared saying the site was \"down for maintenance\". The JIS is the Government of Jamaica's main media and information arm. Contacted last this evening, the JIS CEO, Donna-Marie Rowe, said no sensitive information had been lost. \"The aggressor's attempts at breaching our system did not result in access to sensitive data but was constrained to 'surface defacement',\" she said in an email. \"Our security team is undertaking recovery and reinforcement procedures as we speak and the JIS website will resume normal function in short order.\" This development comes weeks after the government warned its employees of a virus being sent via an email. ;",{"entities":[[0,11,"ASSETS"],[53,68,"ACTION"],[174,185,"ASSETS"],[219,235,"ACTOR"],[248,263,"ACTOR"],[267,277,"ACTION"],[337,360,"ACTION"],[361,369,"ASSETS"],[374,397,"ACTION"],[561,575,"ACTION"],[620,626,"ASSETS"],[691,713,"ACTION"],[836,843,"ASSETS"],[964,996,"ACTION"]]}],["Misdelivery of employee PII via erroneous attachment.;",{"entities":[[0,53,"ACTION"]]}],["Dynasplint Systems were compromised in a ransomware attack potentially impacting 102800 individuals;",{"entities":[[11,18,"ASSETS"],[19,35,"ACTION"],[39,58,"ACTION"]]}],["Estonian Data Protection Inspectorate has launched an enquiry into whether privately owned electricity trader 220 Energia OÜ may have breached data protection requirements since its system gave access to the customer database of Elering in a way that enabled to browse personal data of other consumers. The Elering database at andmeladu.elering.ee has data on all electricity sale and transmission contracts signed in Estonia Riho Lodi, IT head of Elering, said that the authentication system used by 220 Energia had only one identifier, the personal ID code. Users were able to fill in all other data fields with random keystrokes. By entering an ID code, users got access to this person’s power consumption and measurement data. Since personal ID codes are not sensitive data, they are available in the public databases.;",{"entities":[[125,171,"ACTION"],[182,188,"ASSETS"],[189,203,"ACTION"],[217,225,"ASSETS"],[237,302,"ACTION"],[304,315,"ACTOR"],[316,324,"ASSETS"],[450,457,"ACTOR"],[488,494,"ASSETS"],[638,678,"ACTION"],[781,824,"ACTION"]]}],["ArbiterSports, the leading platform used by colleges, high schools and youth sports organizations to manage and pay assignments of sports officials, suffered a malicious hack this past summer, according to several public reports and confirmed by SoccerWire through research of court records in multiple states. The attack reportedly involved over 500,000 accounts and resulted in hackers obtaining “Account username and password, name, address, date of birth, email address, and Social Security number”. The company claims they have paid the requested ransom to the attackers and received evidence they subsequently deleted the stolen data. If you referee sports in the United States, odds are you have at some point had an account with ArbiterSports. If so, despite assurances from Arbiter they successfully agreed with their attackers to delete the data stolen in the attack, it is still highly recommended you take immediate action to protect yourself from identity theft and potential financial devastation, should the hack lead to criminals gaining access to your bank accounts. According to a disclosure letter sent to Arbiter’s users, the breach occurred sometime in the week leading up to July 15, 2020, the date which company first noticed the hack. However, this exhaustive list of records published by the Indiana Attorney General’s office lists the date of the initial breach as June 3, 2020. It also reveals that a total of 539,309 accounts were accessed. Multiple filings and notifications confirm the hack resulted in the theft of “account username and password, name, address, date of birth, email address, and Social Security number” of the accounts listed. They reportedly were able to identify and contact the unauthorized party, who demanded payment from Arbiter in exchange for the promise to delete the stolen files. According to information provided by Arbiter, they and the hackers eventually reached a ransom agreement, leading to Arbiter’s they had “obtained confirmation that the unauthorized party deleted the files.” Despite the attack being confirmed to have occurred prior to July 15, and seemingly as far back as June 3, it wasn’t until August 24 that ArbiterSports reported a security breach to multiple states’ Attorney General’s offices, via their D.C.-based law firm BakerHostetler. The community of referees effected, however, remain skeptical of the promise of a hacker to actually delete all data, especially given the amount of time elapsed between the breach and the so-called confirmation of deletion.;",{"entities":[[158,174,"ACTION"],[312,322,"ACTION"],[378,398,"ACTION"],[525,560,"ACTION"],[564,577,"ACTOR"],[582,599,"ACTION"],[618,642,"ACTION"],[824,839,"ACTOR"],[840,879,"ACTION"],[963,977,"ACTION"],[982,1013,"ACTION"],[1039,1048,"ACTOR"],[1049,1086,"ACTION"],[1146,1156,"ACTION"],[1449,1472,"ACTION"],[1508,1524,"ACTION"],[1537,1549,"ACTION"],[1730,1752,"ACTOR"],[1758,1779,"ACTION"],[1804,1843,"ACTION"],[1899,1910,"ACTOR"],[1922,1948,"ACTION"],[2008,2030,"ACTOR"],[2031,2050,"ACTION"],[2406,2414,"ACTOR"],[2415,2442,"ACTION"]]}],["Human error allowed unauthorized access to database that stored job applicants' PII.;",{"entities":[[0,5,"ACTOR"],[6,42,"ACTION"],[43,51,"ASSETS"]]}],["The Litton & Giddings Radiological Associates breach involving its janitorial service sending billing records handled by PST Services, Inc. for recycling instead of shredding was reported on this blog in October 2012. It now appears on HHSs list and indicates that 13,074 patients were affected.;",{"entities":[[46,52,"ACTION"],[86,93,"ACTION"]]}],["Accusations rise on Fargo Company; Discovery Benefits of suspicious activity;",{"entities":[[20,33,"ACTOR"],[57,76,"ACTION"]]}],["doctor's practice plan affiliated with the University of Maryland School of Medicine has notified patients that somebody hacked the account of a physician assistant's email account that contained the personal information of patients. The orthopedics practice at The University of Maryland Faculty Physicians Inc. mailed letters to about 1,500 patients telling them about the incident, according to a news release. There is no forensic evidence showing that personal information was viewed under the security breach, but patients were told out of an \"abundance of caution,\" the doctors said. The email account contained personal patient information, including full names, dates of birth, home addresses, medical record numbers, health insurance information, prescription information, and diagnosis or treatment information. The Social Security numbers of 12 patients were also in the email, but no credit card, banking or other financial information was obtained. No other email accounts, networks or servers were accessed.;",{"entities":[[112,120,"ACTOR"],[121,180,"ACTION"],[497,516,"ACTION"]]}],[";",{"entities":[]}],["Texas-Based Tommie Copper Says Its Customers' Credit Card Numbers Were Stolen;",{"entities":[[46,77,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,46,"ACTION"]]}],["On or about September 16, 2013, a RailWorks corporate employee separated from the company. It is possible that, between December 2012 and September 2013, the employee in question may have had access to employee personal information, including name, social security number, financial account and/or credit card numbers.;",{"entities":[[32,62,"ACTOR"],[154,178,"ACTOR"],[179,201,"ACTION"]]}],["According to court documents, Guillaume worked for a company that performed medical laboratory tests where he had access to medical records with names, dates of birth, and Social Security numbers (personal identity information or PII) of individuals in the course of his employment with that company. During the conspiracy, Guillaume stole PII from the company and sold five thousand individuals PII to Ponds. Guillaume knew that Ponds would use the PII for the filing of fraudulent and unauthorized tax returns. Ponds caused other individuals to file false and fraudulent tax returns with the Internal Revenue Service (IRS) seeking refunds using the PII provided by Guillaume. By then, the group had access to the first 24.5 million accounts, in chronological order of creation.;",{"entities":[[30,39,"ACTOR"],[110,123,"ACTION"],[313,323,"ACTION"],[325,334,"ACTOR"],[335,340,"ACTION"],[366,370,"ACTION"],[411,420,"ACTOR"],[459,513,"ACTION"],[545,558,"ACTION"],[563,585,"ACTION"],[626,641,"ACTION"],[668,678,"ACTOR"]]}],["City of Stratford paid $75k after experiencing a ransomware attack;",{"entities":[[18,22,"ACTION"],[47,66,"ACTION"]]}],["Ransomware attack.;",{"entities":[[0,18,"ACTION"]]}],["Georgia Tech students are furious after the university mistakenly emailed personal information of nearly 8,000 College of Computing students to fellow students. The information included student identification numbers, telephone numbers, dates of birth, addresses, grade-point averages and nations of origin for students born outside the United States;",{"entities":[[40,54,"ACTOR"],[55,73,"ACTION"]]}],["Employee A printed and faxed to a union representative a nursing inpatient note he printed to be used in his defense in a LMR issue. He faxed to a fax machine outside the medical center. The note contained 1 patient's name and social security number.;",{"entities":[[0,10,"ACTOR"],[11,31,"ACTION"],[136,144,"ACTION"],[147,158,"ASSETS"]]}],["documents lost by third party storage facility;",{"entities":[[0,9,"ASSETS"],[10,14,"ACTION"],[15,29,"ACTOR"]]}],["A midwife lost an appointments diary in May which contained details of visits by 78 women to antenatal clinics between January and May this year.;",{"entities":[[0,9,"ACTOR"],[10,14,"ACTION"],[18,36,"ASSETS"]]}],["The personal information of more than 1000 Wayne County employees is compromised after an email mistake by the county's Department of Personnel/Human Resources. A spreadsheet containing the data was mistakenly attached to an email about health insurance. The email went out on Friday to members of AFSCME Locals 25, 409, 1659 and 3309. Union officials say about 1300 people received the email. The attachment contained names, employee ID numbers, social security numbers, birth dates, addresses and other information.;",{"entities":[[66,80,"ACTION"],[87,103,"ACTION"],[107,160,"ACTOR"],[164,175,"ASSETS"],[196,231,"ACTION"],[266,274,"ACTION"],[375,394,"ACTION"]]}],["A security breach on a city of Madison website that exposed 50 Social Security numbers for as long as five years has led the Madison City Clerk's Office to tell everybody who fills out an application there that too much information is not always a good thing. The breach was discovered Dec. 19 when a city employee discovered a Social Security number in a liquor license application that was posted on the city's legislative website.;",{"entities":[[0,17,"ACTION"],[39,46,"ASSETS"],[260,270,"ACTION"],[388,401,"ACTION"],[425,433,"ASSETS"]]}],["A Pakistani hacker going with the handle of H4x0r HuSsY from Pakistani Leets hacking group has hacked and defaced total 250 Israeli websites on a shared server. It seems that hacker got access to a server with multiple vulnerabilities, resulting in defaced the server and leaving his deface page along with a simple note of Hacked by H4x0r HuSsY.;",{"entities":[[0,18,"ACTOR"],[44,55,"ACTOR"],[61,90,"ACTOR"],[91,101,"ACTION"],[106,113,"ACTION"],[146,160,"ASSETS"],[176,182,"ACTOR"],[183,196,"ACTION"],[199,205,"ASSETS"],[237,257,"ACTION"],[258,268,"ASSETS"],[273,331,"ACTION"],[335,347,"ACTOR"]]}],["Hacking incidents at Auburn, Ind.-based DeKalb Health have compromised the personal and health information of more than 1,000 of the system's patients. On Feb. 12, DeKalb Health became aware a server controlled by a contract that operated DeKalb Health's website had been hacked. At that time, the health system discovered 17 of its patients who had utilized its online bill pay website had been affected by the breach. The affected patients' names, addresses, credit card numbers and Social Security numbers were potentially accessed by the hackers, according to the notification letter sent to those affected. Shortly after discovering the bill pay website breach, DeKalb Health also discovered a fraudulent website made to look like the health system's charity donation page had been set up by the hackers. Using the fraudulent website, the hackers sent phishing emails to unknown individuals. DeKalb Health believes the phishing emails were sent to patients whose information was taken from the contractor's hacked server, according to the notification letter. To generate more traffic to the fraudulent page, the hackers also altered DeKalb Health's main website by inserting a link to the fraudulent donation page. On March 27, DeKalb Health discovered information for an additional 24 patients was included on the contractor's hacked server. The affected patients' names, addresses, email addresses, dates of birth, hospital ID numbers, insurance information, Social Security numbers, telephone numbers and demographic information were contained on the compromised server, according to the notification letter. Subsequently, DeKalb Health discovered its database containing the information of 1,320 nursery babies was also contained on the hacked server. The babies' names, weights, lengths, dates of birth and parent names were on the server. The hackers also had access to passwords that would allow them to view the babies' information online, according to the notification letter. As a result of the data breach, DeKalb Health has worked with the contractor to ensure the compromised server no longer contains DeKalb Health patients' information, and the health system is offering one year of free credit monitoring to all affected patients, according to the notification letter.;",{"entities":[[0,17,"ACTION"],[54,106,"ACTION"],[256,263,"ASSETS"],[264,280,"ACTION"],[380,387,"ASSETS"],[388,420,"ACTION"],[510,535,"ACTION"],[536,550,"ACTOR"],[653,660,"ASSETS"],[661,667,"ACTION"],[701,780,"ACTION"],[782,797,"ACTION"],[798,813,"ACTOR"],[814,842,"ACTION"],[844,855,"ACTOR"],[856,879,"ACTION"],[924,956,"ACTION"],[984,998,"ACTION"],[1121,1132,"ACTOR"],[1133,1145,"ACTION"],[1167,1174,"ASSETS"],[1178,1227,"ACTION"],[1349,1356,"ASSETS"],[1672,1680,"ASSETS"],[1754,1772,"ASSETS"],[1850,1861,"ASSETS"],[1862,1873,"ACTOR"],[1879,1892,"ACTION"],[2028,2034,"ACTION"],[2107,2113,"ASSETS"]]}],["unauthorized activity on a small number of production infrastructure servers ;",{"entities":[[0,21,"ACTION"],[69,76,"ASSETS"]]}],["Patient medical information was erroneously send to wrong number via fax transmission;",{"entities":[[0,85,"ACTION"]]}],["A private citizen contacted VA police to report she found a bag on the side of the road. The bag contained personal information that belonged to the owner of the bag (VA physician) and documents that contained Veterans' personally identifiable information (PII) and protected health information (PHI). The list of diabetic patients contained 13 Veterans' full names, age, and full SSN. There was also two appointment lists that contained 14 Veterans' full name, last four digits of the SSN, home phone number. In addition, there was a copy of a PATS report that contained one Veteran's full name and full SSN, one letter from a pharmacy that contained a Veteran's full name and date of birth, one letter from insurance company that contained one Veteran's full name, diagnoses and date of birth.;",{"entities":[[52,88,"ACTION"],[89,96,"ASSETS"],[158,165,"ASSETS"],[185,194,"ASSETS"]]}],["Intrusion into computer systems puts customer cardholder data at risk.;",{"entities":[[0,9,"ACTION"],[15,31,"ASSETS"],[32,70,"ACTION"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,46,"ACTOR"],[47,61,"ACTION"],[67,85,"ACTION"],[86,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[178,215,"ACTION"]]}],["Police removed two illegal electronic skimmers from gas pumps at a Valero station on East Ocean Avenue after receiving a report March 5. The illegal skimmers had been attached to the legitimate card reader in the pump itself, Chisholm said, meaning the thieves were able to open the front of the pump to insert the fake skimmer.;",{"entities":[[52,61,"ASSETS"],[159,179,"ACTION"],[195,206,"ASSETS"],[210,218,"ASSETS"],[250,261,"ACTOR"],[262,301,"ACTION"],[302,329,"ACTION"]]}],["New York City hospital center settles $387,200 HIPAA breach - The federal government in May settled a potential violation of the Health Insurance Portability and Accountability Act with a New York City hospital that reportedly disclosed sensitive health information to a patient’s employer. St. Luke’s-Roosevelt Hospital Center paid $387,200 to settle the potential violations of the HIPAA Privacy Rule and agreed to implement a comprehensive corrective action plan, according to a news release from the Office for Civil Rights of the U.S. Department of Health & Human Services.;",{"entities":[[0,22,"ACTOR"],[53,59,"ACTION"],[100,180,"ACTION"],[188,210,"ACTOR"],[227,246,"ACTION"],[292,328,"ACTOR"]]}],["Restaurant has POS system breached via wifi keylogger installed to capture payment card data as it was processed through the reader.;",{"entities":[[15,25,"ASSETS"],[26,74,"ACTION"],[121,132,"ASSETS"]]}],["Unauthorized access to patient data on screens occurred when a medical professional visited the health authority under the guise of \"job shadowing\";",{"entities":[[0,35,"ACTION"],[39,46,"ASSETS"]]}],["Trillian's blog and forums were involved in a security breach ;",{"entities":[[11,15,"ASSETS"],[20,26,"ASSETS"],[44,61,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,37,"ACTION"],[38,45,"ACTION"]]}],["Forbes hacked by Syrian Electronic Army. Customer details posted to web, and false headlines posted to website;",{"entities":[[7,13,"ACTION"],[14,40,"ACTOR"],[41,67,"ACTION"],[68,71,"ASSETS"],[77,110,"ACTION"]]}],["300,000+ Accounts and details leaked by 0xOmar from Israeli Ministry of Construction and Housing.;",{"entities":[[9,36,"ACTION"],[37,46,"ACTOR"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["A Belmont woman used her position as a nurse and pastors wife to defraud two elderly people. Deborah Costner Taylor pleaded guilty in court Friday to identity theft and obtaining property by false pretense. The 49-year-old woman will serve more than four months behind bars. After entering her plea, Taylor turned to one of her victims and apologized. Im sorry to everyone Ive hurt, and I pray one day that yall can forgive me, she said. Misplaced faith Taylor gained the trust of an elderly man and woman before stealing from them. She is married to the pastor of East Belmont Baptist Church and worked at CaroMont Regional Medical Center in Gastonia at the time of the incidents. Those connections gave her access to the people she victimized, members of her church. Taylor offered to help two elderly members of the congregation who were having medical issues. She helped treat them, looked in on them, changed bandages and then began to access their personal information to her benefit, Gaston County Assistant District Attorney Beth Stockwell said. Criminal charges More than a dozen arrest warrants were issued for Taylor in February 2014. Between 2013 and 2014, Taylor used the mans credit card to make purchases. She also wrote checks to herself from the womans bank account and used the womans identity to open a credit card. Checks totaled nearly $600, and charges totaled about $1,300 from several Gastonia stores. Prior to the identity theft charges, Taylor had already found herself in trouble with the law. Stolen drugs Taylor pleaded guilty in July to stealing painkillers from CaroMont on her days off. Taylor worked for the hospital in 2013 and used her passcodes to take Dilaudid, morphine and oxycodone. She would then note that the medications had been dispensed to patients. The hospitals security system picked up on the discrepancies, and Taylor was arrested in March 2013. She was sentenced to two years of probation. Drug addiction Drug addiction is at the root of Taylors crimes, according to her attorney, David Phillips. Taylor had a back injury years ago. A prescription for Percocet turned into an addiction, Phillips said. Since her July conviction, Taylor spent 134 days in drug rehabilitation, according to her attorney. Jail time Taylor, 49, will spend 135 days behind bars, a sentence that begins Monday. Superior Court Judge Eric Levinson allowed Taylor to wait until Monday to report to jail so she can attend a family members funeral. Once Taylor is released, she will spend five years on probation and complete more than 100 hours of community service.;",{"entities":[[0,15,"ACTOR"],[16,36,"ACTION"],[93,115,"ACTOR"],[147,164,"ACTION"],[169,206,"ACTION"],[207,228,"ACTOR"],[300,306,"ACTOR"],[456,462,"ACTOR"],[463,482,"ACTION"],[515,523,"ACTION"],[535,538,"ACTOR"],[702,720,"ACTION"],[771,777,"ACTOR"],[778,793,"ACTION"],[866,869,"ACTOR"],[870,887,"ACTION"],[929,949,"ACTION"],[1123,1129,"ACTOR"],[1171,1177,"ACTOR"],[1192,1203,"ASSETS"],[1204,1222,"ACTION"],[1223,1226,"ACTOR"],[1232,1247,"ACTION"],[1289,1313,"ACTION"],[1441,1455,"ACTION"],[1465,1471,"ACTOR"],[1523,1535,"ACTION"],[1536,1542,"ACTOR"],[1566,1577,"ACTION"],[1621,1627,"ACTOR"],[1664,1690,"ACTION"],[1725,1728,"ACTOR"],[1864,1870,"ACTOR"],[1899,1902,"ACTOR"],[1992,1999,"ACTOR"],[2051,2057,"ACTOR"],[2183,2189,"ACTOR"],[2266,2272,"ACTOR"],[2385,2391,"ACTOR"],[2480,2486,"ACTOR"]]}],["Attackers leverage IE10 zero day and a watering hole attack to install malware on US Department of Defense computers.;",{"entities":[[0,9,"ACTOR"],[10,32,"ACTION"],[39,78,"ACTION"],[107,117,"ASSETS"]]}],["In 2003, the appropriate OIG was notified that an employee had possibly violated USSID 18. A female foreign national employed by the U.S. Government, with whom the subject was having sexual relations, told another government employee that she suspected that the subject was listening to her telephone calls. The other employee reported the incident. The investigation determined that, from approximately 1998 to 2003, the employee tasked nine telephone numbers of female foreign nationals, without a valid foreign intelligence purpose, and listened to collected phone conversations while assigned to foreign locations. The subject conducted call chaining on one of the numbers and tasked the resultant numbers. He also incidentally collected the communications of a U.S. person on two occasions.;",{"entities":[[47,58,"ACTOR"],[59,80,"ACTION"],[161,172,"ACTOR"],[271,308,"ACTION"],[552,584,"ACTION"],[623,634,"ACTOR"],[635,680,"ACTION"],[685,714,"ACTION"],[724,768,"ACTION"]]}],["one or more unauthorized individuals gained access to a network resource site used by SPD and PDSI in 2010 to exchange data between software systems.;",{"entities":[[12,36,"ACTOR"],[37,53,"ACTION"],[56,63,"ASSETS"],[141,149,"ASSETS"]]}],[";",{"entities":[]}],["ATM Skimmer;",{"entities":[[0,3,"ASSETS"],[4,11,"ACTION"]]}],["SSN accidentally displayed in the address field of a utility customer mailing.;",{"entities":[[0,29,"ACTION"]]}],["A VA Clinic medical laptop was left unsecured in a room with public access. The laptop had no VA image, no VA security, and no VA account authentication. The",{"entities":[[20,26,"ASSETS"],[27,45,"ACTION"],[76,86,"ASSETS"]]}],["laptop used a generic non-password protected account. The hard drive was unencrypted. The laptop contained 86 patients' records including their first and last",{"entities":[[0,6,"ASSETS"],[7,53,"ACTION"],[54,68,"ASSETS"],[69,85,"ACTION"],[86,96,"ASSETS"],[110,127,"ASSETS"]]}],["name, date of birth, admission date, and last four digits of the social security number. This was reported by VA staff. 04/03/12:",{"entities":[]}],["The laptop was in a common room for several months. When the laptop was turned on, the clinical application which held the data opened automatically. All 86",{"entities":[[0,10,"ASSETS"],[57,67,"ASSETS"],[68,81,"ACTION"],[128,149,"ACTION"]]}],["patients will be sent letters offering credit protection services.",{"entities":[]}],["04/17/12:",{"entities":[]}],["The final count of patients' information stored on the laptop after removing duplicates is 76. Therefore the 76 patients will receive a letter offering credit protection",{"entities":[[51,61,"ASSETS"]]}],["services.;",{"entities":[]}],["HR employee erroneously emails employee PII to other employees.;",{"entities":[[0,11,"ACTOR"],[12,63,"ACTION"]]}],["Government incident: Hacktivists continue to launch attacks against Ukrainian government websites. The latest targets are the sites of the parliament, or the Verkhovna Rada (rada.gov.ua), the Right Sector nationalist movement (banderivets.org.ua), but also some Euromaidan websites.;",{"entities":[[21,32,"ACTOR"],[42,67,"ACTION"],[89,98,"ACTION"],[122,131,"ASSETS"],[273,282,"ASSETS"]]}],["Telangana: Man held for skimming debit cards - Heart Cup Café;",{"entities":[[24,32,"ACTION"],[33,44,"ASSETS"]]}],["Britain ministry of Def PII gone in hacking;",{"entities":[[24,43,"ACTION"]]}],["Former employee took sensitive data upon leaving company;",{"entities":[[0,15,"ACTOR"],[16,56,"ACTION"]]}],["Information leaked from Benesse Corp. includes personal data on people who never had a contract with the company, its parent company said Tuesday. According to Benesse Holdings Inc., the data not only dealt with customers of the subsidiarys mainstay education services, but also information related to the firms lifestyle business services collected at its events and other occasions. The leaked data was stored in a smartphone used by a system engineer arrested last week for allegedly copying trade secrets from the company, Chikara Matsumoto, chief risk management officer of Benesse Holdings, said at a news conference. So far, it is known that personal information on some 23 million people leaked from the subsidiary. Benesse Corp. said Monday that data on some 22.6 million people was found on the systems engineers smartphone. In addition, information on some 400,000 people was leaked through unconfirmed channels. The police investigation isnt complete, which means further data leaks could come to light. Initially, Benesse Holdings said that information on up to some 20.7 million customers might have been compromised based on lists obtained from name-list brokers. The corporate group then found that user information was compromised at the Benesse LifeSmile Shop, an online shopping site for pregnant women and mothers, and Benesse Womens Park, a social networking site for women. The newly found data include the estimated due dates of some 200,000 babies. Tokyo police arrested Masaomi Matsuzaki, 39, last Thursday on suspicion of downloading and copying the personal data of Benesse customers onto his smartphone from the Tokyo branch of affiliate Synform Co. Authorities seized the smartphone and a memory card from Matsuzaki and matched data on the phone and storage device with Benesse customer information. Matsuzaki admitted selling the data to name-list traders and gambled away the money, according to the police. Also Tuesday, Benesse Holdings convened a panel of experts to begin investigating the steps leading up to the theft and draft measures to prevent future data leaks. The panel, headed by lawyer Hideaki Kobayashi, will also investigate the responsibilities of the firms compliance officers, the company said.;",{"entities":[[0,18,"ACTION"],[403,418,"ACTION"],[419,429,"ASSETS"],[435,455,"ACTOR"],[489,527,"ACTION"],[529,546,"ACTOR"],[699,705,"ACTION"],[805,826,"ACTOR"],[887,897,"ACTION"],[1239,1254,"ACTION"],[1305,1309,"ASSETS"],[1387,1391,"ASSETS"],[1504,1521,"ACTOR"],[1557,1619,"ACTION"],[1745,1754,"ACTOR"],[1840,1849,"ACTOR"],[1859,1875,"ACTION"],[2057,2066,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["one employee is phished. account is used to phish 15 more.;",{"entities":[[13,24,"ACTION"],[34,59,"ACTION"]]}],["For more than two years, the Internet's most popular implementation of the Transport Layer Security (TLS) protocol has contained a critical defect that allowed attackers to pluck passwords, authentication cookies, and other sensitive data out of the private server memory of websites. Ars was among the millions of sites using the OpenSSL library, and that means we too were bitten by this extraordinarily nasty bug. By mid-morning Tuesday, Ars engineers already updated OpenSSL and revoked and replaced our site's old TLS certificate. That effectively plugged the hole created by the vulnerability. By installing the OpenSSL update, attackers could no longer siphon sensitive data out of our server memory. And although there's no evidence the private encryption key for Ars' previous TLS certificate was compromised, the replacement ensured no one could impersonate the site in the event hackers obtained the key. With Ars servers fully updated, it's time to turn our attention to the next phase of recovery. In the hours immediately following the public disclosure of the so-called Heartbleed vulnerability, several readers reported their Ars accounts were hijacked by people who exploited the bug and obtained other readers' account passwords. There's no way of knowing if compromises happened earlier than that. Ars has no evidence such hacks did occur, but two years is a long time. There's simply no way of ruling out the possibility. It's for this reason that Ars strongly recommends all readers change their account passwords. A password change is especially urgent for people who logged in between Monday evening and mid morning on Tuesday. It's also particularly important for anyone who used their Ars password to protect accounts on other sites or anyone whose Ars accounts contained private messages of a sensitive nature. But again, out of an abundance of caution, Ars strongly urges all users to reset their pass codes. As always, security-conscious readers should choose unique, randomly generated passwords at least nine characters long that contain upper- and lower-case letters, numbers, and symbols. For a refresher on good password hygiene, see Ars senior IT reporter Jon Brodkin's The secret to online safety: Lies, random characters, and a password manager.;",{"entities":[[160,169,"ACTOR"],[275,284,"ASSETS"],[635,644,"ACTOR"],[1157,1180,"ACTION"],[1185,1202,"ACTION"],[1207,1249,"ACTION"],[1344,1349,"ACTION"],[1520,1538,"ASSETS"],[1541,1549,"ASSETS"],[1717,1725,"ASSETS"],[1737,1745,"ASSETS"],[1777,1789,"ASSETS"],[1800,1816,"ASSETS"],[1927,1938,"ASSETS"],[2019,2028,"ASSETS"],[2149,2157,"ASSETS"],[2268,2276,"ASSETS"]]}],["Hospital staff sacked for prying on patients’ medical records in Suffolk and Colchester hospitals;",{"entities":[[0,14,"ACTOR"],[26,35,"ACTION"],[36,61,"ASSETS"]]}],["On 11/1/12, a sensitive record access log was generated at VA Pittsburgh for routine monitoring and auditing. Two accesses by a VA Clarksburg employee were ",{"entities":[[42,58,"ACTION"]]}],["identified as questionable. The access log was provided to the Clarksburg Information Security Officer (ISO) to investigate. At that time, it was determined the VA ",{"entities":[]}],["Clarksburg employee inappropriately accessed the Veterans medical record. The Veteran and VA Clarksburg employee are allegedly brothers. On this date, the ",{"entities":[[11,19,"ACTOR"],[20,44,"ACTION"],[58,73,"ASSETS"],[74,85,"ACTOR"],[104,112,"ACTOR"]]}],["VA Pittsburgh Privacy Officer (PO) was advised of the findings and this incident is being reported for the first time.;",{"entities":[]}],["The following was reported to us by the facility CIO:",{"entities":[]}],["I attended a live meeting this morning at 8 AM hosted by the Consolidated Patient Account Center. The presenter showed screens containing SSNs of two contractors while navigating the Servcde Request Form. I verified that the number on the screen for the contractor matched her ssn in our VistA data base.;",{"entities":[[98,111,"ACTOR"],[112,137,"ACTION"],[294,304,"ASSETS"]]}],["Prank Calling service left database exposed over a million records;",{"entities":[[22,43,"ACTION"]]}],["Payroll processor hacked via unknown method, leads to employee PII loss for CHI.;",{"entities":[[18,43,"ACTION"],[67,75,"ACTION"]]}],["medical records disposed improperly;",{"entities":[[0,15,"ASSETS"],[16,35,"ACTION"]]}],["No lives were lost in the huge fire that gutted a storage building on the Brooklyn waterfront over the weekend. But the flames put plenty of lives on display as the crumpling warehouse belched up its contents: decades’ worth of charred medical records, court transcripts, lawyers’ letters, sonograms, bank checks and more. “They’re like treasure maps, but with people’s personal information all over them,” Spencer Bergen, 24, said of the half-charred scraps that he said he had seen strewn around the Williamsburg neighborhood as far inland as Berry Street, several blocks from the warehouse.;",{"entities":[[19,35,"ACTION"],[36,47,"ACTION"],[48,66,"ASSETS"],[127,157,"ACTION"],[236,251,"ASSETS"],[484,527,"ACTION"]]}],["A Bathurst pharmacist who was caught texting information about a patient to someone outside that person’s “circle of care” has been sanctioned for professional misconduct.;",{"entities":[[0,21,"ACTOR"],[26,62,"ACTION"],[76,91,"ACTOR"],[147,171,"ACTION"]]}],["Doctor sent PHI via USB drive to media;",{"entities":[[0,6,"ACTOR"],[7,11,"ACTION"],[20,29,"ASSETS"]]}],["individual broke into an employee’s car and stole several items, including a laptop containing a healthcare providers patient information.;",{"entities":[[0,10,"ACTOR"],[11,21,"ACTION"],[25,39,"ASSETS"],[44,49,"ACTION"],[50,63,"ASSETS"],[77,83,"ASSETS"]]}],["Acer hit by apparent attack from REvil ransomware group;",{"entities":[[5,27,"ACTION"],[33,55,"ACTOR"]]}],["Database without security controls found by security researcher.;",{"entities":[[0,8,"ASSETS"]]}],["A Huntsville, Ala., clinical diagnostics laboratory has notified more than 7,000 individuals of a HIPAA breach after the company discovered protected health information contained on a third-party server had been unsecured for nearly three years. Diatherix Laboratories last month notified 7,016 people across the U.S. that their protected health information had been compromised and viewed by unauthorized, outside parties after its billing contractor Diamond Computing Company had one of its server's data accessible through Google. The server, officials noted, contained patient billing documents, health insurance forms, patient names and addressees. Many of the documents also included patient Social Security numbers, dates of birth, diagnoses codes and diagnostics tests ordered. After using an outside security firm to investigate the incident, Diatherix discovered the server was unsecured since Sept. 24, 2011. Diatherix further confirmed that files containing patient protected health information had been viewed from the outside in March 2014. Despite the server being unsecured and accessible on the Internet for nearly three years, Diatherix did not realize the security breach until July 2014. \"Our organization takes information security and patient privacy very seriously,\" read an August notification letter to patients. \"We deeply regret this situation and any inconvenience this may cause our patients.\" Diatherix officials said they have reached out to Google and other search engines known to have indexed the files containing PHI and requested the data be removed. To date, nearly 39 million people have had their protected health information compromised in HIPAA privacy or security breaches involving 500 people or more, according to data from the Department of Health and Human Services. The Office for Civil Rights, the HHS division responsible for investigating HIPAA violations, in recent months has demonstrated that these kind of breaches due to \"willful neglect\" will not be tolerated, as just this May, OCR slapped New York-Presbyterian Hospital and Columbia University Medical Center with its biggest HIPAA settlement yet -- $4.8 million -- for failing to protect patient data after it wound up on Google. It was discovered that the HIPAA breach transpired when a Columbia University physician, who developed applications for New York-Presbyterian and the university, attempted to deactivate a personally-owned computer server on the network containing ePHI. Due to lack of technical safeguards, server deactivation resulted in ePHI being accessible on the Internet. The data was so widely accessible online that the entities learned of the breach after receiving a complaint by an individual who saw the ePHI of their deceased partner, a former NYP patient, online. \"Our cases against NYP and CU should remind healthcare organizations of the need to make data security central to how they manage their information systems,\" said Christina Heide, acting deputy director of health information privacy for OCR, in a press statement announcing the settlement.;",{"entities":[[96,110,"ACTION"],[196,202,"ASSETS"],[203,221,"ACTION"],[359,379,"ACTION"],[384,390,"ACTION"],[391,406,"ACTOR"],[508,534,"ACTION"],[536,546,"ASSETS"],[591,600,"ASSETS"],[664,677,"ASSETS"],[876,886,"ASSETS"],[887,900,"ACTION"],[956,961,"ASSETS"],[1010,1042,"ACTION"],[1066,1076,"ASSETS"],[1077,1123,"ACTION"],[1671,1720,"ACTION"],[1896,1912,"ACTION"],[2274,2286,"ACTION"],[2409,2432,"ACTION"],[2452,2467,"ASSETS"],[2475,2482,"ASSETS"],[2537,2556,"ACTION"],[2574,2607,"ACTION"],[2618,2649,"ACTION"],[2683,2689,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The Freepik Company has disclosed a data breach impacting the login information of more than 8 million Freepik and Flaticon users. According to a press release, the security incident was the result of a SQL injection in Flaticon, one of the world’s largest databases of free customizable icons, that allowed attackers to exfiltrate user information.;",{"entities":[[20,47,"ACTION"],[202,217,"ACTION"],[258,267,"ASSETS"],[309,318,"ACTOR"],[319,350,"ACTION"]]}],["Bank of America Corp. (NYSE: BAC) has revealed a possible data breach on business clients' information for the Paycheck Protection Program. The breach occurred on April 22, as BofA uploaded PPP applications onto the U.S. Small Business Administration's test platform, according to a filing with the California Attorney General's Office. The limited-access platform allowed lenders to test PPP submissions before the second round began. Charlotte-based BofA said application information may have been visible to other SBA-authorized lenders and their vendors. \"There is no indication that your information was viewed or misused by these lenders or their vendors. And your information was not visible to other business clients applying for loans, or to the public, at any time,\" BofA said. Compromised information could include business details, such as an address or tax identification number, or a business owner's information, such as name, address, Social Security number, phone number, email and citizenship status. Applicants were part of a nationwide pool, with customers in multiple states likely affected. BofA did not specify which states. A spokesperson described it as a \"small number\" of clients. The bank said the data breach did not affect the applications' submission to the SBA. It asked the SBA to remove the visible information that same day, according to the filing. BofA said it also conducted internal investigations. The spokesperson declined to provide further details. The bank is offering a free two-year membership for Experian identify theft protection, which includes daily credit monitoring and surveillance. It did not say how many customers were affected or how many lenders were using the test site on April 22. ;",{"entities":[[58,69,"ACTION"],[141,151,"ACTION"],[174,216,"ACTION"],[488,512,"ACTION"],[608,632,"ACTION"],[1228,1243,"ACTION"]]}],["Theyre among at least 50 people who had applications submitted in their names, without their knowledge, for Lifeline, a Scripps News investigation finds. TerraCom and its affiliate, YourTel America Inc., together provide Lifeline phone service in 21 states. Their issues reflect broader concerns about administration of the government program, which aims to ensure that low-income households have an open line to jobs and medical care. Former contract agents for TerraCom and YourTel told Scripps they forged application signatures, manufactured addresses and retained legitimate applicants Social Security numbers and other sensitive personal information.;",{"entities":[[36,77,"ACTION"]]}],["US deletes Iranian revolutionary guard database.;",{"entities":[[0,2,"ACTOR"],[3,10,"ACTION"],[39,48,"ASSETS"]]}],["Honolulu-based Hawaii Pacific Health has fired an employee after discovering the employee had inappropriately accessed patient medical records. The employee worked at Straub Medical Center. The health system found that the employee had wrongfully accessed patient records between November 2014 and January 2020. According to HHS’ Office for Civil Rights data breach portal, 3,772 patients may have been affected. Hawaii Pacific Health does not believe the former employee was accessing the information for the purpose of identity theft. Rather, they believe the employee was acting out of curiosity. Nonetheless, Hawaii Pacific Health is offering the affected patients one year of free credit monitoring and identity restoration services. Patient data that may have been exposed included names, addresses, phone numbers, email addresses, dates of birth, religion, race/ethnicity, Social Security numbers, medical record numbers, primary care providers, dates of services, appointment notes, hospital account numbers, department names, provider names, account numbers and health plan names. Since the incident, Hawaii Pacific Health has reviewed its internal procedures and staff training. The health system is also looking to invest in different technologies. Hawaii Pacific Health has discovered an employee of Straub Medical Center in Honolulu has been snooping on the medical records of patients over a period of more than 5 years. Hawaii Pacific Health discovered the unauthorized access on January 17, 2020 and launched an investigation. An analysis of access logs revealed the employee first started viewing patient records in November 2014 and continued to do so undetected until January 2020. During that time, the employee viewed the medical records of 3,772 patients. After concluding the investigation, the employee was terminated. Affected patients had received treatment at Straub Medical Center, Kapiolani Medical Center for Women & Children, Pali Momi Medical Center, or Wilcox Medical Center. The types of information that the employee could have viewed included patients’ first and last names, telephone numbers, addresses, email addresses, dates of birth, race/ethnicity, religion, medical record numbers, primary care provider information, dates of service, appointment types and related notes, hospital account numbers, department name, provider names, guarantor names and account numbers, health plan names, and Social Security numbers. The reason for accessing the records was not determined, but Hawaii Pacific Health believes it was out of curiosity rather than to obtain sensitive information for malicious purposes. However, data theft could not be ruled out. All patients whose records were accessed by the employee were notified by mail on March 17, 2020 and were offered one year of free credit monitoring and identity restoration services. Hawaii Pacific Health is reviewing and updating its internal procedures and will be providing further training on patient privacy. The health system is also investigating new technologies that can be implemented to identify unauthorized medical record access and anomalous employee behavior access more rapidly.;",{"entities":[[47,58,"ACTOR"],[77,89,"ACTOR"],[90,118,"ACTION"],[145,157,"ACTOR"],[220,232,"ACTOR"],[233,256,"ACTION"],[454,473,"ACTOR"],[474,487,"ACTION"],[504,538,"ACTION"],[560,572,"ACTOR"],[577,601,"ACTION"],[760,781,"ACTION"],[1301,1312,"ACTOR"],[1350,1402,"ACTION"],[1477,1496,"ACTION"],[1584,1596,"ACTOR"],[1597,1634,"ACTION"],[1724,1736,"ACTOR"],[1737,1763,"ACTION"],[1819,1831,"ACTOR"],[2045,2057,"ACTOR"],[2058,2075,"ACTION"],[2564,2580,"ACTION"],[2593,2624,"ACTION"],[2625,2648,"ACTION"],[2658,2668,"ACTION"],[2720,2733,"ACTION"],[2734,2749,"ACTOR"],[3020,3026,"ASSETS"],[3102,3136,"ACTION"],[3141,3175,"ACTION"]]}],["ATM Skimmer at 3 banks;",{"entities":[[0,3,"ASSETS"],[4,11,"ACTION"]]}],["Georgia Division of Aging Services Accidental disclosure. The personal data of approximately 3,000 clients of the Community Care Services Program in Georgia was potentially compromised June 8 after the Division of Aging Services accidentally emailed the information to a contracted provider not authorized to view the information. The recipients of the email did not access the information, and all affected clients have been notified. An encrypted email containing the personal information was inadvertently sent to the Fuqua Center for Late-Life Depression at Emory University on June 8. The incident was discovered on June 9. Two of the three recipients deleted the email on June 10 and the third deleted it on June 11.;",{"entities":[[35,57,"ACTION"],[158,185,"ACTION"],[199,229,"ACTOR"],[230,250,"ACTION"],[292,331,"ACTION"],[354,359,"ASSETS"],[493,518,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Two women pleaded guilty Tuesday to their roles in a theft from an 88-year-old Alzheimer's patient. Prosecutors say Josie Nance, 20, of Chesapeake, Ohio was a Certified Nursing Assistant at Madison Park Senior Community in Huntington when she stole a patient's credit card and a necklace. During a hearing Tuesday in Cabell County Circuit Court, Nance pleaded guilty to two counts of fraudulent abuse of an access device and one count fraudulent schemes. Prosecutors say Nance charged $106 on the credit card. Amber Shoop, 25, of Chesapeake, Ohio also entered a guilty plea to fraudulent abuse of an access device. She also pleaded guilty to transferring stolen property. Prosecutors say Shoop sold the $400 necklace that Nance stole for $45. As part of the plea, Nance will have to pay restitution to the victim's family. The victim has since passed away. ;",{"entities":[[0,9,"ACTOR"],[51,58,"ACTION"],[116,127,"ACTOR"],[239,242,"ACTOR"],[243,248,"ACTION"],[249,272,"ASSETS"],[277,288,"ASSETS"],[347,352,"ACTOR"],[385,404,"ACTION"],[405,421,"ASSETS"],[436,455,"ACTION"],[473,478,"ACTOR"],[495,511,"ASSETS"],[513,524,"ACTOR"],[577,596,"ACTION"],[603,617,"ASSETS"],[618,621,"ACTOR"],[642,674,"ACTION"],[692,697,"ACTOR"],[698,702,"ACTION"],[703,720,"ASSETS"],[726,731,"ACTOR"],[732,737,"ACTION"],[769,774,"ACTOR"]]}],["The University of Nevada School of Medicine notified 1,483 patients whose PHI were on records that were accidentally disposed of on October 11, 2012 instead of being shredded. ;",{"entities":[[99,125,"ACTION"]]}],["Many emergency and routine health services at a 90-bed hospital in Gillette came to abrupt stop Sept. 20 when the facility’s 1,500 computer systems were disabled by a cyberattack.;",{"entities":[[76,95,"ACTION"],[131,147,"ASSETS"],[148,179,"ACTION"]]}],["Las Cruces Public Schools now confirms it accidentally sent out an email back in September containing the social security numbers of vendors the district uses. That email was sent to about 150 district employees, officials said. Vendors were advised to place a fraud alert on their credit files as a precaution. Those vendors also were told by LCPS to check their credit reports and financial history for any signs of identity theft. The district said the email was quickly discovered and steps were taken within hours to contain it.;",{"entities":[[0,25,"ACTOR"],[39,72,"ACTION"],[161,171,"ASSETS"],[172,183,"ACTION"],[455,464,"ASSETS"],[465,487,"ACTION"]]}],["UC Berkeley officials announced today (Thursday, April 30) that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal information. There is no evidence that such information has actually been used, but officials are notifying individuals in accordance with California law and so that they can be alert to signs of any possible misuse of their information. The data breach involved unauthorized access to a campus Web server maintained by a unit within UC Berkeley's Division of Equity and Inclusion. The server was used to store information including family financial information submitted by students. This included documents containing Social Security and bank account numbers. Officials sent letters to all affected individuals on April 30. This included about 260 undergraduate students and some former students, as well as about 290 parents and other individuals, generally family members of the notified students. Current students also received emails, sent April 30. Paul Rivers, UC Berkeley's interim chief security officer, emphasized that the campus regrets that this occurred and will be offering those individuals free credit monitoring for a year. They also will receive a resource list to aid them in checking for possible suspicious activity on their accounts. When campus officials learned of the breach on March 14 they immediately removed the server from the network so that it could no longer be accessed. A digital forensics firm was brought in to investigate the matter and determine whether any personally identifiable information was compromised. Once the firm completed that work and confirmed the names of all impacted individuals, the letters were sent. The investigation revealed that the unauthorized access first occurred in December 2014 and that an additional, separate, unauthorized access occurred in February 2015. ;",{"entities":[[158,169,"ACTION"],[196,215,"ACTION"],[464,483,"ACTION"],[507,522,"ACTION"],[532,551,"ACTION"],[557,574,"ASSETS"],[651,661,"ASSETS"],[768,777,"ASSETS"],[1706,1722,"ACTION"],[1866,1889,"ACTION"],[1956,1975,"ACTION"]]}],["Already this year, there have been three episodes – look here, here and here. This latest, however, isn’t due to a lapse in the drugmaker’s systems, but can be traced to the company that provides cars to Pfizer employees, such as the sales reps. Last week, Wheels sent letters to about 1,800 Pfizer spouses and domestic partners saying there was a “temporary encryption error in the security system of a web site Wheels Inc was using to collect data.” As a result, personal info was “briefly transmitted over the Internet in an unsecured manner.” What kind of info? Names, addresses, date of birth and driver’s license numbers. The info was to have been used for background checks in order for spouses or domestic partners of Pfizer employees to be eligible to drive the leased company car, Stratford Dick, Wheels’ marketing director told Pharmalot. But he insists Wheels took “immediate steps to ensure that the data encryption was implemented appropriately.” There was no breach of Wheels website, he adds, and there’s no evidence to suggest that any of the unencrypted information was misused in any way. As a precautionary measure, the leasing company is offering two years of credit protection and credit restoration services free of charge. Whether that will please Pfizer employees remains to be seen. Meanwhile, Dick says a review of Wheels’ data-collection systems has been conducted to ensure that this situation doesn’t occur again. ;",{"entities":[[348,398,"ACTION"],[402,412,"ASSETS"],[466,479,"ASSETS"],[484,547,"ACTION"],[567,572,"ASSETS"],[574,583,"ASSETS"],[585,598,"ASSETS"],[603,628,"ASSETS"],[629,637,"ASSETS"],[993,1000,"ASSETS"],[1058,1097,"ACTION"]]}],["Teacher disclosed medical condition of student to another parent.;",{"entities":[[0,7,"ACTOR"],[8,46,"ACTION"],[50,65,"ACTOR"]]}],["For at least two months, a former employee used customer information inappropriately. This information would have included names, addresses, DOB, CCN and SSN. The employee used some of these cards to make fraudulent purchases.;",{"entities":[[25,42,"ACTOR"],[43,85,"ACTION"],[161,173,"ACTOR"],[174,228,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],[" A 12-year-old Quebec boy is responsible for hacking several government and police websites during the student uprising in spring 2012, creating computer havoc and causing $60,000 damage.;",{"entities":[[1,25,"ACTOR"],[45,91,"ACTION"],[136,159,"ACTION"],[164,187,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Earlier this year, Mandarin Oriental discovered a malware attack on our credit card systems in a number of our hotels listed below. In response, we issued a public statement on our website to alert guests to the attack so they could take proactive measures to monitor their credit card activity. We also immediately engaged law enforcement, cyber-forensic specialists, and appropriate credit card companies to coordinate investigation efforts and to take further steps to assist our guests. After a thorough investigation, we now know more about the incident and are notifying affected guests. We have established a call center that is prepared to address any questions our guests may have about the breach. We regret that this incident occurred and are sorry for any inconvenience it may cause. We take the safety and security of our guests and their personal information very seriously, and the trust our guests place in us remains an absolute priority. From our investigation, it appears that a hacker used malware to obtain access to certain credit card systems in a number of Mandarin Oriental hotels. We believe this hacker may have used the malware to acquire the names and credit card numbers of guests who used a credit card for dining, beverage, spa, guest rooms, or other products and services at the following Mandarin Oriental properties during these time periods; we have not, however, found any evidence of acquisition or misuse of credit card pin numbers or security codes, or any other personal guest data: Mandarin Oriental, Boston between June 18, 2014 and March 12, 2015 Mandarin Oriental, Geneva between June 18, 2014 and March 3, 2015 Mandarin Oriental, Hong Kong between June 18, 2014 and February 10, 2015 Mandarin Oriental Hyde Park, London between June 18, 2014 and March 5, 2015 Mandarin Oriental, Las Vegas between June 18, 2014 and October 16, 2014 Mandarin Oriental, Miami between June 18, 2014 and March 3, 2015 Mandarin Oriental, New York between June 18, 2014 and January 18, 2015 Mandarin Oriental, San Francisco between June 18, 2014 and February 14, 2015 Mandarin Oriental, Washington DC between June 18, 2014 and January 20, 2015 The Landmark Mandarin Oriental, Hong Kong between June 18, 2014 and February 3, 2015 Since we were first alerted to this attack, we have been investigating this incident across multiple countries and properties, and working in coordination with law enforcement and the credit card companies. We have timed this notice to avoid disrupting or impeding their concurrent investigations. We have also taken comprehensive steps to ensure that the malware has been removed and that the hacker is no longer in our systems. In some instances, a credit card company may have already replaced the potentially affected credit card if it determined that the guest was at risk. We encourage potentially affected guests to remain vigilant for instances of fraud and identity theft, and to regularly review and monitor relevant account statements and credit reports to ensure the information contained in them is accurate. If any unauthorized charges on credit or debit card(s) are detected, guests should contact their card issuer. If anything is seen that is incorrect on credit reports, guests should contact the credit reporting agency. Suspected incidents of identity theft should be reported to local law enforcement. Even if no signs of fraud are found on reports or account statements, security experts suggest that credit reports and account statements should be checked periodically. FOR UNITED STATES RESIDENTS Fraud alert Individuals who believe they may be affected by this incident may elect to place a fraud alert with the major credit reporting agencies on their credit files. Their contact information is as follows: Equifax Equifax Information Services LLC P.O. Box 105069 Atlanta, GA 30348-5069 800-525-6285 www.equifax.com Experian Experian Fraud Reporting P.O. Box 9554 Allen, Texas 75013 888-397-3742 www.experian.com TransUnion TransUnion LLC P.O. Box 6790 Fullerton, California 92834-6790 800-680-7289 www.transunion.com A fraud alert lasts 90 days, and requires potential creditors to use \"reasonable policies and procedures\" to verify their identity before issuing credit in their name (as soon as one agency is notified, the others are notified to place fraud alerts as well). Individuals can also request these agencies to provide them with a copy of their credit report. The fraud alert can be kept in place at the credit reporting agencies by calling again after 90 days. Security freeze Individuals can also ask these same credit reporting agencies to place a security freeze on their credit report. A security freeze prohibits a credit reporting agency from releasing any information from an individual's credit report without written authorization. Placing a security freeze on the credit report may delay, interfere with, or prevent the timely approval of any requests from the individual concerned. This may include requests for new loans, credit, mortgages, employment, housing or other services. If individuals want to have a security freeze placed on their account, they must make a request in writing by certified mail to the reporting agencies. The reporting agencies will ask for certain personal information, which will vary depending on where the individual lives and the credit reporting agency. It normally includes name, social security number, date of birth, and current and prior addresses (and proof thereof), and a copy of government-issued identification. The cost to place, temporarily lift, or permanently lift a credit freeze varies by state. Generally, the credit reporting agencies will charge $5.00 or $10.00. However, if the individual is the victim of identity theft and has a copy of a valid investigative or incident report, or complaint with a law enforcement agency, in many states it is free. Individuals have the right to a police report under certain state laws. Information about how to avoid identity theft Besides local law enforcement, individuals can also report suspected instances of identity theft to their Attorney General, or the Federal Trade Commission (the \"FTC\"). The FTC, state Attorneys General, and major credit reporting agencies can provide additional information on how to avoid identity theft, how to place a fraud alert, and how to place a security freeze on credit reports. The FTC can be contacted on its toll-free Identity Theft helpline: 1-877-438-4338. The FTC's website is http://www.ftc.gov/idtheft. Its address is Federal Trade Commission, Consumer Response Center, 600 Pennsylvania Avenue, NW, Washington, DC 20580. In Maryland, the State Attorney General's office can be reached by phone at (888) 743-0023. Its website is http://www.oag.state.md.us/. In North Carolina, the State Attorney General's office can be reached by phone at (919) 716-6400. Its website is http://www.ncdoj.gov. Their mailing addresses are: Douglas F. Gansler Roy A. Cooper Attorney General of the State of Maryland Attorney General of the State of North Carolina Office of the Attorney General Consumer Protection Division, Attorney General's Office 200 St. Paul Place Mail Service Center 9001 Baltimore, MD 21202 Raleigh, NC 27699-9001 ;",{"entities":[[48,64,"ACTION"],[72,91,"ASSETS"],[209,219,"ACTION"],[998,1006,"ACTOR"],[1007,1036,"ACTION"],[1048,1067,"ASSETS"],[1125,1131,"ACTOR"],[1132,1168,"ACTION"],[1439,1472,"ACTION"],[2292,2298,"ACTION"],[2646,2656,"ACTOR"],[3320,3334,"ACTION"],[5790,5804,"ACTION"],[6040,6054,"ACTION"],[6138,6152,"ACTION"],[6346,6360,"ACTION"],[6486,6500,"ACTION"]]}],["Business owners stole customer information to file fraudulent tax returns.;",{"entities":[[0,15,"ACTOR"],[16,42,"ACTION"],[43,74,"ACTION"]]}],["Unauthorized access was gained to three databases containing data from old employment, discount plan, and patient financing applications;",{"entities":[[0,33,"ACTION"],[40,49,"ASSETS"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["exposed ES database;",{"entities":[[0,7,"ACTION"],[11,19,"ASSETS"]]}],["Employee A received Employee B's appointment letter. The letter contained Employee B's name, address, and partial social security number.;",{"entities":[[45,52,"ASSETS"],[53,63,"ASSETS"]]}],["Hundreds of patient medical records were found in a dumpster in a Fort Myers, Fla., strip mall Dec. 11, according to a Fox 4 News report. An individual was looking through a dumpster for cardboard boxes to help him move when he stumbled upon what appeared to be patient medical records. He called the local Fox television station, and a reporter called the police. According to the report, the medical records allegedly belong to Luxor Industries, a physician group in Fort Myers. The medical records had names, addresses, phone numbers and Social Security numbers. Luxor Industries was raided by state agents in July. According to the report, state agents released few details on that raid. ;",{"entities":[[12,35,"ASSETS"],[36,60,"ACTION"],[139,152,"ACTOR"],[153,187,"ACTION"],[263,287,"ASSETS"],[392,411,"ASSETS"],[483,502,"ASSETS"]]}],["Anonymous Venezuela defaces several sites, this is modeling AVEGID.;",{"entities":[[0,19,"ACTOR"],[20,27,"ACTION"],[36,41,"ASSETS"]]}],["MUSC says it has had its financial records hacked and credit card information for some 7,000 people has been compromised, according to area reports. At some point between June 30 and August 21, the records of Blackhawk Consulting Group were compromised and hackers got the credit card information for patients who used their credit cards to paid medical bills, reports say. However, individuals who paid with a credit card in person and individuals who paid an MUSC bill by check or cash are not affected, according to the MUSC website.;",{"entities":[[10,49,"ACTION"],[100,120,"ACTION"],[237,253,"ACTION"],[258,265,"ACTOR"],[266,297,"ACTION"],[326,338,"ASSETS"],[412,423,"ASSETS"],[529,537,"ASSETS"]]}],["Tuesday 04 November 2014 Health insurance company Zilveren Kruis has apologised to policyholders after sending them a survey about their hospital treatment using the details of another patient. The mistake meant policyholders received a form containing the initials and surname, hospital department and length of treatment of someone one else. The forms did not include details of the ailment.Something went wrong when the file was being compiled and the information was wrongly linked to the address list, director of customer services Annemiek Heijer told Radio 1 news. The mistake, she said, is down to human error. In total, 2643 people were sent the forms a patient satisfaction survey using someone elses details.;",{"entities":[[25,64,"ACTOR"],[103,124,"ACTION"],[194,205,"ACTION"],[226,252,"ACTION"],[385,413,"ACTION"],[419,427,"ASSETS"],[467,505,"ACTION"],[572,583,"ACTION"],[641,660,"ACTION"],[693,721,"ACTION"]]}],["If you get a job at Verizon Wireless (or anywhere, really) it's probably a good idea not to steal the company's merchandise and sell it online. Seems obvious, but one Pennsylvania man is now learning that lesson the hard way. James Hopkins, 35, of Telford, Pa. was sentenced Tuesday to more than two years in prison for stealing more than 900 cellphones and accessories from his former employer and selling them online for a profit, the Justice Department announced. The sentencing comes after Hopkins pleaded guilty in federal court in Newark, N.J. last year to charges of mail fraud, U.S. Attorney Paul Fishman said. Hopkins worked as an account executive at a Verizon Wireless store in Trevose, Pa. while the scheme was going on. Between February and November 2009, he placed numerous orders for Verizon Wireless cell phones, handheld devices, and accessories in the names of customers without their knowledge, prosecutors said. He tried to cover his tracks by having the devices shipped to a relative's home in New Jersey, and manipulating Verizon's computer database to conceal the bogus orders and shipments. \"Hopkins received $328,517 worth of stolen Verizon Wireless merchandise, which he sold on eBay for a profit of $272,290,\" the Justice Department said. In addition to his 27-month prison term, Hopkins was ordered to serve two years of supervised release, pay $303,623 in restitution, and forfeit $272,290. Meanwhile, Hopkins isn't the first Verizon employee to go rogue. The mobile carrier back in 2008 fired several employees for accessing the cell phone records of then President-elect Barack Obama.;",{"entities":[[163,183,"ACTOR"],[226,239,"ACTOR"],[316,369,"ACTION"],[399,431,"ACTION"],[495,502,"ACTOR"],[575,585,"ACTION"],[620,627,"ACTOR"],[773,913,"ACTION"],[933,935,"ACTOR"],[936,1026,"ACTION"],[1032,1115,"ACTION"],[1117,1124,"ACTOR"],[1195,1223,"ACTION"],[1308,1315,"ACTOR"],[1432,1439,"ACTOR"],[1524,1541,"ACTOR"],[1546,1578,"ACTION"]]}],["SwimSuitsforAll Acknowledges Security Breach Customers' names, addresses, credit or debit card numbers, and credit or debit card expiration dates may have been accessed. Plus size swimwear retailer SwimSuitsforAll recently began notifying customers that the computer system used to process payments for purchases made on its Web site was accessed on June 24, 2013. The breach was discovered three days later, on June 27, 2013. According to the company, the hacker or hackers may have accessed customers' names, addresses, credit or debit card numbers, and credit or debit card expiration dates. While SwimSuitsforAll isn't offering its customers any identity protection services following the incident, the company is advising customers to review their financial statements for unauthorized activity, and to request copies of their credit reports from each of the three nationwide credit reporting companies. \"We want to assure you that we are committed to the security of your personal information and are taking this matter seriously,\" company vice president of operations Isaac Ashkenazie wrote in the notification letter [PDF]. \"We have implemented additional technical safeguards and are conducting a comprehensive internal review of our practices and procedures in order to prevent an incident like this from occurring in the future.\" Customers with questions are advised to contact the company at (888) 241-SWIM;",{"entities":[[29,44,"ACTION"],[147,170,"ACTION"],[255,274,"ASSETS"],[326,334,"ASSETS"],[335,347,"ACTION"],[366,376,"ACTION"],[455,476,"ACTOR"],[477,494,"ACTION"],[781,802,"ACTION"]]}],["Safaricom employees unlawfully copied and shared privileged subscriber data;",{"entities":[[0,19,"ACTOR"],[20,75,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,46,"ACTION"]]}],["A state employee was placed on leave after emailing thousands of private Medicaid records to his personal email account, state Medicaid Inspector General James Cox announced today. The security breach happened on Oct. 12 of last year, when the employee -- who worked for Cox's office -- sent 17,743 records to the account, according to the state. Cox said the person acted without telling anyone in his office. ;",{"entities":[[8,16,"ACTOR"],[43,119,"ACTION"],[182,201,"ACTION"],[241,253,"ACTOR"],[288,322,"ACTION"],[357,367,"ACTOR"],[368,411,"ACTION"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,46,"ACTOR"],[47,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[173,215,"ACTION"]]}],["The Western Trust says it is investigating a data breach after a patient who had requested his medical records was given a file containing another persons records. Jonathon had attended Altnagelvin Hospital with a heart condition and as he wasnt happy with his diagnosis he requested his medical records. He told the Shaun Doherty Show today of his shock that his file contained 70 pages of another persons medical records: (audio file) In a statement it said that there are many thousands of medical records used everyday and the Trust experiences very small numbers of data breaches annually. The trust says it is working to address the error with those involved and the service area concerned.;",{"entities":[[45,56,"ACTION"],[91,163,"ACTION"],[427,437,"ASSETS"]]}],["Popular stock photo service, 123RFm hit by data breach, 8.3M records for sale;",{"entities":[[20,27,"ASSETS"],[36,54,"ACTION"],[61,77,"ACTION"]]}],["Just as the 14 individuals suspected of being involved with RedHack and Anonymous were presented before the Ankara Courthouse, RedHack hackers were busy breaching the official website of Turkeys Justice and Development Party (APK). On the Parliament section of akparti.org.tr, the hackers posted an apology on behalf of Prime Minister Recep Tayyip Erdogan. According to the message published by RedHack, Erdogan admits that the arrested people are innocent and calls the operation against the hacktivist group a charade.;",{"entities":[[40,54,"ACTION"],[60,67,"ACTOR"],[72,81,"ACTOR"],[127,142,"ACTOR"],[143,186,"ACTION"],[277,288,"ACTOR"],[289,334,"ACTION"],[395,402,"ACTOR"],[489,509,"ACTOR"]]}],["malware on vendors system for parking garages;",{"entities":[[0,10,"ACTION"],[11,25,"ASSETS"]]}],["Sensitive client information was hacked through two Sweetser employee email accounts last June. Details about 22,000 people’s identification information and medical conditions may have been released to the hackers, according to Sweetser spokesperson Susan Pierter. On Oct. 28, Sweeter clients received letters about the email breach that occurred from June 18 to June 27. Currently, there is no evidence that the information leaked has been misused, Pierter said.;",{"entities":[[29,39,"ACTION"],[176,198,"ACTION"],[202,213,"ACTOR"],[414,432,"ACTION"],[433,449,"ACTION"]]}],["Global human resources giant Randstad has taken a hit from cyber criminals using the Windows Egregor ransomware, with the company saying it is trying what data the attackers have stolen and placed on their site on the dark web.;",{"entities":[[38,53,"ACTION"],[59,74,"ACTOR"],[160,173,"ACTOR"],[174,185,"ACTION"],[190,227,"ACTION"]]}],[";",{"entities":[]}],["Public computer at Georgia DMV office stores in plain text customers personal information such as ss#, pay stub, etc. on publicly used browser and all one has to do is to press the back button on the browser to see and print it.;",{"entities":[[7,15,"ASSETS"],[19,37,"ACTOR"],[38,58,"ACTION"],[168,228,"ACTION"]]}],["A medical marijuana dispensary is conducting an investigation into how sensitive patient information ended up in a pile of trash on a public sidewalk.;",{"entities":[[0,30,"ACTOR"],[101,150,"ACTION"]]}],["Veteran A called and stated Veteran B's CD with an x-ray on it was mailed to him in error. The information included Veteran B's name, social security number, and protected health information.;",{"entities":[[0,9,"ACTOR"],[63,90,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Hackers were able to access customer credit card information stored on computer servers. The cyber attack affected customers who made purchases on www.thorlo.com between November 14, 2012 and January 22, 2013. Credit card numbers, credit card expiration dates, credit card security codes, names, and contact information were exposed. ;",{"entities":[[0,7,"ACTOR"],[8,27,"ACTION"],[71,88,"ASSETS"],[90,106,"ACTION"],[322,335,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["malware both exfiltrated personal information and locked up all files ;",{"entities":[[0,7,"ACTION"],[13,24,"ACTION"],[50,69,"ACTION"]]}],["Unknown hacking method compromises outdated forum software;",{"entities":[[0,58,"ACTION"]]}],["Hackers gained access to user passwords after breaching a third party software application that interacts with their account database. No credit card or billing data was exposed.;",{"entities":[[0,7,"ACTOR"],[8,39,"ACTION"],[46,55,"ACTION"],[58,90,"ASSETS"],[125,134,"ASSETS"]]}],["An employee viewed her father's electronic medical record without a need to know. Her father is a Veteran. The Privacy Officer and Alternate Privacy Officer met with the Labor / Employee Relations Specialist regarding the incident and our findings. He will work with the employee's supervisor and handle the breach as appropriate.;",{"entities":[[0,11,"ACTOR"],[12,81,"ACTION"]]}],["Gas Station Skimmer;",{"entities":[[0,11,"ASSETS"],[12,19,"ACTION"]]}],["UniCredit SpA, Italy’s No. 1 bank, said hackers took biographical and loan data from 400,000 client accounts in one of the biggest breaches of European banking security this year. The attack occurred in September and October of 2016 and June and July of this year, according to an emailed statement from the bank on Wednesday. UniCredit only discovered the breaches this week, two people familiar with the matter said, asking not to be identified discussing a possible criminal matter.;",{"entities":[[40,47,"ACTOR"],[48,79,"ACTION"],[181,191,"ACTION"],[354,366,"ACTION"]]}],["Incident associated with Miniduke campaign.;",{"entities":[[25,43,"ACTION"]]}],["The Surgeons of Lake County, located in the affluent northern Illinois suburb of Libertyville, revealed last month that hackers had burrowed deeply into its computer network, infiltrating a server where e-mails and electronic medical records were stored. But unlike many other data breaches, the hackers made no attempt to keep their presence a secret. In fact, they all but fired a flare to announce the break-in, taking the extreme step of encrypting their illicit haul and posting a digital ransom note demanding payment for the password. The doctors turned the server off and notified the authorities, refusing to pay.;",{"entities":[[120,127,"ACTOR"],[128,173,"ACTION"],[175,254,"ACTION"],[293,304,"ACTOR"],[390,414,"ACTION"],[443,472,"ACTION"],[477,506,"ACTION"],[507,542,"ACTION"],[563,573,"ASSETS"]]}],["Personal data of individuals who applied to Ohio’s Pandemic Unemployment Assistance (PUA) program was exposed in a data breach on May 15, causing information of at least two dozen applicants to be seen by other claimants in the program, according to a letter shared by the Ohio Department of Job and Family Services. Deloitte Consulting, the company contracted with ODJFS to assist the state in administering the program, told applicants in a letter that personal information such as their names, Social Security numbers, street addresses and receipt of unemployment compensation benefits were inadvertently available for others to view.;",{"entities":[[98,126,"ACTION"],[194,220,"ACTION"],[442,450,"ASSETS"],[590,638,"ACTION"]]}],["A bank has left more than one million audio recordings of phone calls seemingly made by bank employees exposed to the open internet, letting anyone listen in on sensitive conversations, including ones with potential customers.;",{"entities":[[0,6,"ACTOR"],[38,54,"ASSETS"],[103,131,"ACTION"],[133,184,"ACTION"]]}],["Ransomware incident;",{"entities":[[0,10,"ACTION"]]}],[";",{"entities":[]}],["Incident associated with Miniduke campaign.;",{"entities":[[25,43,"ACTION"]]}],["An advanced type of POS malware attacks over 350 Wendy's location's. ;",{"entities":[[20,39,"ACTION"]]}],["Stolen device;",{"entities":[[0,6,"ACTION"],[7,13,"ASSETS"]]}],["Rocky Mountain Health Care Services of Colorado Springs has discovered an unencrypted laptop has been stolen from one of its employees. This is the second such incident to be discovered in the space of three months. The latest incident was discovered on September 28. The laptop computer was discovered to contain the protected health information of a limited number of patients. The types of information stored on the device included first and last names, addresses, dates of birth, health insurance information, Medicare numbers, and limited treatment information.;",{"entities":[[74,92,"ASSETS"],[93,108,"ACTION"],[272,287,"ASSETS"],[415,425,"ASSETS"]]}],["Caregiver steals physical credit card from patient.;",{"entities":[[0,9,"ACTOR"],[10,16,"ACTION"],[17,37,"ASSETS"]]}],["Terrell County Health Department in Georgia reported that 18,000 had PHI involved in an incident that occurred January 9, 2012 to April 17, 2012 involving Unauthorized Access/Disclosure,Network Server. Ive been unable to find any details on this breach, but with 18,000 affected, Im surprised that I never saw this in the news.;",{"entities":[[155,185,"ACTION"],[186,201,"ASSETS"],[246,252,"ACTION"]]}],["On August 12, 2013, the College of Extended Learning at San Francisco State University, began notifying an undisclosed number of students of a server breach that occurred on March 25, 2013 at 3am. The college had been alerted to the breach by federal law enforcement on June 11, 2013. \"The incident involved the unauthorized use of the server by a group not associated with SF State,\" college dean Jose L. Galvan wrote in the notification letter [PDF]. \"Although we have no evidence of compromise of the databases also located on this server, federal law enforcement indicated more than 500 other sites were compromised by this same group and some of those sites did find evidence of compromised data.\" The data accessible on the server included an undisclosed number of names, Social Security numbers and related information.;",{"entities":[[141,156,"ACTION"],[229,239,"ACTION"],[313,343,"ACTION"],[344,383,"ACTOR"],[598,603,"ASSETS"],[604,620,"ACTION"],[621,639,"ACTOR"],[658,663,"ASSETS"],[728,738,"ASSETS"]]}],["Dear [CUSTOMER/CARDHOLDER NAME]: We are contacting you regarding a data security incident that has occurred at Accuform Signs. Essentially, our systems have been illegally hacked into by outside intruders. Beginning at least as early as June 30, 2015, we believe Accuform Signs order information was improperly accessed from our website and/or the website of [DISTRIBUTOR NAME] (with whom we are working closely in order to provide you this joint notification with important information to better protect you). This order information may have included your name, address, email, phone and credit card information. As a result, this information may have been potentially exposed to others. Please be assured that we are taking appropriate steps necessary to address the incident, and that we are committed to protecting the information that you have entrusted to us. We have retained the services of an experienced cyber security and forensic investigative firm to fully investigate the incident, and we have reported the matter to federal law enforcement authorities, including the Electronic Crimes Task Force of the United States Secret Service. Because the breach occurred very recently, the investigations are still ongoing. However, we do know that one or more parties operating through foreign countries illegally accessed our computer network and exfiltrated copies of orders, a portion of which contained purchaser's names, credit card numbers and other related information. We have no information to indicate that any card has yet incurred any unauthorized charges. To better protect you and your information, we have taken immediate steps to further secure all data, including instituting changes in the ways purchase information is processed. Since discovering the breach, Accuform Signs has taken immediate action to identify and block access points, increase tracking and monitoring of activity, further restrict and remove sensitive data, increase anti-virus protection of servers, implement an advanced 2-factor password security system, and require secondary authorization to view credit cards. For nearly 40 years, all of us at Accuform Signs have been dedicated to manufacturing products that inform, protect, and motivate. We are committed to addressing this incident with the same dedication. We are offended by this cyber-attack on your business and our own and regret any inconvenience this incident may have caused you.;",{"entities":[[144,151,"ASSETS"],[152,178,"ACTION"],[184,205,"ACTOR"],[296,324,"ACTION"],[329,336,"ASSETS"],[344,355,"ASSETS"],[644,688,"ACTION"],[1156,1166,"ACTION"],[1310,1328,"ACTION"],[1333,1349,"ASSETS"],[1354,1375,"ACTION"],[1772,1782,"ACTION"],[1987,1994,"ASSETS"],[2337,2349,"ACTION"]]}],["An eagle-eyed member of public spotted that a skimming device had been fitted to a cash machine outside NatWest Bank on Chiswick High Road. The scam, known as the 'Lebanese Loop' involves fitting a false cover over the card slot. Police said the man noticed the device when the machine would not return his card. Police were called to the scene and removed the device. The 'Lebanese Loop' is a common scam where which a false cover is fitted over the card slot with a camera looking down onto the keypad. ;",{"entities":[[44,80,"ACTION"],[83,95,"ASSETS"],[140,177,"ACTION"],[188,229,"ACTION"],[275,286,"ASSETS"],[287,313,"ACTION"],[420,506,"ACTION"]]}],["CareFirst BlueCross BlueShield on Wednesday said it had been hit with a data breach that compromised the personal information on approximately 1.1 million customers. There are indications that the same attack methods may have been used in this intrusion as with breaches at Anthem and Premera, incidents that collectively involved data on more than 90 million Americans. On May 20, 2015, CareFirst BlueCross BlueShield (CareFirst) announced that the company has been the target of a sophisticated cyberattack. The attackers gained limited, unauthorized access to a single CareFirst database. This was discovered as a part of the company's ongoing Information Technology (IT) security efforts in the wake of recent cyberattacks on health insurers. CareFirst engaged Mandiant __ one of the world's leading cybersecurity firms __ to conduct an end-to-end examination of its IT environment. This review included multiple, comprehensive scans of the CareFirst's IT systems for any evidence of a cyberattack. The review determined that in June 2014 cyberattackers gained access to a single database in which CareFirst stores data that members and other individuals enter to access CareFirst's websites and online services. Mandiant completed its review and found no indication of any other prior or subsequent attack or evidence that other personal information was accessed. Evidence suggests the attackers could have potentially acquired member-created user names created by individuals to access CareFirst's website, as well as members' names, birth dates, email addresses and subscriber identification number. However, CareFirst user names must be used in conjunction with a member-created password to gain access to underlying member data through CareFirst's website. The database in question did not include these passwords because they are fully encrypted and stored in a separate system as a safeguard against such attacks. The database accessed by attackers contained no member Social Security numbers, medical claims, employment, credit card, or financial information. \"We deeply regret the concern this attack may cause\", said CareFirst President and CEO Chet Burrell. \"We are making sure those affected understand the extent of the attack __ and what information was and was not affected. Even though the information in question would be of limited use to an attacker, we want to protect our members from any potential use of their information and will be offering free credit monitoring and identity theft protection for those affected for two years.\" Approximately 1.1 million current and former CareFirst members and individuals who do business with CareFirst online who registered to use CareFirst's websites prior to June 20, 2014 are affected by this event. All affected members will receive a letter from CareFirst offering two free years of credit monitoring and identity theft protection. The letters will contain an activation code and you must have the letter to enroll in the offered protections. Out of an abundance of caution, CareFirst has blocked member access to these accounts and will request that members create new user names and passwords.;",{"entities":[[49,83,"ACTION"],[89,125,"ACTION"],[482,510,"ACTION"],[512,525,"ACTOR"],[526,564,"ACTION"],[584,593,"ASSETS"],[716,728,"ACTION"],[1046,1060,"ACTOR"],[1061,1077,"ACTION"],[1078,1095,"ASSETS"],[1178,1198,"ASSETS"],[1203,1219,"ASSETS"],[1391,1404,"ACTOR"],[1405,1436,"ACTION"],[1496,1515,"ASSETS"],[1701,1718,"ACTION"],[1750,1770,"ASSETS"],[1771,1783,"ASSETS"],[1916,1929,"ACTION"],[1930,1942,"ASSETS"],[1943,1951,"ACTION"],[1952,1964,"ACTOR"],[2239,2249,"ACTION"],[2367,2378,"ACTOR"],[3111,3173,"ACTION"]]}],["database with PII unsecure on the internet, found by ethical hacker and alerted the company;",{"entities":[[0,8,"ASSETS"],[9,52,"ACTION"],[53,67,"ACTOR"],[72,91,"ACTION"]]}],[";",{"entities":[]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["unencrypted external hard drive stolen from employee's car. Had customer personal info on it.;",{"entities":[[0,31,"ASSETS"],[32,43,"ACTION"],[44,59,"ASSETS"]]}],["A payroll employee intentionally added an unauthorized person to post some timecards. This person was not on the delegation of authority and this employee was fully aware of that. The employee also did this contrary to instructions from her supervisor. This action was not approved by the affected service. The individual who was granted access to perform time card duties has had the access removed. Fiscal service is working with Human Resources (HR) concerning this incident. There are 39 people on the T&L, therefore 39 people will receive a letter offering credit protection services.;",{"entities":[[0,18,"ACTOR"],[19,85,"ACTION"],[86,97,"ACTOR"],[141,154,"ACTOR"],[155,179,"ACTION"],[180,192,"ACTOR"],[193,252,"ACTION"],[253,306,"ACTION"],[307,321,"ACTOR"],[326,347,"ACTION"]]}],["Federal authorities charged eight people with identity theft for filing fraudulent federal tax refunds in five separate cases, including that of a former Boca Raton Regional Hospital scheduler. Shalamar Major had access to the personal information of the hospital’s patients and gave it to Tanisha Wright in exchange for the promise of future payments, according to a federal indictment against both of them. Wright allegedly used that information to file 57 fraudulent tax returns seeking $306,720 in refunds. She received the money on debit cards and split the proceeds with Major, according to the charges.;",{"entities":[[28,40,"ACTOR"],[46,60,"ACTION"],[65,102,"ACTION"],[195,209,"ACTOR"],[210,223,"ACTION"],[291,305,"ACTOR"],[306,352,"ACTION"],[410,416,"ACTOR"],[417,511,"ACTION"],[512,515,"ACTOR"],[516,549,"ACTION"],[554,577,"ACTION"]]}],["In a slipup to stoke Republicans' Obamacare security concerns, Enroll Alaska accidentally released email addresses of about 300 clients. An employee forgot to hide the recipient list when sending out a mass email regarding a glitch with the HealthCare.gov, according to the Anchorage Daily News.;",{"entities":[[77,98,"ACTION"],[137,148,"ACTOR"],[149,212,"ACTION"]]}],[";",{"entities":[]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,46,"ACTOR"],[47,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[173,216,"ACTION"]]}],["2 laptops were stolen from medical office, 3000 unencrypted records potentially disclosed.;",{"entities":[[2,9,"ASSETS"],[10,41,"ACTION"],[43,90,"ACTION"]]}],["A Wyoming medical billing firm is trying to contact patients of one of its clients that a vehicle theft could result in a data breach of customer information. Insurance Data Services, at 1161 58th St. in Wyoming, says a West Michigan Delivery Service courier car delivering account information for a client was stolen Sept. 15 at Zondervan Publishing in Kentwood. Camera footage shows a man with a mask and gloves getting into vehicle, company officials say. The car was later found in Kentwood, but police are still looking for suspect. Items in the delivery vehicle haven't been found yet, according to an IDS spokeswoman. The missing documents include information about a portion of Claystone Clinical Associates' 2,900 patients. The documents include patients' names, phone number, addresses, diagnoses code, treatment codes, insurer and account balances.;",{"entities":[[88,103,"ACTION"],[104,133,"ACTION"],[308,318,"ACTION"],[387,415,"ACTOR"],[416,428,"ACTION"],[429,436,"ASSETS"],[461,468,"ASSETS"],[469,487,"ACTION"],[562,569,"ASSETS"],[628,649,"ASSETS"],[736,749,"ASSETS"]]}],["Twice in 2014 members were emailed with all their addresses in the CC: field;",{"entities":[[14,76,"ACTION"]]}],["Pharmacist accesses state prescription database and provides information to another party. The two were going to provide the info to lawyers for use in family court cases.;",{"entities":[[0,10,"ACTOR"],[11,38,"ACTION"],[39,47,"ASSETS"],[52,90,"ACTION"],[99,129,"ACTION"],[130,140,"ACTOR"],[141,171,"ACTION"]]}],["Experian, one of the nationwide credit reporting agencies, identified that its client, speedy recovery services, had a certain experience customer information accessed without proper authorization. The consumer information consists of information typically found in a consumer report. Such information includes your name and address and one or more of the following: Social Security number, date of birth, or account numbers.;",{"entities":[[159,197,"ACTION"]]}],["Potentially sensitive information about doctors has been added to the raft of email privacy blunders many from government departments during the past year. The Medical Council has apologised to about 2900 doctors after an attachment containing their payment information to the council was mistakenly emailed to a single doctor. The information could reportedly identify if doctors were paying more than their $733 yearly registration, which could mean money for disciplinary procedures or further training. The email was sent out in May last year when the wrong details were entered into the email fields. In a letter to the affected doctors, chief executive Philip Pigou said the council had made changes to its email system to prevent it happening again. The Minster of Health, who the independent council reports to, and Privacy Commissioner had been informed, he said. The Ministry of Education on Saturday admitted it had emailed private information to the wrong person. This followed privacy leaks and breaches at the Earthquake Commission, ACC, Ministry of Social Development and Inland Revenue. ;",{"entities":[[0,83,"ACTION"],[221,271,"ACTION"],[287,312,"ACTION"],[330,394,"ACTION"],[509,534,"ACTION"],[554,607,"ACTION"],[876,901,"ACTOR"],[914,978,"ACTOR"],[993,1006,"ACTION"],[1011,1019,"ACTION"]]}],[";",{"entities":[]}],["Terminally ill mother kills special needs daughter just prior to her own death. Staff at hospital snoops on medical records.;",{"entities":[[81,98,"ACTOR"],[99,125,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["On February 23, 2016, many people began receiving a fraudulent email titled \"Important Information: invoice 11471\" from an unauthorized person who had accessed Mayfield Brain & Spine's account at an outside vendor. This email was not sent by Mayfield. Mayfield notified recipients of the malicious email as soon as possible that same day, posted the information prominently on its website home page, and updated recipients again on February 25 with recommendations for remedy. Mayfield has completed its review and is issuing a final communication to all recipients by letter and also by distributing a press release of the incident and Mayfield's response since that time. As previously reported on WCPO TV in February, the email was generated by an unknown, unauthorized person who accessed the database of an outside vendor. This vendor sends, via email, newsletters, educational information, invitations, announcements, and other information about Mayfield to patients, business associates, event attendees, website contacts and other friends of Mayfield. Recipients of the fraudulent email who clicked on an attachment within it potentially triggered a download of a ransomware virus. According to Thomas Rosenberger, Vice President of Communications, \"The vendor receives only email addresses from Mayfield. No other health or financial information is shared. In this incident, no Mayfield systems were involved, and no patient health or financial information was compromised. Rosenberger added, \"Mayfield's first priority is always the well-being of our patients. Once we learned of the incident, we immediately communicated with recipients by email, by social media, and on our website, including both notification and instructions on how to remove the virus.\" The communication included a free download of software to remove the malware. Mayfield has taken several steps to ensure that an incident like this does not happen again. These include working with the vendor's compliance office to understand what transpired, locking the account so it cannot be accessed, and working with a computer virus protection service to determine if the email and/or its attachment contained a virus. Mayfield has reviewed its policies and procedures to ensure that all patient information is secure. \"We are continuously monitoring the situation,\" Rosenberger said. \"With all of the action taken to date, we do not believe that recipients of the fraudulent email need to take any additional steps at this time.\" If you have questions or concerns about this event, more information is available at MayfieldClinic.com, or you can contact us by toll-free telephone at 800-325-7787 or by email at Comments@MayfieldClinic.com. SOURCE: Mayfield Clinic The incident was reported on April 23 to HHS as impacting 23,341 patients.;",{"entities":[[34,75,"ACTION"],[120,142,"ACTOR"],[147,159,"ACTION"],[220,225,"ASSETS"],[747,781,"ACTOR"],[786,829,"ACTION"],[842,858,"ACTION"],[1101,1191,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Floresville, Texas-based Connally Memorial Medical Center is notifying 7,358 patients that their protected health information may have been exposed. Connally Memorial learned June 21 that a laptop that stored patient information was stolen. The laptop belonged to a business associate at the hospital and was stolen April 23. Although the laptop was password protected, it was not encrypted. Patient data that may have been affected included names, dates of birth, specialty referral information, gender, ethnicity and internal tracking numbers. A limited number of patients may have also had their diagnosis, reason for transfer, date of transfer and hospital transferred to information exposed. No medical records, Social Security numbers, addresses, financial information or insurance information were affected.;",{"entities":[[97,148,"ACTION"],[189,197,"ASSETS"],[203,241,"ACTION"],[242,252,"ASSETS"],[306,316,"ACTION"],[336,346,"ASSETS"],[690,698,"ACTION"]]}],["TAIPEI, Taiwan -- A male suspect was arrested on May 1 for hacking into a popular local classic music website, the Criminal Investigation Bureau (CIB) announced yesterday. The police raided the apartment of the suspect, surnamed Shih (_), and seized his computer. Investigators allege that the suspect used the computer in his hacking attempts. During initial investigations, Shih confessed to the police that he hacked into the website's customer database and made unauthorized changes to customer data, the CIB said in a statement. Shih also confessed that he has used a hacking technique called SQL injection to attack the website's database. SQL injection is a code injection technique that exploits a security vulnerability in an application's software, the CIB said. The investigation was launched by the bureau after it received a report from the website's operator who said its site was hacked in March. The CIB urged local website operators to stay on alert regarding similar hacking attempts.;",{"entities":[[18,32,"ACTOR"],[55,109,"ACTION"],[221,234,"ACTOR"],[292,303,"ACTOR"],[304,346,"ACTION"],[379,383,"ACTOR"],[384,422,"ACTION"],[432,459,"ASSETS"],[464,492,"ACTION"],[538,542,"ACTOR"],[570,625,"ACTION"],[626,649,"ASSETS"],[700,762,"ACTION"],[892,896,"ASSETS"],[897,907,"ACTION"]]}],[";",{"entities":[]}],[";",{"entities":[]}],["A Schneck Medical Center employee gave a presentation that was later placed online. People who searched through the files from the presentation could find the names of 3,000 Schneck Medical Center patients. The presentation was removed from online and Google removed all cached information from the Internet.;",{"entities":[[34,83,"ACTION"],[85,91,"ACTOR"],[113,122,"ASSETS"]]}],["Food server used hand-held skimmer to steal payment card information while on duty at restaurant.;",{"entities":[[0,11,"ACTOR"],[12,43,"ACTION"]]}],["A reel containing images of 2,000 State of California Birth Records from May through September of 1974 was found in a publicly accessible location. Names, Social Security numbers, addresses, and certain types of medical information were in the birth record images. People in Santa Clara, Santa Cruz, Shasta, Siskiyou, Solano, Sonoma, Stanislaus, Sutter, or Tehama counties and who were born or had a child born in 1974 between May and September were affected.;",{"entities":[[0,24,"ASSETS"],[103,147,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],[";",{"entities":[]}],["Following up on a media report in April, the office launched compliance checks on 12 secondary schools alleged to have leaked student data on their websites. The results confirmed that nine of the 12 schools had exposed personal information on their websites, affecting 2,115 students.;",{"entities":[[82,102,"ACTOR"],[103,125,"ACTION"],[148,157,"ASSETS"],[185,207,"ACTOR"],[208,219,"ACTION"],[244,258,"ASSETS"]]}],["An employee of the UConn Health Center inappropriately accessed personal information in the medical records of 164 patients, the university said Wednesday. ;",{"entities":[[0,11,"ACTOR"],[39,63,"ACTION"],[88,107,"ASSETS"]]}],["The Mishawaka, IN-based physician hospital organization, Select Health Network, has also announced that the protected health information of certain individuals has potentially been compromised as a result of a phishing attack.;",{"entities":[[160,192,"ACTION"],[210,226,"ACTION"]]}],["Molina Healthcare is notifying nearly 55,000 current and former members that a former CVS employee __ CVS is Molina Healthcare's over-the-counter (OTC) benefits vendor __ took their personal information from CVS' computers and sent it to his personal computer. How many victims? 54,203. What type of personal information? Names, CVS IDs, CVS ExtraCare Health Card numbers, Member IDs, Rx Plan numbers, Rx Plan states, and start dates and end dates. What happened? A former CVS employee took personal information related to Molina Healthcare members from CVS' computers and sent it to his personal computer. What was the response? CVS is issuing new CVS ExtraCare Cards with new account numbers for affected individuals who are current Molina Healthcare members with an OTC benefit. All potentially affected Molina members are being notified, and offered a free year of identity theft protection services. Details: CVS notified Molina Healthcare on July 20 that the incident occurred. The former CVS employee took the personal information on or about March 26, and CVS believes he did this to fraudulently obtain OTC products from CVS. Molina Healthcare has notified current and former members in California, Florida, Illinois, Michigan, New Mexico, Ohio, Texas, Utah, Washington and Wisconsin. Quote: \"Although the former CVS employee was found to have placed fraudulent OTC orders with respect to 182 Molina Medicare members in Texas, CVS has not detected any fraud with respect to any of the other affected Molina Medicare members,\" a Molina Healthcare statement said. Source: A Tuesday email correspondence with a Molina Healthcare spokesperson and a statement emailed to SCMagazine.com; a CVS statement emailed to SCMagazine.com on Tuesday.;",{"entities":[[79,98,"ACTOR"],[171,207,"ACTION"],[208,222,"ASSETS"],[227,260,"ACTION"],[467,488,"ACTOR"],[489,556,"ACTION"],[557,571,"ASSETS"],[576,609,"ACTION"],[989,1012,"ACTOR"],[1013,1042,"ACTION"],[1082,1139,"ACTION"],[1321,1340,"ACTOR"],[1341,1387,"ACTION"]]}],["National Credit Adjusters receives certain personal information about reatal customers from retailers that sell us delinquent accounts. Some customers reported being contacted by certain unauthorized third-party debt collectors. The personal information that may have been accessed by these unauthorized third-party debt collectors includes names, addresses, debt balances, date of births and Social Security Numbers. In some instances, the personal information that may have been accessed included the information of individuals who are cosigners on the accounts. After learning of this incident in March 2014, we conducted an investigation to establish the facts surrounding this incident and notified law enforcement authorities. Although the investigation is ongoing, we have decided that we cannot at this point rule out the possibility of a breach and are providing you this notice out of an abundance of caution because we wanted to take every precaution to allow you to protect yourself.;",{"entities":[[161,179,"ACTION"],[188,229,"ACTOR"],[293,333,"ACTOR"],[474,492,"ACTION"]]}],["The website for the Central Tibetan Administration, the official site belonging to the Dalai Lamas government in exile, was compromised by attackers who injected code that redirected Chinese speaking visitors to a Java exploit that drops a malicious backdoor.;",{"entities":[[4,11,"ASSETS"],[52,69,"ASSETS"],[120,135,"ACTION"],[139,148,"ACTOR"],[153,226,"ACTION"],[232,259,"ACTION"]]}],["Denial of service attack;",{"entities":[[0,24,"ACTION"]]}],["How many breaches, how many compromises of patients' confidential medical information does it take before there are some questions asked of an organization and its security policies? One health system, for instance, recently announced its seventh large HIPAA breach. The 20-hospital St. Vincent health system in Indianapolis, part of Ascension Health, most recently notified 760 of its medical group patients that their Social Security numbers and clinical data was compromised in an email phishing incident. The breach, which was discovered by hospital officials back in December 2014, marked the seventh breach for the health system in a less than five years. t wasn't until March 12, 2015, that officials said they discovered which patients were impacted by the breach, which involved the compromise of an employee's network username and password. \"St.Vincent Medical Group sincerely apologizes for any inconvenience this unfortunate incident may cause,\" St. Vincent officials wrote in the patient notification letter. According to data from the Office for Civil Rights, which keeps track of HIPAA breaches involving 500 people or more, St. Vincent health system has been a repeat HIPAA offender. Its most recent breach, reported in July 2014, compromised the health data of 63,325 patients after a clerical error sent patients letters to the wrong patients. The health system has also reported two breaches involving the theft of unencrypted laptops, which collectively compromised the health data of 2,341 patients.;",{"entities":[[247,266,"ACTION"],[304,310,"ASSETS"],[450,510,"ACTION"],[511,521,"ACTION"],[608,636,"ACTION"],[791,853,"ACTION"],[1104,1118,"ACTION"],[1168,1174,"ASSETS"],[1193,1208,"ACTION"],[1225,1231,"ACTION"],[1256,1283,"ACTION"],[1303,1370,"ACTION"],[1384,1390,"ASSETS"],[1432,1441,"ACTION"],[1457,1464,"ASSETS"],[1485,1512,"ACTION"]]}],[";",{"entities":[]}],["The WellPoint Affiliated Covered Entities in Indiana reported that 1,464 people were affected by a breach on April 1 that was coded as Unauthorized Access/Disclosure of paper records. Wellpoint did not respond to an email inquiry sent to them about the breach, so we dont know if this was a mailing error or what.;",{"entities":[[135,168,"ACTION"],[169,183,"ASSETS"],[253,259,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["office moved and left paperwork behind;",{"entities":[[17,21,"ACTION"],[22,31,"ASSETS"]]}],["Sensitive documents were left outside unattended during a move. Documents were taken and presented to press.;",{"entities":[[10,19,"ASSETS"],[20,63,"ACTION"],[64,73,"ASSETS"],[74,108,"ACTION"]]}],["copied the details into an email and sent it to himself;",{"entities":[[0,55,"ACTION"]]}],["veteran's PHI sent to wrong recipient;",{"entities":[[0,37,"ACTION"]]}],["We have reason to believe that the integrity of your personal information may have been compromised due to a security breach of the DHI Mortgage Loan Prequalification Website. On the evening of Friday, February 10, 2012, DHI Mortgage became aware that a software security breach by unknown external sources occurred in its Internet Loan Prequalification System;",{"entities":[[74,99,"ACTION"],[107,124,"ACTION"],[167,175,"ASSETS"],[253,279,"ACTION"],[283,307,"ACTOR"],[355,361,"ASSETS"]]}],["Disqus has confirmed its web commenting system was hacked. The company, which builds and provides a web-based comment plugin for news websites, said Friday that hackers stole more than 17.5 million email addresses in a data breach in July 2012.;",{"entities":[[25,28,"ASSETS"],[40,46,"ASSETS"],[47,58,"ACTION"],[119,143,"ASSETS"],[162,175,"ACTION"],[218,219,"ACTION"],[220,231,"ACTION"]]}],["University mailing reveals patient treatment info - University of Wisconsin-Madison;",{"entities":[[11,49,"ACTION"]]}],["A user on a popular hacker forum is selling three databases that purportedly contain user credentials and device data stolen from three different Android VPN services – SuperVPN, GeckoVPN, and ChatVPN – with 21 million user records being sold in total. The VPN services whose data has been allegedly exfiltrated by the hacker are SuperVPN, which is considered as one of the most popular (and dangerous) VPNs on Google Play with 100,000,000+ installs on the Play store, as well as GeckoVPN (1,000,000+ installs) and ChatVPN (50,000+ installs). The forum user is selling deeply sensitive device data and login credentials – email addresses and randomly generated strings used as passwords – of more than 21 million VPN users for an undisclosed sum. We reached out to SuperVPN, GeckoVPN, and ChatVPN and asked the providers if they could confirm that the leak was genuine but we have received no responses at the time of writing this report. The author of the forum post is selling three archives, two of which allegedly contain a variety of data apparently collected by the providers from more than 21,000,000 SuperVPN, GeckoVPN, and ChatVPN users, including: Email addresses Usernames Full names Country names Randomly generated password strings Payment-related data Premium member status and its expiration date The forum post author is also offering potential buyers to sort the data by country. The random password strings might indicate that the VPN user accounts could be linked with their Google Play store accounts where the users downloaded their VPN apps from. ;",{"entities":[[0,6,"ACTOR"],[33,101,"ACTION"],[106,124,"ACTION"],[208,252,"ACTION"],[281,311,"ACTION"],[315,325,"ACTOR"],[559,598,"ACTION"],[942,965,"ACTOR"],[966,996,"ACTION"]]}],["Five laptops were stolen during the weekend of November 17, 2012. They did not contain Social Security numbers and did contain unspecified personal information of patients. A notice about the incident was sent on January 18, 2013 and the breach appeared on the HHS website in February of 2013.;",{"entities":[[5,12,"ASSETS"],[13,43,"ACTION"],[236,246,"ACTION"]]}],["nearly two dozen people had their personal information compromised after Revenue Services sent personal MSP invoices to the wrong people;",{"entities":[[73,89,"ACTOR"],[90,136,"ACTION"]]}],["A former Elgin woman pleaded not guilty in Lake County court Thursday to charges she assumed the identity of an elderly resident at The Garlands of Barrington to steal thousands of dollars.;",{"entities":[[0,14,"ACTOR"],[85,128,"ACTION"],[159,180,"ACTION"],[181,189,"ASSETS"]]}],["On May 16, a researcher discovered that 1to1Help was exposing data in a misconfigured Amazon s3 bucket. When they eventually had time to look at the data, they found that were were more than 300,000 records with personal and sensitive information in the exposed bucket. The researcher then contacted this site to share their findings. Beginning on June 10, DataBreaches.net attempted to notify 1to1Help.net of the exposure so that they could secure their database. Emails sent to the site on June 10 and June 11 received no reply and by June 18, the bucket was still unsecured. An India-based cybersecurity firm that has assisted this site in the past in making notifications in India, BanBreach, also attempted to reach out to the firm, but did not reach anyone. After yet another week went by with no response from 1to1Help.net and finding that the bucket was still not secured, DataBreaches.net decided to start contacting some of 1to1Help’s larger corporate clients, hoping that if their clients called them to say, “Hey, our data is exposed,” they’d get action. On June 26, I spoke with a top privacy official for the U.S. headquarters of one of the multinational firms affected by the 1to1Help leak and explained the situation to her. I also started reaching out via email to other large corporate clients of 1to1Help.net. Two of the firms were immediately responsive and indicated that they were reaching out to 1to1Help.net On July 14, I finally got a response from Anil Bisht, the Director of 1to1Help.net.;",{"entities":[[49,85,"ACTION"],[86,103,"ASSETS"],[262,269,"ASSETS"],[456,465,"ASSETS"],[552,558,"ASSETS"],[559,579,"ACTION"],[850,860,"ASSETS"],[861,882,"ACTION"]]}],["Facilities Management Service (FMS) Employee A reported to Human Resources that while reviewing her Electronic Official Personnel Folder (eOPF), she found several documents belonging to two other employees. Documents for Employee B included one SF50 form with full name, full Social Security Number (SSN), date of birth, and other employment information. Documents for Employee C included four SF50 forms, four performance award VA4659 forms, and one performance appraisal with full name, full SSN, date of birth, and other employment information.",{"entities":[[149,206,"ACTION"]]}],["ACTION: The eOPF for Employee A has been disabled while the misfiled documents are being appropriately re-filed to the correct employee folders.;",{"entities":[]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,46,"ACTOR"],[47,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,163,"ACTION"],[164,172,"ASSETS"],[173,215,"ACTION"]]}],["State agency accidentally publishes thousands of employees personal information online;",{"entities":[[0,12,"ACTOR"],[13,86,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["A flash drive was found by an unaffiliated person containing sensitive Godiva information. The person who found it contacted the company through a lawyer and returned the drive. Forensics confirm the drive was accessed on April 2, 2013. Further investigation indicates that a former employee, acting within the scope of their duties, had compiled employment data on this flash drive. The employee then lost the drive.;",{"entities":[[2,13,"ASSETS"],[14,90,"ACTION"],[168,178,"ASSETS"],[198,207,"ASSETS"],[277,294,"ACTOR"],[388,400,"ACTOR"],[406,421,"ACTION"]]}],["Incident 2: threat actor sends spearphishing message leading to malware installation.;",{"entities":[[12,24,"ACTOR"],[25,85,"ACTION"]]}],["Chinese hackers break into Google looking for source code, trade secrets, information about human rights activists, and also to identify chinese operatives that were being investigated by the United States.;",{"entities":[[0,15,"ACTOR"],[16,114,"ACTION"],[120,206,"ACTION"]]}],["Database exposed PII;",{"entities":[[0,8,"ASSETS"],[9,20,"ACTION"]]}],["A Connextions employee used Social Security numbers from a number of other organizations for criminal activity. At least four members of Anthem Blue Cross and Blue Shield were affected by the criminal activity. The breach was reported on HHS as affecting 4,814 patients, but more were affected.;",{"entities":[[14,22,"ACTOR"],[23,111,"ACTION"],[172,211,"ACTION"],[213,243,"ACTION"]]}],["Restaurant chain Penn Station Inc. has upped the number of franchise locations affected by a payments breach to 80, almost double what it originally reported. See Also: Rethinking Endpoint Security The breach, which Penn Station says it's still investigating, is connected to a point-of-sale processing hack that may have exposed credit and debit details, but not PINs, at restaurants in Illinois, Indiana, Kentucky, West Virginia, Michigan, Missouri, Ohio, Pennsylvania, Virginia, North Carolina and Tennessee. On its list of frequently asked questions, the chain says the exposure was limited to cardholder names and card numbers because Penn Station only accepts signature-based transactions. But details surrounding exactly what happened remain sketchy. \"We did not learn of the possibility of unauthorized access until late April,\" the company says in its updated FAQ. \"Our first step after learning such information was to change the method for processing credit and debit card transactions. We then hired forensic experts who began working in May to help us determine if unauthorized access did occur and what, if any, customer information may have been accessed or taken.\" Penn Station says its investigation into the breach, which is being overseen by its processor, Heartland Payment Systems, and the Secret Service, is ongoing and that results, to date, have been inconclusive. \"The key is to work with the Secret Service and get down to the bottom of what happened,\" said Penn Station President Craig Dunaway, shortly after the breach was made public June 1. The restaurant chain initially reported that only 43 of its 238 U.S. restaurants had been hit. Penn Station also said the compromise likely dated back to March, and that debit and credit cards used in March and April at the affected locations were likely exposed. The investigation is being handled by the Secret Service based in Cincinnati. Law enforcement is not yet revealing details, but one investigator close to the case, who asked not to be named, expects the number of Penn Station locations affected by the breach to continue to grow. Cardholders Speak Out Dunaway told BankInfoSecurity that Penn Station learned of the breach from a customer. The patron connected the dots after swapping stories with others who had suffered fraud following dining at a local Penn Station restaurant. Card issuers have not yet been outspoken about suspected fraud linked to Penn Station, but consumers have. This week, two cardholders in Indiana contacted BankInfoSecurity to say they suspected their debit cards had been compromised at a Penn Station in Indianapolis. One reported fraudulent transactions appearing June 1 from various merchant locations in Virginia Beach, Va. The other reported fraudulent transactions stemming from attempted purchases in Dublin, Ireland. What Happened? Based on what Penn Station has revealed so far, industry experts suggest the breach could be linked to one or both of two possible scenarios - a processing hack, like the one that targeted 100 Subway locations between 2008 and May 2011, or a point-of-sale scheme, similar to the one discovered by the Michaels crafts store chain in May 2011. In the Michaels breach, card exposure was traced back to December 2010, more than five months before the breach was discovered. In all, 90 individual PIN pads at crafts stores in 20 states were compromised. Since discovery of the breach, Penn Station says its restaurants have changed the \"method\" they use for processing credit and debit transactions. That bit of information is telling, says Aite fraud analyst Shirley Inscoe. \"The information shared stated that there was an unauthorized data breach, which makes you assume a hack,\" she says. \"But it also states that there was unauthorized access at some restaurant sites. That makes me wonder if this was an organized ring with mules, planted as servers or cashiers, who were also using skimming devices in some of the restaurants.\" John Buzzard, who monitors card fraud for FICO's Card Alert Service, also says the breach sounds like it includes some sort of POS-device attack, but adds that it's really too early to tell. \"It's possible that a simple default admin password was never changed for the POS system at the affected locations,\" allowing hackers to easily infiltrate the system, Buzzard says. Inscoe says it's likely fraud linked to the attack occurred before Penn Station discovered the breach. The scope of the incident is probably more widespread, and the attack mechanisms more diverse, than has yet been revealed, she says. \"The comment that they have uncovered evidence that data was breached at some restaurants still leads me to believe this was fairly organized, and skimming may have been one component,\" she says. ;",{"entities":[[280,293,"ASSETS"],[294,356,"ACTION"],[573,634,"ACTION"],[803,822,"ACTION"],[1083,1102,"ACTION"],[1156,1185,"ACTION"],[1228,1238,"ACTION"],[1300,1307,"ASSETS"],[2571,2609,"ACTION"],[3010,3027,"ACTION"],[3234,3247,"ACTION"],[3399,3416,"ACTION"],[3683,3714,"ACTION"],[3783,3838,"ACTION"],[3948,3970,"ACTION"],[4115,4145,"ACTION"],[4213,4266,"ACTION"],[4267,4281,"ASSETS"],[4319,4326,"ACTOR"],[4327,4347,"ACTION"],[4348,4358,"ASSETS"],[4664,4701,"ACTION"],[4759,4795,"ACTION"]]}],["Employee provided data to former employee;",{"entities":[[0,8,"ACTOR"],[9,41,"ACTION"]]}],["Attackers broke into cable television and Internet service provider and cut cables servicing 160,000 homes.;",{"entities":[[0,9,"ACTOR"],[10,92,"ACTION"]]}],["Former Employee, KRISTOPHER ROCCHIO, Of Global Financial Services Company (speculated to be Western Asset Management) Charged With Unauthorized Access Of Supervisor's Email Account On Approximately 100 Occasions;",{"entities":[[0,15,"ACTOR"],[17,35,"ACTOR"],[75,116,"ACTION"],[131,150,"ACTION"],[154,180,"ASSETS"]]}],["HOA Management company suffers a burglary that results in a server being stolen. Server contains homeowners' names and bank account information. Discovered when owner could not log into server remotely.;",{"entities":[[23,80,"ACTION"],[81,87,"ASSETS"],[161,202,"ACTION"]]}],["Skimming device on ATM leads to payment card theft.;",{"entities":[[0,15,"ACTION"],[19,22,"ASSETS"],[23,51,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Oracle hacked;",{"entities":[[7,13,"ACTION"]]}],["An application for benefits was mailed to Veteran A that contained additional medical information for Veteran B and Veteran C.;",{"entities":[[0,14,"ASSETS"],[28,126,"ACTION"]]}],["Production of Half-Life 3 has been confirmed after Valve's database briefly became open to the public. Valve's Jira database - which the teams use to track bugs - exposed itself for a short period of time, allowing fans to see what was happening in the system. Users could see various internal development groups currently on the Valve roster, including one marked \"Half-Life 3\".;",{"entities":[[59,67,"ASSETS"],[68,102,"ACTION"],[117,125,"ASSETS"],[164,205,"ACTION"],[207,249,"ACTION"],[250,261,"ASSETS"]]}],["HealthCare for Women server breached by hackers;",{"entities":[[21,27,"ASSETS"],[28,36,"ACTION"],[40,47,"ACTOR"]]}],["Web site defacement;",{"entities":[[0,8,"ACTOR"],[9,19,"ACTION"]]}],["Two masked men, operating a stolen jeep, pulled up next to a courier's white van that was parked outside a Massachusetts Registry of Motor Vehicles location, jumped out of the jeep and stole five bags from the courier's van.;",{"entities":[[0,14,"ACTOR"],[16,80,"ACTION"],[158,190,"ACTION"],[196,200,"ASSETS"]]}],["The personal details of up to 100 students at Hillsview Academy, Teesville , have ended up in the wrong hands. It involved ‘data checking forms’ - containing everything from contact details to medical history - being delivered to the incorrect parents.;",{"entities":[[77,110,"ACTION"],[213,254,"ACTION"]]}],["medical breech released in journal;",{"entities":[[0,34,"ACTION"]]}],["Cyber criminals have used the Windows REvil ransomware to attack Adif, an infrastructure company owned by the Spanish Government, and have published data which was stolen from its dark Web site. The attackers have apparently hit the organisation twice before, and threatened a third attack as soon as the data was published. \"We advise you to get in touch immediately. We have personal information including correspondence, contracts and other accounting (total 800 gigabytes of data),\" they said in a note posted online. \"If you do not comply with our terms, your data will be published in the public domain. We will continue to download your data until you contact us,\" they added in surprisingly good English. According to its website, ADIF, the Administrator of Railway Infrastructure, is a state-owned company that answers to the Transport Ministry. The site said Adif played a leading role in promoting the railway sector, working towards converting it into the ideal mode of transport and facilitating access to the infrastructure under fair conditions.;",{"entities":[[0,15,"ACTOR"],[16,64,"ACTION"],[74,96,"ASSETS"],[130,170,"ACTION"],[196,209,"ACTOR"],[210,259,"ACTION"],[265,325,"ACTION"]]}],["Navionics, owned by garmin, had an exposed database that contained approximately 261,000 customer names and email addresses.;",{"entities":[[28,42,"ACTION"],[43,51,"ASSETS"]]}],[";",{"entities":[]}],["Healthcare employee email account breach via undisclosed method. Email with over 1000 patient and employee PII potentially viewed;",{"entities":[[65,129,"ACTION"]]}],["Incident associated with Miniduke campaign.;",{"entities":[[0,43,"ACTION"]]}],["A former Pennsylvania funeral director was sentenced Wednesday after she pleaded guilty to taking photos with bodies as they were being prepared for burial. Angeliegha “Angel” Stewart pleaded guilty in Monroe County court to 16 counts of abuse of a corpse. She will spend the next ten years on probation. Investigators say last year, Stewart snapped images of bodies at the Lanterman and Allen Funeral Home in East Stroudsburg as they were being prepared for burial, then showed them to friends as a joke.;",{"entities":[[30,38,"ACTOR"],[88,156,"ACTION"],[158,184,"ACTOR"],[336,343,"ACTOR"],[344,368,"ACTION"],[469,507,"ACTION"]]}],["Anonymous breached into the official website of Thailand Senate and Public Health Ministry;",{"entities":[[0,9,"ACTOR"],[10,23,"ACTION"],[24,44,"ASSETS"]]}],["A dentist office in Maitland is the latest victim of a ransomware attack in Seminole County. Dr. Carl Bilancione said all of his Quickbooks accounting files were encrypted and a pop-up screen instructed him to pay $10,000. Every 48 hours, the ransom would double, according to the message.;",{"entities":[[53,72,"ACTION"],[153,173,"ACTION"],[178,215,"ACTION"]]}],["A passport, birth certificate and visa documents were mailed to the wrong person.;",{"entities":[[39,48,"ASSETS"],[49,81,"ACTION"]]}],["A VA employee reported that another VA employee admitted to accessing her former husband's medical record.;",{"entities":[[36,47,"ACTOR"],[48,106,"ACTION"]]}],["A desktop computer storing personal health information for approximately 8,400 patients was stolen from NYU Langone Medical Center in New York City, according to an SC Magazine report. The computer was stolen from the faculty group practice office of John Golfinos, MD, the chairman of the department of neurosurgery. According to the report, the patient information includes names, addresses, dates of birth, telephone numbers and insurance and clinical information. About 5,000 of the lost records contained Social Security numbers. According to the report, the computer was password protected but unencrypted. ;",{"entities":[[0,18,"ASSETS"],[88,98,"ACTION"],[186,198,"ASSETS"],[199,209,"ACTION"],[562,574,"ASSETS"]]}],["Millions of voters had theri PII provided to direct marketing agencies against their wishes. A software error redacted their opt-out of having their information provided to third parties.;",{"entities":[[95,103,"ASSETS"],[104,187,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Gang called \"Armenian Power\" located in Southern California installed skimming devices in retail chain called .99 cents only stores. Over two million dollars was stolen from a total of a few hundred victims.;",{"entities":[[0,4,"ACTOR"],[13,27,"ACTOR"],[60,86,"ACTION"],[158,168,"ACTION"]]}],["Medical center employee erroneously placed medical information in recycling bin.;",{"entities":[[15,23,"ACTOR"],[24,80,"ACTION"]]}],[";",{"entities":[]}],[";",{"entities":[]}],["Employee fired from health region for ‘snooping' in patient records - Prince Albert Parkland Health Region;",{"entities":[[0,8,"ACTOR"],[38,67,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["On November 23, 2017, Strategic Analysis (\"SA\") received indications of suspicious activity involving certain systems in their IT infrastructure. SA became aware of unauthorized access to a number of SA accounts, systems, and data beginning April 20, 2015 and continuing through January 16, 2018;",{"entities":[[72,109,"ACTION"],[110,117,"ASSETS"],[127,145,"ASSETS"],[165,211,"ACTION"],[213,220,"ASSETS"]]}],["Briefcase stolen from car at intersection contained cash and unencrypted hard drive.;",{"entities":[[0,9,"ASSETS"],[10,25,"ACTION"],[52,56,"ASSETS"],[73,84,"ASSETS"]]}],["accounts stolen from bundle stars;",{"entities":[[0,15,"ASSETS"]]}],["Presitge Software accidently misconfigured their s3 buckets;",{"entities":[[0,17,"ACTOR"],[18,42,"ACTION"],[49,59,"ASSETS"]]}],["Stolen desktop computer;",{"entities":[[0,6,"ACTION"],[7,23,"ASSETS"]]}],["Police have launched an investigation after an abandoned autopsy laboratory containing mummified baby remains was discovered in a park. As the student Georgy Grigorchuk wandered around the building he also found an empty morgue and documents outlining the medical histories and post-mortem procedures of all the patients, including family names and personal details. It is known that the premises were abandoned when the pathology facility was moved to a new building at the region's hospital, but it is of concern that so much was left behind. ;",{"entities":[[235,244,"ASSETS"],[400,414,"ACTION"],[531,547,"ACTION"]]}],["Syrian Electronic Army hacks into Tango chat server. Steals data and brags about it online.;",{"entities":[[0,22,"ACTOR"],[23,33,"ACTION"],[40,52,"ASSETS"],[53,91,"ACTION"]]}],["Malware installed on the Backcountry Gear website for about three months beginning in late April likely resulted in a compromise of customer information, including payment card data.;",{"entities":[[0,20,"ACTION"],[42,49,"ASSETS"],[104,152,"ACTION"]]}],[";",{"entities":[]}],["Veterans Affairs Canada could be facing another lawsuit after a privacy breach involving 3,000 veterans who are part of the federal medical marijuana program. Veterans began reporting the breach Friday that effectively outed them as medical marijuana users. A VAC mailout informing patients about recent reimbursement changes lets anyone looking at the outside of the envelope know it was issued under the federal medical marijuana program.;",{"entities":[[62,78,"ACTION"],[262,265,"ACTOR"],[266,298,"ACTION"],[328,442,"ACTION"]]}],["Server stole for storage facility ;",{"entities":[[0,6,"ASSETS"],[7,33,"ACTION"]]}],["VeriSign Inc (VRSN.O), the company in charge of delivering people safely to more than half the world's websites, has been hacked repeatedly by outsiders who stole undisclosed information from the leading Internet infrastructure company. The previously unreported breaches occurred in 2010 at the Reston, Virginia-based company, which is ultimately responsible for the integrity of Web addresses ending in .com, .net and .gov. VeriSign said its executives \"do not believe these attacks breached the servers that support our Domain Name System network,\" which ensures people land at the right numeric Internet Protocol address when they type in a name such as Google.com, but it did not rule anything out.;",{"entities":[[113,139,"ACTION"],[143,152,"ACTOR"],[157,186,"ACTION"],[479,495,"ACTION"],[500,507,"ASSETS"]]}],["exposed the email addresses of 780 HIV patients.;",{"entities":[[0,48,"ACTION"]]}],["According to Bleeping Computer, Gigabyte was the target of a ransomware attack last week and are currently being blackmailed with the exposure of 112GB of the stolen data. The corporation announced that it shut down its IT infrastructure and that a small number of servers were impacted, but there are indications that the attack was more widespread. Multiple websites owned by the company were also affected by the incident, including its support site and elements of the company's Chinese website. RansomEXX claimed to have taken 112GB of sensitive internal data as well as information from the American Megatrends Git Repository, among other things. Intel and AMD processors details as well as a debug document are suspected to be among the sensitive info. Although Gigabyte has said it plans to report the theft to authorities, the company did not provide any clues on whether they intend to pay the ransom. The ransom note contains a link to a private page that only the victim is supposed to access to test decrypting a single file and leave an email address so that negotiations for the ransom can begin. Taiwanese motherboard maker Gigabyte has been hit by the RansomEXX ransomware gang, who threaten to publish 112GB of stolen data unless a ransom is paid. Gigabyte is best known for its motherboards, but also manufactures other computer components and hardware, such as graphics cards, data center servers, laptops, and monitors. The attack occurred late Tuesday night into Wednesday and forced the company to shut down systems in Taiwan. The incident also affected multiple websites of the company, including its support site and portions of the Taiwanese website While Gigabyte has not officially stated what ransomware operation performed the attack, BleepingComputer has learned it was conducted by the RansomEXX gang. When the RansomEXX operators encrypt a network, they will create ransom notes on each encrypted device. These ransom notes contain a link to a non-public page meant to only be accessible to the victim to test the decryption of one file and to leave an email address to begin ransom negotiations. Today, a source sent BleepingComputer a link to a non-public RansomEXX leak page for Gigabytes Technologies, where the threat actors claim to have stolen 112GB of data during the attack.;",{"entities":[[59,78,"ACTION"],[107,145,"ACTION"],[159,171,"ACTION"],[266,273,"ASSETS"],[274,287,"ACTION"],[320,351,"ACTION"],[361,369,"ASSETS"],[401,425,"ACTION"],[492,500,"ASSETS"],[931,1007,"ACTION"],[1008,1114,"ACTION"],[1152,1164,"ACTION"],[1168,1197,"ACTOR"],[1203,1222,"ACTOR"],[1244,1268,"ACTOR"],[1445,1455,"ACTOR"],[1503,1534,"ACTOR"],[1535,1542,"ASSETS"],[1590,1598,"ASSETS"],[1637,1641,"ASSETS"],[1672,1679,"ASSETS"],[1747,1767,"ACTION"],[1818,1837,"ACTOR"],[1848,1857,"ACTOR"],[1868,1875,"ACTION"],[1878,1885,"ASSETS"],[1887,1942,"ACTION"],[1963,1998,"ACTION"],[2005,2040,"ACTION"],[2041,2075,"ACTION"],[2080,2135,"ACTION"],[2198,2207,"ACTOR"],[2256,2269,"ACTOR"],[2270,2290,"ACTION"],[2312,2323,"ACTION"]]}],["Hactivist Group posts Credit Card details of millions of Customers Online;",{"entities":[[0,15,"ACTOR"],[16,73,"ACTION"]]}],["Fifteen hospital workers have been fired and another eight disciplined for looking at medical records of octuplet mother Nadya Suleman without permission, hospital officials said. Kaiser Permanente Bellflower Medical Center reported the violations of health care privacy laws to the state and has warned employees to keep away from Suleman's records unless they have a medical purpose, hospital spokesman Jim Anderson said Monday. \"Despite the notoriety of this case, to us this person is a patient who deserves the privacy that all our patients get,\" Anderson said. Anderson would not elaborate on how the other eight employees were reprimanded, saying only that the punishments were significant. A similar privacy breach at UCLA hospitals led to celebrities' medical information getting leaked to tabloids in recent years, including details of Farrah Fawcett's cancer treatment showing up in the National Enquirer. An investigation there resulted in firings, suspensions and warnings for 165 hospital employees, ranging from doctors to orderlies. Anderson said Kaiser does not believe any of Suleman's information was shared with the media, based on the results of their inquiry. The 33-year-old single mother of 14 gave birth to her octuplets on Jan. 26 at Kaiser's hospital in Bellflower, about 17 miles (27 kilometers) southeast of Los Angeles. Her attorney Jeff Czech said Suleman does not plan to file a lawsuit over the breach, though he suspects Kaiser employees were looking for medical information on Suleman's sperm donor. He said the name is not listed on the medical records. \"She trusts Kaiser and they said they'd look into it,\" Czech said. \"We feel that they're on top of it and are taking care of it.\" Anderson could not provide details about when Suleman's medical records were accessed and what kind of hospital employees looked at them. He said Kaiser had warned its employees about patient confidentiality rules before Suleman checked into the hospital in December. \"Even though no one knew she was there, they knew she was going to have a lot of babies,\" Anderson said. \"The extra monitoring helped determine that there were people who looked at the records who did not have reason to do so.\" Even if the employees peeked at the records just to satisfy their curiosity, without any intention of disclosing details, they were disciplined according to Kaiser's policies, Anderson said. It was unclear whether a state investigation was under way at Kaiser. A call to the California Department of Public Health was not returned Monday evening.;",{"entities":[[17,24,"ACTOR"],[71,101,"ACTION"],[234,276,"ACTION"],[305,314,"ACTOR"],[712,726,"ACTION"],[1469,1478,"ACTOR"],[1479,1515,"ACTION"],[1841,1850,"ACTOR"],[1897,1906,"ACTOR"],[2158,2164,"ACTOR"],[2169,2225,"ACTION"],[2235,2248,"ACTOR"],[2249,2302,"ACTION"],[2304,2347,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["A physician stated on Friday that she had a protected Peer review at her home. The physician does not have proper authorization to remove PII from the VA.;",{"entities":[[0,11,"ACTOR"],[79,92,"ACTOR"],[93,137,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Based on Iron Mountains internal investigation conducted by members of its Global Security group, Iron Mountain believes some of the missing files were stolen through the actions of two individuals who were employees of Cornerstone Records Management, a company acquired by Iron Mountain. One of the two resigned in October 2013, when Iron Mountain acquired Cornerstone, and the second individuals employment was terminated by Iron Mountain in June 2014. Iron Mountain has determined that the vast majority of the missing storage records were x-ray files. As a result of this incident, Iron Mountain also conducted an audit of LBIMGs other records in storage, and determined that other records in storage with its predecessor, Cornerstone, were missing when Cornerstone vacated a storage facility in 2010. LBIMG has determined that some of these additional records included patient fee ticket records. Iron Mountain has notified us there is no information to indicate that the fee ticket records have been accessed or used by any unauthorized individual. We are monitoring Iron Mountains continuing investigation of this matter. Iron Mountain is working in conjunction with the Riverside Police Department to investigate this matter, and Iron Mountain has requested that the theft of X-rays be criminally prosecuted. We have not received any indication from the Riverside Police Department that any information has been accessed or used by any unauthorized individual. UPDATE: Rogue employees at Iron Mountain who victimized patients of Orthopaedic Specialty Institute Medical Group, Long Beach Internal Medical Group, and The Hand Care Center / Shoulder and Elbow Institute also victimized 2,691 patients of Riverside Medical Clinic. The total has been updated to reflect this change.;",{"entities":[[141,146,"ASSETS"],[147,178,"ACTION"],[182,197,"ACTOR"],[207,216,"ACTOR"],[543,555,"ASSETS"],[882,901,"ASSETS"],[977,995,"ASSETS"],[996,1054,"ACTION"],[1272,1284,"ACTION"],[1285,1291,"ASSETS"],[1412,1469,"ACTION"]]}],["A hacker or hackers exploited a vulnerability in a third-party software and used it to access accounts on drupal.org. The hackers were able to upload files to the association.drupal.org and compromised Drupal's serer. Accounts on groups.drupal.org may have also been exposed. Usernames, email addresses, hashed passwords, and country information may have been exposed.;",{"entities":[[0,8,"ACTOR"],[12,19,"ACTOR"],[20,45,"ACTION"],[63,71,"ASSETS"],[76,105,"ACTION"],[122,129,"ACTION"],[130,158,"ACTION"],[252,275,"ACTION"],[346,368,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Navy veteran Sylvester Woodland said he couldnt believe what he was seeing Wednesday night when he logged onto the Veteran Affairs E-Benefits website. It gave me a different persons name, each and every time I came back, Woodland said. At first I thought it was just a glitch, but the more I thought about it, I said, wait a minute, this is more than a glitch, this is a breach. Woodland was on the VAs E-Benefits website trying to track down his own history for a bank loan. Instead, windows kept popping up displaying other veterans medical and financial information. When you click on these hyperlinks here, it takes you to the bank account, the direct deposit, bank account, last four, what bank is it for, Woodland said. Ill bet he has no idea that Im sitting here in my house with his information.;",{"entities":[[13,31,"ACTOR"],[142,150,"ASSETS"],[222,230,"ACTOR"],[362,379,"ACTION"],[381,389,"ACTOR"],[416,423,"ASSETS"],[424,477,"ACTION"],[487,571,"ACTION"],[582,612,"ACTION"],[614,646,"ACTION"],[714,722,"ACTOR"]]}],["DNC hacked;",{"entities":[[0,10,"ACTION"]]}],["Theft of documents that resulted in a security breach. ;",{"entities":[[0,8,"ACTION"],[9,18,"ASSETS"],[38,54,"ACTION"]]}],[";",{"entities":[]}],["Memorial Healthcare System (Memorial) is committed to maintaining the privacy and confidentiality of patient information at all times. We are providing this notice to formally inform a group of our patients about an email we sent to them on September 30, 2014, inviting them to an upcoming event, Breaking the Silence, in conjunction with breast cancer awareness month. We accidentally included all invited patients email addresses in the To section of the email, but recognized the oversight immediately that same day. The email may have suggested care some patients received at Memorial. Some patients may have already received notice of this oversight in an apology email we sent on October 1. This incident does not affect all Memorial patients, but only the limited number of patients to whom the email invitation was sent. We recalled as many emails as possible. A number of the email addresses were undeliverable and not received by anyone. In an abundance of caution, we began mailing notification letters to affected patients on October 24, 2014. We have also established a dedicated call center to address any questions patients may have. If you believe that you have been affected but do not receive a letter by November 14, please call 1-877-237-3854, Monday through Friday, 9:00 a.m. to 7:00 p.m. Eastern Time (closed on U.S. observed holidays). Please be prepared to provide the following ten digit reference number when calling: 6187101714. We take this matter very seriously and in response have trained the involved employees on the use of group emails and reminded them of the importance of keeping individual patients emails confidential. We will be extending the same training to other employees throughout the organization.;",{"entities":[[0,26,"ACTOR"],[216,221,"ASSETS"],[225,232,"ACTION"],[370,462,"ACTION"],[524,529,"ASSETS"]]}],["Two hundred people working with Immigration New Zealand are the latest victims of a government department privacy breach. Immigration New Zealand managers sent two emails revealing the names and email addresses of lawyers and advisers.;",{"entities":[[106,121,"ACTION"],[123,155,"ACTOR"],[156,160,"ACTION"],[165,171,"ASSETS"]]}],["Billings Clinic reported a data breach Friday that affected 8,400 people. The hospital's security systems identified unusual activity with an employee's email account on May 14, according to a release from the organization. ;",{"entities":[[27,38,"ACTION"],[75,106,"ASSETS"],[118,134,"ACTION"],[154,159,"ASSETS"]]}],["Breach on internal system via unknown method leads to medical record loss;",{"entities":[[0,6,"ACTION"],[19,25,"ASSETS"],[30,73,"ACTION"]]}],["An employee posted a Patient's name and what ward they were staying on at the VA on their Facebook page.;",{"entities":[[0,11,"ACTOR"],[12,35,"ACTION"],[90,104,"ASSETS"]]}],["Dell Incident Response botnet takeover uncovers 200 compromised system across the globe;",{"entities":[[23,38,"ACTION"],[64,70,"ASSETS"]]}],["Safeway Inc. agreed to pay nearly $10 million after a two-year investigation revealed that the Pleasanton-based company was improperly disposing of hazardous materials like medications and batteries as well as customers medical records, prosecutors said Monday. The $9.87 million settlement which closes a case built on surprise inspections of Safeway dumpsters in 2012 and 2013 was approved Friday by Alameda County Superior Court Judge Wynne Carvill. Safeway admitted no wrongdoing, but said it will beef up training to avoid future problems. The company was accused by several counties of violations at more than 500 stores and distribution centers it operated in California, including stores under the brand names Vons, Pavilions and Pak N Save, said Alameda County Assistant District Attorney Ken Mifsud, one of the lead attorneys in the case. Safeways disposal practices raised concern in 2012, Mifsud said, when district attorneys from San Joaquin and Orange counties conducted an investigation into a different business and found that Safeway was illegally shipping hazardous materials back to its distribution centers. That in and of itself is illegal, he said. Hazardous waste needs to handled by licensed transporters, and it needs to be properly labeled. None of that was happening. Based on that discovery, Mifsud said, prosecutors began the waste inspections at stores across the state. Investigators found that, on top of shipping waste back to distribution centers, Safeway workers were tossing potentially hazardous materials into common dumpsters and disposing of medical records from pharmacies which contained patients names, phone numbers and addresses without shredding them, putting customers at risk of identity theft. Mifsud said he did not know what protocols the company had in place in the past to deal with disposal of sensitive customer information and hazardous materials. Before 2012, there are years where its likely that large amounts of these materials were improperly disposed of, he said. Between 2012 and Fridays settlement, he said, district attorneys from across the state worked with Safeway to bring the company into compliance, creating procedures to ensure that materials are disposed of properly. Beyond the monetary civil penalties, the settlement also mandates that the company continue its First Assistant Store Manager Program, which addresses compliance at the store level, and conduct yearly store audits. If you take shortcuts that pollute our environment there will be consequences, said San Francisco District Attorney George Gasc_n. Judgments like these are a reminder to companies everywhere that we will vigorously pursue violations that threaten the environment. Safeway said Monday that it has strengthened policies to deal with disposal of hazardous materials like detergents, aerosol sprays, hair dye, antibacterial soaps and mascara. We have enhanced these programs and added new and supplementary training to ensure strict adherence to the law and to our policies, the company said. Safeway will continue to dedicate significant resources to these important programs. We are committed to helping to protect our environment. Safeway sold itself in March to private equity firm Cerberus Capital Management for more than $9 billion. Safeway is merging with Albertsons, and the two companies are divesting 168 stores in California and seven other states in order to satisfy Federal Trade Commission demands.;",{"entities":[[95,119,"ACTOR"],[120,144,"ACTION"],[210,235,"ASSETS"],[547,558,"ACTOR"],[594,604,"ACTION"],[1054,1076,"ACTION"],[1572,1616,"ACTION"],[1679,1701,"ACTION"],[1703,1747,"ACTION"]]}],["Warsaw stock exchange was hacked by activist group; credentials were posted on Pastebin.;",{"entities":[[22,32,"ACTION"],[36,50,"ACTOR"],[52,88,"ACTION"]]}],[";",{"entities":[]}],[" Deutsche Bank has launched a probe into whether there was a potential data leak after roughly 50 former employees still had access to their emails despite being dismissed weeks ago, reports the Financial Times. The Financial Times reported that one equity sales person sent over 450 emails despite already being let go. The German bank failed to deactivate dozens of fired staff accounts when it shut down the global equities branch of the business earlier this month.;",{"entities":[[1,14,"ACTOR"],[49,80,"ACTION"],[98,114,"ACTOR"],[115,134,"ACTION"],[141,147,"ASSETS"],[271,321,"ACTION"],[323,338,"ACTOR"],[339,390,"ACTION"]]}],["Patient information from North Cumbria's hospitals were lost on a train. ;",{"entities":[[51,72,"ACTION"]]}],["NSW Police Leaked the Emails of Everyone Who Complained About BLM Protestors Being Pepper Sprayed ;",{"entities":[[0,10,"ACTOR"],[11,17,"ACTION"],[22,28,"ASSETS"],[77,97,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Thumb drive stolen from personal vehicle contains non-public data.;",{"entities":[[0,11,"ASSETS"],[12,18,"ACTION"],[24,40,"ASSETS"]]}],["CivicSmart was breached and ransomed by REvil/Sodinokibi;",{"entities":[[11,23,"ACTION"],[28,36,"ACTION"],[40,56,"ACTION"]]}],["Both River Arch Dental and Hamner Square Dental sent patients a letter on July 16 about a breach that occurred when a business partners employee violated their security protocols;",{"entities":[[119,145,"ACTOR"],[146,179,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["CSC is a contractor for the State of North Carolina. In the course of performing services for the State, we put information from the Medicare Exclusion Database on a thumb drive. This information included your name, Social Security Number (SSN), federal tax Employer Identification Number (EIN), and date of birth. It also included other information from the database that is publicly available. In early March, we discovered the loss of this thumb drive in CSC facilities in Raleigh, North Carolina. Although not discovered until March, the thumb drive containing this information is believed to have been lost in late February.;",{"entities":[[0,3,"ACTOR"],[152,160,"ASSETS"],[166,178,"ASSETS"],[359,367,"ASSETS"],[412,434,"ACTION"],[443,454,"ASSETS"],[542,553,"ASSETS"],[582,611,"ACTION"]]}],["employee took pictures of credit cards used for payment;",{"entities":[[0,8,"ACTOR"],[9,25,"ACTION"],[26,38,"ASSETS"]]}],["The Rhode Island Department of Labor and Training says a technical problem may have led to a privacy breach for some callers to its phone line for unemployment and disability benefits. Spokeswoman Laura Hart says the problem happened Dec. 24 when some of the 700 callers that day may have inadvertently been able to hear parts of other callers' conversations. It's possible personal information could have been disclosed, including Social Security numbers. The department is investigating what happened. Hart says it shut down the phone system as soon as officials learned of the problem. The department is alerting all callers from that day and offering them free credit monitoring services for three months. Hart says it's believed the number of people affected is much less than the 700 who called that day. ;",{"entities":[[55,107,"ACTION"],[290,360,"ACTION"],[529,545,"ASSETS"]]}],["Ex-Leicester council employee prosecuted for illegally taking sensitive data;",{"entities":[[21,29,"ACTOR"],[45,76,"ACTION"]]}],["Community Care of St. Catharines and Thorold is still reeling from a cyberattack ;",{"entities":[[67,80,"ACTION"]]}],["Edmonton Public School District did not follow its own policy in the loss of memory stick containing personal information of more than 7,500 employees, says the Alberta privacy commissioner. An investigation by the Office of the Information and Privacy Commissioner found information on the USB memory stick was not protected by a password or encryption. The data included employment applications, resumes, transcripts, completed direct deposit forms (including cheques), copies of identity verification (i.e. driver’s licenses, first page of passports, birth certificates, etc.), injury forms, payroll correspondence, pension correspondence, benefits forms and correspondence, education credentials (i.e. certificate, degree, diploma etc.), job information history, pay-benefits history, performance evaluations, police criminal records check reports, etc., the report said. While the stick contained personal information of 7,662 employees, for 4,836 of these individuals there was minimal personal information (i.e. demographic information, employee ID number), the report said. However, for 2,826 individuals, the images on the USB stick \"included considerable personal information, including social insurance numbers, banking information or both.\";",{"entities":[[0,31,"ACTOR"],[32,76,"ACTION"],[77,89,"ASSETS"],[292,308,"ASSETS"],[309,355,"ACTION"],[885,894,"ASSETS"],[1136,1145,"ASSETS"]]}],["Database breach led to potential disclosure of 300K names and encrypted pw;",{"entities":[[0,8,"ASSETS"],[9,43,"ACTION"]]}],["Sharper Future is a private-sector mental health services provider in Los Angeles specializing in the assessment and treatment of forensic populations and others with behavioral and mental health issues. They have posted a breach notification (pdf) to their site, and a copy has been submitted to the California Attorney Generals Office as well. The notification explains that on March 29, their office was burglarized, and equipment stolen in the burglary contained names, dates of birth, health and clinical histories, treatment records, California Department of Corrections and Rehabilitation identification numbers, and in some cases, records containing Social Security numbers.;",{"entities":[[404,419,"ACTION"],[425,434,"ASSETS"],[435,441,"ACTION"],[449,457,"ACTION"]]}],["Rolling phlebotomy cart containing supplies for obtaining blood samples was found in the halway with patient information which included one patient's name, social security number, and blood collection order. The cart was unatteded, parked in the hallway outside of the canteen and retrieved /secured by the the Chief of QM.;",{"entities":[[8,23,"ASSETS"],[72,95,"ACTION"],[212,216,"ASSETS"],[217,230,"ACTION"],[232,253,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The Arkansas Department of Finance and Administration, Employee Benefits Division reported that 7,039 employees were affected by a breach at Health Advantage that occurred in October 2012. The incident involved paper records, and Health Advantage separately reported the breach as affecting 2,863. In addition to Arkansas DFA, Baptist Health System in Arkansas reported that 811 of their patients were affected by the incident.;",{"entities":[[129,137,"ACTION"],[211,224,"ASSETS"]]}],["Patient information was supposed to be faxed to a health care facility for patient treatment, but was inadvertently faxed to a business. (The wrong area code was used.) An owner at the business contacted the Privacy Officer immediately to report the receipt of the information. The owner agreed to destroy the information appropriately (delete electronic fax). The owner had previously worked in the healthcare industry and was very agreeable and willing to take appropriate action.;",{"entities":[[20,44,"ACTION"],[98,136,"ACTION"],[138,167,"ACTION"],[208,223,"ACTOR"],[355,358,"ASSETS"]]}],["Nuance regains some services after NotPetya cyberattack;",{"entities":[[15,28,"ASSETS"],[35,43,"ACTOR"],[44,55,"ACTION"]]}],["An Alto city employee unknowingly opened an email attachment to download the alleged invoice, when a virus “grabbed files inside the computer and encrypted them, saying we had to pay a ransom of $500 to get our files back;",{"entities":[[13,21,"ACTOR"],[22,40,"ACTION"],[44,49,"ASSETS"],[61,92,"ACTION"],[99,160,"ACTION"],[162,191,"ACTION"],[200,221,"ACTION"]]}],["unsecured cloud file storage.;",{"entities":[[0,9,"ACTION"],[16,29,"ASSETS"]]}],["Eleven patients' medical records/documentation were found inside unoccupied \"flu tents\" located in the front of the building. The documents were found by a VA employee who went in to retrieve furniture left inside. The documents contained the 11 patients' names, social security numbers, dates of birth, and medical information.;",{"entities":[[17,75,"ACTION"],[130,139,"ASSETS"],[140,167,"ACTION"],[219,228,"ASSETS"]]}],["A VHA employee complained that a co-worker accessed his sensitive record based on a copy of Access Log Report. 10/18/11:",{"entities":[[33,42,"ACTOR"],[43,72,"ACTION"]]}],["The ticket was reopened and changed to an incident. The complainant made a complaint to HHS OCR and they forwarded the complaint to VA for investigation.",{"entities":[]}],["After further investigation it was discovered that the co-worker did impermissibly access the complainants health record. The co-worker had access to the",{"entities":[[55,64,"ACTOR"],[69,121,"ACTION"],[126,135,"ACTOR"],[136,149,"ACTION"]]}],["complainants full name, full SSN, date of birth and other protected health information (PHI).;",{"entities":[]}],[";",{"entities":[]}],[";",{"entities":[]}],["Skimming device discovered on ATM in a Phuket 7-11.;",{"entities":[[0,26,"ACTION"],[30,33,"ASSETS"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The owner of PositiveSingles was accused of sharing photos and profile details from its site with other dating services, despite promising a \"confidential\" service.;",{"entities":[[44,51,"ACTION"],[52,58,"ASSETS"],[88,92,"ASSETS"]]}],[";",{"entities":[]}],["The U.S. Department of Energy has admitted that unidentified malicious hackers successfully breached 14 of its servers and 20 of its workstations two weeks ago, making off with personal information belonging to several hundred employees. The department's assurances that \"no classified data was compromised\" come as little comfort, however, considering the department's spotty security history. \"It's a continuing story of negligence,\" Ed McCallum, former director of the department's office of safeguards and security, told the Free Beacon. \"[The department] is on the cutting edge of some of the most sophisticated military and intelligence technology the country owns and it is being treated frivolously by the Department of Energy and its political masters.\";",{"entities":[[48,78,"ACTOR"],[92,100,"ACTION"],[111,118,"ASSETS"],[133,145,"ASSETS"]]}],["Truman medical staff had their laptop stolen from their car which contained 114,446 patient's information;",{"entities":[[31,37,"ASSETS"],[38,59,"ACTION"]]}],["We have identified a version of the exploit hosted on a subdomain of Taiwan's Government e-Procurement System. When users visit the main webpage a Javascript code will redirect them to the exploit page if it is the first time the visit the page: - See more at: http://www.alienvault.com/open-threat-exchange/blog/latest-internet-explorer-0day-used-against-taiwan-users#sthash.3GaV6QT2.dpuf;",{"entities":[[36,68,"ACTION"],[103,110,"ASSETS"],[145,201,"ACTION"]]}],["forum hacked ;",{"entities":[[0,5,"ASSETS"],[6,12,"ACTION"]]}],["hactivist releases PII when website doesn't respond to security disclosure;",{"entities":[[0,9,"ACTOR"],[10,74,"ACTION"]]}],["City of Austin sent documents to Time Warner without obfuscating sensitive information.;",{"entities":[[0,14,"ACTOR"],[15,19,"ACTION"],[20,29,"ASSETS"],[45,74,"ACTION"]]}],["ISLAMABAD: A network of hackers claiming to be a part of Anonymous the global hacktivist network continued a campaign of hacking, DDOS attacks and defacing websites belonging to the Pakistan government, security forces and the Pakistan Muslim League-Nawaz (PML-N) on Wednesday.;",{"entities":[[11,31,"ACTOR"],[32,56,"ACTION"],[57,89,"ACTOR"],[99,130,"ACTION"],[132,144,"ACTION"],[149,166,"ACTION"]]}],["The University of New Mexico Health Sciences Center reported that 2,365 patients had PHI on a server that was hacked on May 21, 2012. ;",{"entities":[[94,100,"ASSETS"],[106,116,"ACTION"]]}],["Veteran A contacted the Privacy Officer to report that he had received a CD from the Release of Information department with copies of his medical records and when reviewing the CD he found another file labeled with another patient's name. He stated that he opened the file to see what it was and discovered it was medical records regarding another patient, Veteran B. He closed the file and notified the Community Care Center (CCC) who advised him to return the CD to them so they could get it to the Privacy Officer for corrective action. He stated he then printed the file that contained his medical records and returned the CD to the CCC. Upon receipt of the CD, the Privacy Officer reviewed the records and determined that it contained over 300 pages of records on Veteran B which included his full name, full SSN, date of birth, address, medications, labs, progress notes, and 7332-protected information (HIV testing). The HIMS Manager and HIMS Supervisor were contacted who reviewed the incident further and determined that the Release of Information Clerk had not checked to confirm only Veteran A's information was downloaded to the CD before releasing as required per established protocol. In addition, the Privacy Officer discussed the incident with the CCC who reported that Veteran A contacted ROI to report he had received Veteran B's records in error and was told to destroy them but Veteran A was not comfortable doing this so reported it to the CCC who advised he return it to them. Notification regarding the inappropriate disclosure from ROI to the Privacy Officer or the HIMS Supervisor did not occur indicating training needed for the ROI clerks for reporting privacy incidents. The HIMS Supervisor will be re-educating the ROI clerk on the proper procedure for release of records on CD and reporting of inappropriate disclosures resulting in privacy violations. She will also be discussing the incident further with Human Resources for disciplinary action as necessary due to previous similar errors that have recently occurred.;",{"entities":[[58,70,"ACTION"],[73,75,"ASSETS"],[85,118,"ACTOR"],[177,179,"ASSETS"],[462,464,"ASSETS"],[627,629,"ASSETS"],[1141,1143,"ASSETS"],[1323,1364,"ACTION"],[1804,1806,"ASSETS"],[1824,1882,"ACTION"]]}],["Ransomware on school not successful;",{"entities":[[0,10,"ACTION"]]}],["ID theft of nursing home patient.;",{"entities":[[0,8,"ACTION"]]}],["4500 records including usernames and clear-text passwords stolen via SQLi and posted on public site.;",{"entities":[[58,73,"ACTION"],[78,100,"ACTION"]]}],["Theft of portable electronic device leads to breach of 2700 patient records.;",{"entities":[[0,5,"ACTION"],[9,35,"ASSETS"],[36,76,"ACTION"]]}],["Internal misuse stealing records for identity theft.;",{"entities":[[0,15,"ACTION"],[16,52,"ACTION"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[47,55,"ACTION"],[56,61,"ASSETS"],[67,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,163,"ACTION"],[164,172,"ASSETS"],[173,215,"ACTION"]]}],["Email error exposes 609 patient records.;",{"entities":[[0,5,"ASSETS"],[6,40,"ACTION"]]}],["Latest skimming devices found at two Fauquier gas stations - WI-Not Stop;",{"entities":[[7,29,"ACTION"]]}],["stolen laptop, 82160 records on it.;",{"entities":[[0,6,"ACTION"],[7,13,"ASSETS"]]}],["On November 29, 2011, Trident detected an unsuccessful attempt by an unidentified person to access a database containing usernames and passwords for current and former student accounts.No other information was contained in the database. The company permanently removed the database from the network and engaged in an external forensic team to assess the nature of the incident.The investigation did not find any evidence that someone successfully obtain access to the database and, based on a review of the available volume history for November and December 2011, there was no unusual market activity to indicate inappropriate access to student accounts. Not only is there no evidence that any students information was accessed by an unauthorized person,Trident is not aware of any reports that student account information has been misused as a result of this incident. However, because student accounts contained names, addresses, dates of birth, and often Social Security numbers, the company is notifying all students whose username and password work in the targeted database and offering them one year of free credit monitoring.;",{"entities":[[42,62,"ACTION"],[66,88,"ACTOR"],[89,98,"ACTION"],[101,109,"ASSETS"],[227,236,"ASSETS"],[273,281,"ASSETS"],[291,298,"ASSETS"],[468,476,"ASSETS"],[731,753,"ACTOR"]]}],["Company accidentally emails spreadsheet with non-public data to large number of customers;",{"entities":[[0,7,"ACTOR"],[8,27,"ACTION"],[28,39,"ASSETS"]]}],["Police find skimming devices at Sarasota Citgo;",{"entities":[[7,28,"ACTION"]]}],["Ex-IRS Employee in Albuquerque Gets Prison Term for ID Theft;",{"entities":[[7,15,"ACTOR"],[55,60,"ACTION"]]}],["One of the HR people's laptop was infected by malware. The entire contents of the laptop was shipped off to a file sharing site. It contained full payroll data dump. Company did not choose to notify--claimed exemption as a government agency.;",{"entities":[[23,29,"ASSETS"],[30,54,"ACTION"],[83,89,"ASSETS"],[90,108,"ACTION"]]}],["Providence Health & Services notified about 5,400 current and former patients that a former employee may have accessed their health records.;",{"entities":[[85,100,"ACTOR"],[101,140,"ACTION"]]}],["Valve's online gaming platform Steam was hit by a DDoS attacks over the weekend. An assault by a crew calling themselves DerpTrolling left EA Origin's online systems intermittently unavailable for around 24 hours;",{"entities":[[37,62,"ACTION"],[121,133,"ACTOR"],[158,165,"ASSETS"],[166,212,"ACTION"]]}],["Phishing gains the bad guys employee W-2s.;",{"entities":[[0,8,"ACTION"]]}],["Anonymous has released thousands of login credentials and other data from the web servers of the European Space Agency (ESA) following a breach of several of the agency's Internet domains; did it just to prove it can be done. ;",{"entities":[[0,9,"ACTOR"],[14,53,"ACTION"],[78,89,"ASSETS"]]}],["A VA Provider was concerned that coworkers entered their electronic medical record. A review of access confirmed 17 instances of unauthorized entries by 11 ",{"entities":[[129,149,"ACTION"]]}],["individuals;",{"entities":[]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Apple Store employee fired after texting customer’s personal photos to himself;",{"entities":[[12,20,"ACTOR"],[33,78,"ACTION"]]}],["A laptop computer stolen out of an employee's vehicle held the medical and certain personal information about developmentally disabled consumers of the North Los Angeles County Regional Center, according to an agency notification published Friday. The agency is a nonprofit service provider under contract with the California Department of Developmental Services to coordinate and provide community-based services to persons with developmental disabilities (its consumers) in the Santa Clarita, Antelope and San Fernando valleys.;",{"entities":[[2,17,"ASSETS"],[18,24,"ACTION"]]}],["The Manhattan headquarters of JPMorgan Chase, which securities filings revealed was attacked by hackers over the summer. The Manhattan headquarters of JPMorgan Chase, which securities filings revealed was attacked by hackers over the summer. Documents: JPMorgans S.E.C. Filing Updated, 9:03 p.m. | A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever. The details of the breach disclosed in a securities filing on Thursday emerge at a time when consumer confidence in the digital operations of corporate America has already been shaken. Target, Home Depot and a number of other retailers have sustained major data breaches. Last year, the information of 40 million cardholders and 70 million others were compromised at Target, while an attack at Home Depot in September affected 56 million cards. But unlike retailers, JPMorgan, as the largest bank in the nation, has financial information in its computer systems that goes beyond customers credit card details and potentially includes more sensitive data. Weve migrated so much of our economy to computer networks because they are faster and more efficient, but there are side effects, said Dan Kaminsky, a researcher who works as chief scientist at White Ops, a security company. Until just a few weeks ago, executives at JPMorgan said they believed that only one million accounts were affected, according to several people with knowledge of the attacks. As the severity of the intrusion which began in June but was not discovered until July became more clear in recent days, bank executives scrambled for the second time in three months to contain the fallout and to reassure skittish customers that no money had been taken and that their financial information remained secure. The hackers appeared to have obtained a list of the applications and programs that run on JPMorgans computers a road map of sorts which they could crosscheck with known vulnerabilities in each program and web application, in search of an entry point back into the banks systems, according to several people with knowledge of the results of the banks forensics investigation, all of whom spoke on the condition of anonymity. Operating overseas, the hackers gained access to the names, addresses, phone numbers and emails of JPMorgan account holders. In its regulatory filing on Thursday, JPMorgan said that there was no evidence that account information, including passwords or Social Security numbers, had been taken. The bank also noted that there was no evidence of fraud involving the use of customer information. Still, until the JPMorgan breach surfaced in July, banks were viewed as relatively safe from online assaults because of their investment in defenses and trained security staff. Most previous breaches at banks have involved stealing personal identification numbers for A.T.M. accounts, not burrowing deep into the internal workings of a banks computer systems. Even if no customer financial information was taken, the apparent breadth and depth of the JPMorgan attack shows how vulnerable Wall Street institutions are to cybercrime. In 2011, hackers broke into the systems of the Nasdaq stock market, but did not penetrate the part of the system that handles trades. Jamie Dimon, JPMorgans chairman and chief executive, has acknowledged the growing digital threat. In his annual letter to shareholders, Mr. Dimon said, Were making good progress on these and other efforts, but cyberattacks are growing every day in strength and velocity across the globe. Even though the bank has fortified its defenses against the attacks, Mr. Dimon wrote, the battle is continual and likely never-ending. On Thursday, some lawmakers weighed in. Edward J. Markey, Democrat of Massachusetts and a member of the Senate Commerce Committee, said the data breach at JPMorgan Chase is yet another example of how Americans most sensitive personal information is in danger. Hackers drilled deep into the banks vast computer systems, reaching more than 90 servers, the people with knowledge of the investigation said. As they analyze the contours of the breach, investigators in law enforcement remain puzzled, partly because there is no evidence that the attackers looted any money from customer accounts. That lack of any apparent profit motive has generated speculation among the law enforcement officials and security experts that the hackers, which some thought to be from Russia and may have been sponsored by elements of the Russian government, the people with knowledge of the investigation said. By the time the banks security team discovered the breach in late July, hackers had already obtained the highest level of administrative privilege to dozens of the banks computer servers, according to the people with knowledge of the investigation. It is still unclear how hackers managed to gain such deep access. The people with knowledge of the investigation said it would take months for the bank to swap out its programs and applications and renegotiate licensing deals with its technology suppliers, possibly giving the hackers time to mine the banks systems for unpatched, or undiscovered, vulnerabilities that would allow them re-entry into JPMorgans systems. Beyond its disclosures, JPMorgan did not comment on what its investigation had found. Kristin Lemkau, a JPMorgan spokeswoman, said that describing the banks breach as among the largest was comparing apples and oranges. Preparing for the disclosure on Thursday, JPMorgan retained the law firm WilmerHale to help with its regulatory filing with the Securities and Exchange Commission, people with knowledge of the matter said. Earlier on Thursday, some executives Barry Sommers, the chief executive of Chases consumer bank flew back to New York from Naples, Fla., where they had convened for a leadership conference, these people said. The initial discovery of the hack sent chills down Wall Street and prompted an investigation by the Federal Bureau of Investigation. The bank was also forced to update its regulators, including the Federal Reserve, on the extent of the breach. Faced with the rising threat of online crime, JPMorgan has said it plans to spend $250 million on digital security annually, but had been losing many of its security staff to other banks over the last year, with others expected to leave soon.;",{"entities":[[80,92,"ACTION"],[96,103,"ACTOR"],[201,213,"ACTION"],[217,224,"ACTOR"],[298,326,"ACTION"],[342,366,"ACTION"],[910,919,"ACTION"],[967,973,"ASSETS"],[1075,1091,"ASSETS"],[1919,1926,"ACTOR"],[1927,1992,"ACTION"],[2015,2024,"ASSETS"],[2110,2117,"ASSETS"],[2122,2137,"ASSETS"],[2187,2194,"ASSETS"],[2959,2999,"ACTION"],[3078,3095,"ASSETS"],[3278,3285,"ACTOR"],[3286,3296,"ACTION"],[3301,3308,"ASSETS"],[3375,3381,"ASSETS"],[3969,3980,"ACTION"],[4090,4097,"ACTOR"],[4098,4115,"ACTION"],[4131,4147,"ASSETS"],[4171,4178,"ASSETS"],[4265,4275,"ACTION"],[4371,4380,"ACTOR"],[4555,4562,"ACTOR"],[4773,4779,"ACTION"],[4794,4801,"ACTOR"],[4802,4868,"ACTION"],[4892,4908,"ASSETS"],[4995,5002,"ACTOR"],[5011,5036,"ACTION"],[5249,5256,"ACTOR"],[5274,5287,"ASSETS"],[5382,5390,"ASSETS"],[5549,5555,"ACTION"],[6266,6273,"ACTION"]]}],["urgery Service printed a copy of an EndoSoft report to the Release of Information (ROI) Office.",{"entities":[]}],["and attached a copy of Veteran A's Operative Report to Veteran B's request for information. Veteran B picked up the information and left the ROI office in possession of Veteran A's documentation.;",{"entities":[[4,19,"ACTION"],[132,168,"ACTION"],[181,195,"ASSETS"]]}],["Data breach affects Ricoh;",{"entities":[[0,11,"ACTION"]]}],["NEW YORK/BOSTON, Dec 5 (Reuters) - JPMorgan Chase & Co is warning some 465,000 holders of prepaid cash cards issued by the bank that their personal information may have been accessed by hackers who attacked its network in July. The cards were issued for corporations to pay employees and for government agencies to issue tax refunds, unemployment compensation and other benefits. JPMorgan said on Wednesday it had detected that the web servers used by its site www.ucard.chase.com had been breached in the middle of September. It then fixed the issue and reported it to law enforcement. Bank spokesman Michael Fusco said that since the breach was discovered, the bank has been trying to find out exactly which accounts were involved and what information may have been compromised. He declined to discuss how the attackers breached the bank's network. Fusco said the bank was notifying the cardholders, who account for about 2 percent of its roughly 25 million UCard users, about the breach because it couldn't rule out the possibility that their personal information was among the data removed from its servers. The bank typically keeps the personal information of its customers encrypted, or scrambled, as a security precaution. However, during the course of the breach, personal data belonging to those customers had temporarily appeared in plain text in files the computers use to log activity. The bank believes \"a small amount\" of data was taken, but not critical personal information such as social security numbers, birth dates and email addresses. Cyber criminals covet such data because it can be used to open bank accounts, obtain credit cards and engage in identity theft. Many states require banks to notify customers if they believe there is any chance that such information may have been taken in a breach. The bank is also offering the cardholders a year of free credit-monitoring services. The warning only affects the bank's UCard users, not holders of debit cards, credit cards or prepaid Liquid cards. Fusco said the bank had not found that any funds were stolen as a result of the breach and that it had no evidence that other crimes have been committed. As a result, it was not issuing replacement cards. The spokesman declined to identify the government agencies and businesses whose customers it had warned about the breach. Officials from the states of Louisiana and Connecticut said the bank notified them this week that personal information of some of their citizens may have been exposed. Louisiana citizens included about 6,000 people who received cards with state income tax refunds, plus 5,300 receiving child support payments and 2,200 receiving unemployment benefits, according to a statement from state Commissioner of Administration Kristy Nichols on Wednesday. Nichols said Louisiana would \"hold JP Morgan Chase responsible\" for protecting the rights and personal privacy of the citizens. Connecticut Treasurer Denise Nappier said she was \"dismayed\" that the bank took two and a half months to notify the state of the problem. \"JPMorgan Chase has some work to do, not only to assure the holders of its debit cards, but also to restore the state's confidence in the company's ability to remain worthy of our continued business,\" Nappier said in a statement on Thursday. The bank said it didn't know who was behind the attack, though the Secret Service and FBI were investigating the matter. Businesses and government agencies are increasingly using prepaid cards because they are easier to cash than paper checks. Yet the vast stores of data behind payment cards of all kinds have created new risks. In 2007, some 41 million credit and debit card numbers from major retailers, including the owner of T.J. Maxx stores, were stolen. In May of this year, U.S. prosecutors said a global cybercrime ring had stolen $45 million from banks by hacking into credit card processing firms and withdrawing money from automated teller machines in 27 countries. (Reporting by David Henry in NEW YORK and Jim Finkle in BOSTON; Editing by Christopher Cushing and Bernadette Baum);",{"entities":[[103,108,"ASSETS"],[139,182,"ACTION"],[186,193,"ACTOR"],[198,206,"ACTION"],[211,218,"ASSETS"],[233,238,"ASSETS"],[434,445,"ASSETS"],[483,500,"ACTION"],[639,645,"ACTION"],[815,824,"ACTOR"],[825,853,"ACTION"],[987,993,"ACTION"],[1107,1115,"ASSETS"],[1320,1367,"ACTION"],[1422,1456,"ACTION"],[1563,1578,"ACTOR"],[1985,1990,"ASSETS"],[1999,2004,"ASSETS"],[2023,2029,"ASSETS"],[2505,2527,"ACTION"],[2589,2594,"ASSETS"],[3159,3164,"ASSETS"],[3369,3375,"ACTION"],[3509,3514,"ASSETS"],[3857,3863,"ACTION"],[3890,3931,"ACTION"],[3936,3984,"ACTION"]]}],["SEIU 775 Benefits Group experienced a breach when some unknown third party started deleted information of customers;",{"entities":[[38,44,"ACTION"],[55,74,"ACTOR"],[75,115,"ACTION"]]}],["Between April 10, 2018 and May 17, 2018, Sunspire learned that its employees became the target of a phishing email campaign that compromised several email accounts.;",{"entities":[[100,123,"ACTION"],[129,148,"ACTION"],[149,164,"ASSETS"]]}],["The New Zealand Law Society has apologised after a staff member sent confidential information to the wrong person. The privacy breach occurred when the staff member intended to email a colleague but mistakenly emailed someone with a similar name.;",{"entities":[[51,63,"ACTOR"],[64,114,"ACTION"],[120,134,"ACTION"],[153,165,"ACTOR"],[200,247,"ACTOR"]]}],["Natural Provisions, Inc., a Vermont health foods grocery chain, agreed to pay $30,000 to settle claims brought by the Vermont attorney general that it failed to notify consumers and the attorney general within the statutory period required by Vermont's Security Breach Notice Act and Consumer Protection Act. Natural Provisions, Inc. agreed to pay $15,000 in civil penalties, an additional $15,000 in upgrades for its information technology systems, and to take the steps necessary to prevent future data breaches. The settlement resulted from a security data breach due to credit card fraud at one of its stores. The store learned of the fraud after local police responded to reports from customers that credit card numbers were being stolen and used, tracing it to the Natural Provisions grocery. The store processed about 5,500 transactions a month. Prior to notification, tens of thousands of dollars of credit card fraud took place and some customers had their credit card information stolen a second time after, being unaware that the store was the site of the fraud, they used their replacement cards to make new purchases at the store. Natural Provisions, a company specializing in the sale of organic and natural foods, said it was unaware of the regulations required by the Vermont Security Breach Notice Act because it did not have an IT person on staff and had relied on a consulting group to ensure their security. ;",{"entities":[[575,586,"ASSETS"],[587,592,"ACTION"],[636,645,"ACTION"],[706,717,"ASSETS"],[726,752,"ACTION"],[909,920,"ASSETS"],[921,937,"ACTION"],[991,997,"ACTION"],[1038,1047,"ACTOR"],[1048,1073,"ACTION"]]}],["Prisoners built two PCs from parts, hid them in ceiling, connected to the state's network and did cybershenanigans;",{"entities":[[0,9,"ACTOR"],[10,15,"ACTION"],[20,23,"ASSETS"],[36,55,"ACTION"],[57,89,"ACTION"],[94,114,"ACTION"]]}],["The Privacy Officer found an \"Administrative Officer of the Day Report\" lying on the ground beside the recycle bin, in front of Building 3. The report is dated December 10, 2012. There are four full names and last four of the social security number. One item is regarding valuables that a patient left, one item is regarding medical information sent to local hospital, one item is regarding patient arrangements for lodging, and the last item was where the patient had expired. There are no individual medical diagnoses, or other individual identifiers.;",{"entities":[[30,52,"ACTOR"],[72,114,"ACTION"]]}],["UCLA Health announced Tuesday that 1,242 patients are being notified about the theft of a faculty member's laptop computer containing names, medical record numbers and health information used to prepare patient treatment plans. According to UCLA, no Social Security numbers, health plan ID numbers, credit card numbers or other financial data were stored on the stolen laptop, which was password protected and was reported stolen on July 3. UCLA Health officials said they immediately initiated an analysis of a backup disk made available by the faculty member -- whose name was not released -- to determine whether protected health or other restricted information was stored on the laptop and, if so, who was affected. The review was completed on Aug. 14. \"At this time, there is no evidence that any individual's personal or medical information stored on the laptop has been accessed, disclosed or used,\" according to a UCLA Health statement. \"UCLA Health has policies and programs in place to identify 'red flags' or warnings of possible medical identity theft and inform patients when these are found.\" ;",{"entities":[[75,84,"ACTION"],[107,122,"ACTION"],[363,369,"ACTION"],[370,376,"ASSETS"],[411,430,"ACTION"],[685,691,"ASSETS"],[865,871,"ASSETS"]]}],["a user noticed that by changing the four-digit ID in the website’s URL, he could access any of the 1.1 million accounts.;",{"entities":[[0,6,"ACTOR"],[20,70,"ACTION"],[75,87,"ACTION"]]}],[";",{"entities":[]}],["A CBOC physician had completed a peer review and sent the document back to the main facility via interoffice mail. It is now missing;",{"entities":[[7,16,"ACTOR"],[17,44,"ACTION"],[49,53,"ACTION"],[58,66,"ASSETS"],[109,114,"ASSETS"],[118,132,"ACTION"]]}],["Camberwell High School becomes second target of major privacy breach in two weeks;",{"entities":[[54,68,"ACTION"]]}],["employee was arrested in Visalia on Thursday on suspicion of fraudulently accessing computer data ;",{"entities":[[0,8,"ACTOR"],[61,83,"ACTION"],[84,92,"ASSETS"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["A total of ten individuals were charged last week for their alleged involvement in a massive identity theft ring that operated in the Washington DC metropolitan area. According to the indictment, Blalock and Bush recruited women to steal personal information from the companies they worked for. The scheme, which was running since at least January 2012, has made at least 600 victims, including overseas-based employees of the US Department of State, the US Department of Defense, and the US Agency for International Development. The information stolen from companies such as a car rental firm, an insurer and a local dental practice was used to manufacture fraudulent identification documents that were later utilized to open credit lines on behalf of the victims. ;",{"entities":[[11,26,"ACTOR"],[85,107,"ACTION"],[197,204,"ACTOR"],[209,213,"ACTOR"],[214,223,"ACTION"],[233,259,"ACTION"],[537,555,"ACTION"],[687,696,"ASSETS"],[702,742,"ACTION"]]}],["Attorney General Pam Bondi's Medicaid Fraud Control Unit and the Cocoa Police Department today announced the arrests of three Brevard County residents, Bobby Lyons, Valerie Jackson and Kwanya Sanders. According to the investigation, the defendants participated in a scheme to defraud Florida Medicaid out more than $100,000 using children's information. The defendants allegedly gave children fake mental health diagnosis as a pretext for billing Medicaid for mental health services that the children never received and their parents never authorized. Jackson and Sanders, owners of Changes Youth and Family Services, Inc., a Florida Medicaid provider in Melbourne, entered into a business partnership with Lyons, who ran a mentoring program through Orange County Schools. As part of the agreement, Lyons provided Changes with a list of students and the students' Medicaid identification to allow Changes to bill for services rendered by Lyons. Lyons provided the names and information of 94 children to Jackson and Sanders, who paid Lyons $2,500. According to the investigation, Lyons never provided any of the billed services and did not have parental consent or the required documents for Medicaid billing. Even after realizing Lyons' fraud, Jackson and Sanders did not notify authorities or attempt to return the funds of more than $100,000 received illegally from Medicaid for services never rendered. The investigation revealed that Lyons only mentored students and did not provide any actual psychosocial counseling for the fraudulent diagnoses of serious mental health issues.;",{"entities":[[152,163,"ACTOR"],[165,180,"ACTOR"],[185,200,"ACTOR"],[273,283,"ACTOR"],[369,421,"ACTOR"],[474,482,"ASSETS"],[552,559,"ACTOR"],[564,571,"ACTOR"],[707,712,"ACTOR"],[799,804,"ACTOR"],[917,925,"ASSETS"],[938,944,"ACTOR"],[945,950,"ACTOR"],[951,988,"ACTION"],[1004,1011,"ACTOR"],[1016,1023,"ACTOR"],[1029,1033,"ACTION"],[1034,1039,"ACTOR"],[1080,1085,"ACTOR"],[1086,1127,"ACTION"],[1132,1161,"ACTION"],[1232,1237,"ACTOR"],[1239,1244,"ACTION"],[1246,1253,"ACTOR"],[1258,1265,"ACTOR"],[1383,1391,"ASSETS"],[1440,1445,"ACTOR"],[1532,1585,"ACTION"]]}],["About 2,400 patients of University of Massachusetts Memorial Medical Center (UMMMC) are being notified that their personal information including Social Security numbers was accessed by a former employee and may have been used to open commercial accounts. How many victims? About 2,400, according to reports. What type of personal information? Names, addresses, dates of birth and Social Security numbers. What happened? A former employee accessed the personal information of patients and the data may have been used to open commercial accounts. What was the response? UMMMC opened an internal investigation that is ongoing with law enforcement. UMMMC is enhancing security and enforcing education of policies and procedures to protect patient information. All impacted patients are being notified. The employee no longer works at UMMMC, according to a notification posted on the UMMMC website. Details: UMMMC learned of the incident on March 6. The employee had access to patient information between May 6, 2002, and March 4. The information could have been used to open credit card and cell phone accounts. Quote: We are not aware of the misuse of any medical information, according to the notification. Source: umass-memorial-hospital-main, Important Privacy Incident Notice for UMass Memorial Medical Center Patients, 2014.;",{"entities":[[171,183,"ACTION"],[189,204,"ACTOR"],[209,256,"ACTION"],[428,443,"ACTOR"],[444,489,"ACTION"],[503,550,"ACTION"],[809,817,"ACTOR"],[957,965,"ACTOR"],[966,999,"ACTION"],[1050,1078,"ACTION"],[1079,1090,"ASSETS"],[1095,1105,"ASSETS"]]}],["On 06/30/10, Veteran A called the Director's Office to report that he received Veteran B's information through the mail. Veteran A received a document which looked like an appointment reminder, but it also contained Veteran B's full name, full social security number, date of birth, gender and PHI.",{"entities":[[34,51,"ACTOR"],[70,102,"ACTION"],[115,120,"ASSETS"],[131,139,"ACTION"],[142,150,"ASSETS"]]}],["Incident Update",{"entities":[[0,15,"ACTION"]]}],["07/07/10:",{"entities":[]}],["Veteran B will receive a letter offering credit protection services.",{"entities":[]}],["NOTE: There were a total of 103 Mis-Mailed incidents this reporting period. Because of repetition, the other 102 are not included in this report, but are included in the \"Mis-Mailed Incidents\" count at the end of this report. In all incidents, Veterans will receive a notification letter and/or credit monitoring will be offered if appropriate;",{"entities":[[32,52,"ACTION"],[171,191,"ACTION"]]}],["An electronic file with information pertaining to a pilot Wellness Screening competition at the East End Complex was accidentally emailed by a Kaiser Permanente employee to a member of the pilot planning team on May 16, 2013. The personal information in the file, which was collected from you when you signed up for your screening, included your first and last name, Kaiser Permanente medical record number, phone number, email address, employer name, department name, and the appointment date and time for the health screening.The recipient has been very cooperative and has given Kaiser Permanente every assurance, including a legal attestation, that the information was not viewed and has been deleted.;",{"entities":[[3,18,"ASSETS"],[113,137,"ACTION"],[143,169,"ACTOR"],[258,262,"ASSETS"]]}],["2.5K payment cards compromised from web site;",{"entities":[[5,30,"ACTION"],[36,44,"ASSETS"]]}],["A VA employee sent an unencrypted email to approximately 20 other VA employees that had an attachment with the personally identifiable information (PII) of a potential applicant. This application contains his full SSN and information normally in a work application. This is VA Form 10-2850 (Application for Physicians, Dentists, Podiatrists, Optometrists & Chiropractors).;",{"entities":[[0,13,"ACTOR"],[14,33,"ACTION"],[34,39,"ASSETS"]]}],["Patients who had X-rays at Raleigh Orthopaedic Clinic before 2008 are being urged to keep an eye on their bank statements and credit reports after 17,300 sets of X-rays vanished. A company the practice hired in January to convert X-ray films to electronic files never returned the materials, according to a letter sent to clinic patients. Instead, the X-rays are thought to have been resold for the value of the silver they contain, said Constance Scott, the clinic’s security officer.;",{"entities":[[17,23,"ASSETS"],[162,168,"ASSETS"],[169,178,"ACTION"],[182,189,"ACTOR"],[231,242,"ASSETS"],[246,262,"ASSETS"],[263,291,"ACTION"],[353,359,"ASSETS"],[360,391,"ACTION"]]}],["The US Federal Trade Commission has sued an IT provider for failing to detect 20 hacking intrusions over a 22-month period, allowing the hacker to access the data for 1 million consumers. The provider only discovered the breach when the hacker maxed out the provider’s storage system. Utah-based InfoTrax Systems was first breached in May 2014, when a hacker exploited vulnerabilities in the company’s network that gave remote control over its server, FTC lawyers alleged in a complaint. According to the complaint, the hacker used that control to access the system undetected 17 times over the next 21 months. Then on March 2, 2016, the intruder accessed personal information for about 1 million consumers. The data included full names, social security numbers, physical addresses, email addresses, phone numbers, and usernames and passwords for accounts on the InfoTrax service.;",{"entities":[[81,99,"ACTION"],[137,143,"ACTOR"],[144,162,"ACTION"],[217,227,"ACTION"],[237,243,"ACTOR"],[244,253,"ACTION"],[258,284,"ASSETS"],[306,313,"ASSETS"],[314,332,"ACTION"],[353,359,"ACTOR"],[360,385,"ACTION"],[403,410,"ASSETS"],[416,440,"ACTION"],[445,451,"ASSETS"],[521,527,"ACTOR"],[528,555,"ACTION"],[560,566,"ASSETS"],[639,647,"ACTOR"],[648,677,"ACTION"]]}],["St. Peter's Health Partners, the Albany, New York region's largest hospital system, is notifying 5,117 of its patients that some information about them was involved in a potential data breach after a manager's cellphone was stolen. The incident affected patients at St. Peter's Medical Associates P.C., one of the system's physician groups. The manager's cellphone had access to corporate email systems, but St. Peter's officials said they received no reports that patient information has been improperly used. The affected data included scheduling details, such as the patient name and date of birth, as well as the day, time and location of medical appointments, along with a general description of the reason for the appointment. The breach primarily involved data from August to November 2014. The emails did not include other medical records and personal identity information, such as financial accounts and Social Security numbers. Two patients' home addresses and phone numbers were included in the emails and they were notified previously. Hospital officials said they learned of the phone theft and potential breach on Nov. 24. They reported it to law enforcement and took other cyber security steps, such as remotely wiping data from the device and disconnecting it from the hospital system's corporate email system. The hospital system, which has about 12,500 employees total, and is the region's largest private-sector employer, announced today it has sent notifications to all 5,117 patients affected by the breach. \"While at this time we believe the risk is low that the data on these individuals was accessed, we are committed to doing all we can to protect each and every one of them,\" Donald Martin, chief executive officer of SPHP Medical Associates, said. The stolen cellphone was password protected, but was not encrypted in accordance with St. Peter's Health Partners customary security procedures, according to the hospital system.;",{"entities":[[152,191,"ACTION"],[200,209,"ACTOR"],[210,219,"ASSETS"],[220,231,"ACTION"],[345,354,"ACTOR"],[355,364,"ASSETS"],[365,388,"ACTION"],[389,402,"ASSETS"],[737,743,"ACTION"],[802,808,"ASSETS"],[1006,1012,"ASSETS"],[1092,1097,"ASSETS"],[1098,1103,"ACTION"],[1108,1124,"ACTION"],[1313,1326,"ASSETS"],[1521,1528,"ACTION"],[1780,1786,"ACTION"],[1787,1796,"ASSETS"],[1825,1842,"ACTION"]]}],["An Iranian hacker going with the handle of Dr.3v1l from Black_Devils B0ys hacking group has breached to an Israeli based job search portal, as a result login account information of over 3349 Israeli citizens have been leaked and dumped online.;",{"entities":[[3,17,"ACTOR"],[40,50,"ACTOR"],[56,73,"ACTOR"],[74,87,"ACTOR"],[88,100,"ACTION"],[125,138,"ASSETS"],[208,224,"ACTION"],[229,243,"ACTION"]]}],["Website breached and customer data (including credit card numbers) stolen.;",{"entities":[[0,7,"ASSETS"],[8,16,"ACTION"],[21,74,"ACTION"]]}],["On the eve of releasing its financial earnings for the past quarter, Honda created a situation described by one security researcher as “a hacker’s dream”. According to Verdict, 40GB of critical company data – amounting to 134m rows of system data – was stored on an unsecured Elasticsearch database. This meant that anyone who knew where to look could have come across the company’s most sensitive data, not only including information about the company’s security systems and networks, but also technical data on all of its IP addresses, operating systems and what patches they had.;",{"entities":[[69,74,"ACTOR"],[235,241,"ASSETS"],[249,275,"ACTION"],[290,299,"ASSETS"]]}],["ONE in 10 Australians’ private health records have been exposed in a major error by the Department of Health that shows what medication patients are on and whether they are seeing a psychologist.;",{"entities":[[46,63,"ACTION"],[69,80,"ACTION"],[84,108,"ACTOR"]]}],["City of Morières-lès-Avignon experiences a ransomware attack ;",{"entities":[[43,60,"ACTION"]]}],["The systems of Tajikistans domain registrar (domain.tj) have been hacked. The attacker, an Iranian hacker who uses the online moniker Mr.XHat, has taken the opportunity to deface a number of high-profile domains such as Twitter, Amazon and Google.;",{"entities":[[4,11,"ASSETS"],[56,73,"ACTION"],[78,86,"ACTOR"],[91,105,"ACTOR"],[110,141,"ACTION"],[169,211,"ACTION"]]}],["The New Mexico Oncology Hematology Consultants breach involving a laptop stolen from an employees office has been added to the list. It reportedly affected 12,354 patients.;",{"entities":[[47,63,"ACTION"],[66,72,"ASSETS"],[73,79,"ACTION"]]}],["Oxfam Australia found their data up for sale in a criminal forum ;",{"entities":[[22,64,"ACTION"]]}],["email phishing ;",{"entities":[[0,5,"ASSETS"],[6,14,"ACTION"]]}],["Virginia State Trooper found conducting non-work related background checks;",{"entities":[[0,22,"ACTOR"],[23,74,"ACTION"]]}],["Groupe Reorev had data stolen and then encrypted by ransomware group LV;",{"entities":[[14,29,"ACTION"],[39,48,"ACTION"],[52,71,"ACTOR"]]}],["A spreadsheet containing personal information of 430 individuals who registered for or participated in the November 2011 Chinese Bridge Delegation was not properly secured, and potentially viewable via the internet. It contained name, DOB, passport number and contact info of the registrants. ;",{"entities":[[2,13,"ASSETS"],[147,171,"ACTION"],[177,215,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Researchers discover flaw and create app to reveal exact location of users of a popular dating application called Tinder;",{"entities":[[0,11,"ACTOR"],[12,25,"ACTOR"],[30,74,"ACTOR"],[95,106,"ASSETS"]]}],["Par Pharmaceutical has sued a pair of former employees who set up a rival company, accusing them of poaching staff to steal trade secrets.;",{"entities":[[38,54,"ACTOR"],[59,81,"ACTION"],[100,138,"ACTION"]]}],["Misuse of access to police DB;",{"entities":[[0,26,"ACTION"],[27,29,"ASSETS"]]}],["Pakistani hackers of the Xploiters Crew have breached and defaced Translate.com, a fairly popular free online tool that provides translations between 75 languages;",{"entities":[[0,17,"ACTOR"],[25,39,"ACTOR"],[40,53,"ACTION"],[58,65,"ACTION"],[103,114,"ASSETS"]]}],["Earlier today, several top designers at HTC were arrested in Taipei under suspicion of fraudulent expense claims, as well as stealing trade secrets ahead of leaving the company to run a new mobile design firm in both Taiwan and mainland China. The real beef HTC has here is that it apparently caught Chien secretly downloading files related to the upcoming Sense 6.0 UI design, and then shared them with external contacts via e-mail. ;",{"entities":[[27,36,"ACTOR"],[87,112,"ACTION"],[125,147,"ACTION"],[281,301,"ACTION"],[308,328,"ACTION"],[329,334,"ASSETS"],[389,423,"ACTION"],[428,435,"ASSETS"]]}],["Organized criminal group uses stolen customer credentials to access accounts and transfer money to actor-controlled cards that were then cashed out at US-based ATMs or fraudulent purchases.;",{"entities":[[0,24,"ACTOR"],[25,57,"ACTION"],[58,76,"ACTION"],[81,95,"ACTION"],[160,164,"ASSETS"],[168,189,"ACTION"]]}],["One-hundred twenty-one (121) Patients-A received a Medline Industries medical supply intended for one-hundred twenty-one (121) Patients-B. One-hundred twenty-one (121) of Patient-Bs' name, address, and type of medical supply was compromised. Patients-A reported the incident to their medical centers and a replacement has been requested for Patients-B. Charleston Consolidated Mail Outpatient Pharmacy (CMOP) investigation concludes that this was a Medline packing error. On 04/13/15, Medline Industries installed a new automated system for applying shipping labels to CMOP packages which did not work properly therefore causing these mismailings. The packing errors have been reported to Medline for investigation and corrective action.;",{"entities":[[202,241,"ACTION"],[449,456,"ACTOR"],[457,471,"ACTION"],[485,492,"ACTOR"],[530,536,"ASSETS"],[589,610,"ACTION"],[621,647,"ACTION"],[648,666,"ACTION"],[689,696,"ACTOR"]]}],["Veteran A was given Veteran B's discharge papers instead of his own.;",{"entities":[[10,19,"ACTION"],[42,48,"ASSETS"]]}],["OxAlien, known for his high profile Virgin Radio Dubai hack is back in news by breaking into an Iranian based cyber crime and events archive website, as a result the database and 2000+ login accounts have been leaked online. The site is not government owned yet contains massive data, exposing login details of site users. The hacker contacted me on Twitter and explained why the site was targeted, a similar explanation can be found on Pastebin where the data was dumped. The message can also read below: The majority of the leaked accounts belong to Irani defacers. The owner sucks for scanning his website with Acunetix to expose the vulnerabilities (This explains why there are emails like “acunetix123@acunetix.com”. The passwords might work on the emails so make sure to login on each and every email for maximum lulz. =) After analyzing the dumped data, I have found sites’s database, site admin’s emails with encrypted passwords, emails and encrypted passwords of thousands of Irani based defacers and site users, most of leaked emails are from @yahoo.com @gmail.com and @hotmail.com. Link of targeted site and dumped data is available below: http://append-hc.com http://pastebin.com/x2LwWmzG It seems the breach has massively affected the site as at the time of publishing this article, the website was down and displaying ‘maintenance’ message. ;",{"entities":[[0,7,"ACTOR"],[79,92,"ACTION"],[141,148,"ASSETS"],[166,174,"ASSETS"],[200,224,"ACTION"],[230,234,"ASSETS"],[286,323,"ACTION"],[329,335,"ACTOR"],[336,359,"ACTION"],[364,399,"ACTION"],[454,474,"ACTION"],[613,620,"ASSETS"],[900,908,"ASSETS"],[923,929,"ASSETS"],[956,962,"ASSETS"],[1048,1054,"ACTION"],[1055,1061,"ASSETS"],[1138,1162,"ACTION"],[1239,1272,"ACTION"],[1277,1281,"ASSETS"],[1329,1336,"ASSETS"],[1337,1345,"ACTION"],[1350,1383,"ACTION"]]}],["Veteran A was sent a hemocult slide test with Veteran B's information on a label from a VA employee. Veteran A called to report that the label did not contain their information but had another Veteran's information on it.;",{"entities":[[10,69,"ACTION"],[181,221,"ACTION"]]}],["Newport gets schooled by virus.;",{"entities":[[8,31,"ACTION"]]}],["point-of-sale content unit was compromised company was notified by city from services and Secret Service is suspicious that these were occurring during credit card swipe at the store. Technicians also examined the computers and certain suspicious processes running on the point-of-sale fileserver. Upon further investigation it became clear that these processes were malware and that they appear to be taking snapshots of network traffic and setting aside cardholder data and log file.;",{"entities":[[27,42,"ACTION"],[130,183,"ACTION"],[214,223,"ASSETS"],[228,267,"ACTION"],[286,297,"ASSETS"],[346,374,"ACTION"],[384,421,"ACTION"],[442,485,"ACTION"]]}],["ATM Skimmer;",{"entities":[[0,3,"ASSETS"],[4,11,"ACTION"]]}],["School nurse called to report that a medication fax was sent to her school. It is unclear where the fax originated from. The Privacy Officer (PO) requested that documents be sent to facility. The information that was compromised was the Veteran's name, date of birth and medication information.;",{"entities":[[48,51,"ASSETS"],[52,67,"ACTION"],[213,228,"ACTION"]]}],["The data of up to 1.2 million Bhinneka.com users is reportedly being sold on the dark web for US$1,200 by a hacker group called ShinyHunters. This article was published in thejakartapost.com with the title \"E-commerce platform Bhinneka.com reported to be latest target of data theft\".;",{"entities":[[63,89,"ACTION"],[106,120,"ACTOR"],[128,141,"ACTOR"],[273,283,"ACTION"]]}],["A cyber attack has rendered many computers and phones with the Westmoreland County Housing Authority useless last week. The Tribune-Review reports that the authority issued a statement on Friday saying they were attacked by ransomware, and the ransom to have the computers restored was $6,500 bitcoin, approximately $40 million in US dollars.;",{"entities":[[2,14,"ACTION"],[33,42,"ASSETS"],[47,53,"ASSETS"],[203,235,"ACTION"],[245,251,"ACTION"],[264,273,"ASSETS"]]}],["A concerned citizen found hundreds of documents in a recycling center and notified a local news team. The documents included criminal histories, depositions, medical records, personal phone numbers, and addresses. Most were from the 1990's. Most or all of the information did not need to be shredded because it was considered public record. The local news team contacted a director from the solid waste division and the documents were removed for shredding.;",{"entities":[[38,47,"ASSETS"],[107,116,"ASSETS"],[311,343,"ACTION"],[377,385,"ACTOR"],[424,433,"ASSETS"]]}],["Estate agent Foxtons is currently investigating a possible data breach, which may have resulted in the personal information of 10,000 customers being compromised. A list including the email addresses, usernames and passwords, many partially obscured, of alleged MyFoxtons users was posted on Pastebin and linked to on several security sites, but has now been removed. The list is still available elsewhere, reports PCPro.co.uk and Softpedia. \"We have been able to download the list of usernames and passwords that were posted and are currently running checks to determine its veracity,\" Foxtons said in an email to MyFoxtons users. Although the list doesn't contain financial information like credit card details, access to a user's MyFoxtons account could allow a person access to their home address and phone number. Additionally, a hacker could gain access to MyFoxtons' features that allow landlords to electronically sign documents, manage the payments of rents online and see the deposit registration numbers of their tenants, according to this online demo. It is not currently known who is behind the reported breach, or how they may have gained access to the data. The list is reportedly labelled \"Part 1\", potentially suggesting that more data is to come. Foxtons declined to comment.;",{"entities":[[59,70,"ACTION"],[144,162,"ACTION"],[263,278,"ACTOR"],[279,301,"ACTION"],[306,341,"ACTION"],[454,475,"ACTION"],[517,528,"ACTION"],[840,846,"ACTOR"],[847,867,"ACTION"],[1143,1178,"ACTION"]]}],[";",{"entities":[]}],["A Bay Shore woman who worked as an aide for mentally disabled adults was arrested Thursday accused of stealing the identity of a patient and going on a spending spree, Suffolk County police said. For 21 years, Noreen Hanney, 38, of 1653 N. Thompson Drive, worked as a house manager for Adults and Children with Learning and Developmental Disabilities, Inc. (ACLD), police said. Detectives said the position allowed Hanney the access to the personal identities and banking information of the people living at the group home, located at 77 Vanderbuilt Blvd. in Oakdale. Between June and September of 2012, police said Hanney used the debit card information of one of the mentally disabled residents and made several monthly payments on her 2008 Toyota Highlander. She also allegedly purchased airline tickets for a personal flight to Florida and withdrew cash multiple times at ATM machines, detectives said. Sometimes she would use the [debit] card and sometimes just the number, said Det. Sgt. Mark Pulaski of the Suffolk police identity theft unit. He said in her job capacity, Hanney had access to the debit card number and ATM pin code. She was the caregiver for the mentally challenged people in the home. Their expenses had to be supplied and accounted for if they received federal and state monies, he said. After the victim realized that more than $3,000 had gone missing from their bank account, Pulaski said the person reached out up the chain of command at the non-profit agency. The agency subsequently notified police on Oct. 9, he said. Juliette McKenna, the director of development and community relations for the agency, said her organization discovered the theft using internal controls, and immediately notified police after noticing the alleged theft. McKenna said Hanney had access to the personal information of residents as part of her job, because most of the residents in the group home had limited capacity to understand and manage their finances. She said the agency conducted an internal investigation, which reflected that no other misconduct has occurred. After the police department was notified, Hanney abruptly quit her job, McKenna said. It was at that point in October 2012, that she began working at the Association for Children with Down Syndrome (ACDS) in Plainview, according to a police news release. An organization spokesman said he believed the incident had nothing to do with ACDS. Pulaski said that during the investigation, police conducted extensive surveillance operations on this subject. The investigation yielded Hanneys arrest on Thursday at her home in Bay Shore. She was charged with first-degree identity theft and is scheduled to be arraigned Friday at First District Court in Central Islip. Pulaski said based on the nature of Hanneys job and her access to sensitive information, detectives are asking anyone who may be a victim to call the Identity Theft Unit at 631-852-6821. An investigation remains ongoing.;",{"entities":[[12,17,"ACTOR"],[102,136,"ACTION"],[141,166,"ACTION"],[211,224,"ACTOR"],[416,422,"ACTOR"],[618,624,"ACTOR"],[625,656,"ACTION"],[703,763,"ACTION"],[783,808,"ACTION"],[846,874,"ACTION"],[878,881,"ASSETS"],[946,950,"ASSETS"],[1082,1088,"ACTOR"],[1089,1102,"ACTION"],[1678,1683,"ACTION"],[1760,1774,"ACTION"],[1788,1794,"ACTOR"],[1795,1833,"ACTION"],[2132,2138,"ACTOR"],[2569,2576,"ACTOR"],[2656,2670,"ACTION"],[2790,2797,"ACTOR"],[2810,2841,"ACTION"]]}],["Website of Bangalore City Police Hacked and Defaced;",{"entities":[[0,7,"ASSETS"],[33,39,"ACTION"],[44,51,"ACTION"]]}],["The Surgeon General on Monday issued a warning to his staff that is all too familiar to federal employees: Your personal information may have been stolen. In an email, Surgeon General Vice Adm. Vivek H. Murthy told \"commissioned corps\" employees of the Public Health Service that information, including their names, dates of birth and Social Security numbers, \"may have been accessed by unauthenticated users\" who hacked the agency's personnel system. \"Based on our investigation, affected individuals are those served by this website-based system: current, retired, and former Commissioned Corps officers and their dependents,\" the email said. The commissioned corps is a cadre of about 6,600 medical professionals including physicians, nurses, dentists, rehabilitation therapists, pharmacists, researchers and more reporting to the Surgeon General. They are involved in health-care delivery to underserved and vulnerable populations, disease control and prevention, food and drug regulation, and disaster response. Counting retirees, former employees and family members would bring the total of affected people much higher, although neither the email nor a spokesman for the Department of Health and Human Services, the parent agency of the PHS, specified a figure. The spokesman said the agency learned Sept. 20 that unauthenticated users could access a system used for payroll, leave, time, attendance and other personnel functions. The portal site has been disabled and will remain down while the investigation continues, although the Sept. 30 payroll run was unaffected, the email said. \"Teams across the Department and across government are working to learn as much as we can as quickly as we can, and to further improve our systems to prevent this type of issue in the future. . . . Next steps could include offering identity protection services to affected individuals,\" said the email, co-signed by HHS Acting Assistant Secretary for Health Karen B. DeSalvo. The email promises further information as it becomes available and offers instructions on how to request a free credit report and how to report unusual activity or potential errors on a credit report. The hack is the latest in a long line of breaches of federal employee records that have targeted individual agencies, including the Energy Department and the U.S. Postal Service, as well as the Thrift Savings Plan, the 401(k)-style retirement savings program for federal employees. The largest breaches, involving about 22 million people combined, hit two separate databases of the Office of Personnel Management. Those involved personnel records of current and former federal employees plus persons on whom the government had conducted background investigations, for security clearance or other reasons, since about 2000. That resulted in a widespread offer of free credit monitoring and identity theft protection services for employees, and the creation of a new office to oversee background checks, along with boosted cyberdefenses.;",{"entities":[[133,154,"ACTION"],[162,167,"ASSETS"],[361,410,"ACTION"],[415,421,"ACTION"],[445,452,"ASSETS"],[543,549,"ASSETS"],[635,640,"ASSETS"],[1153,1158,"ASSETS"],[1327,1348,"ACTOR"],[1349,1361,"ACTION"],[1364,1370,"ASSETS"],[1448,1459,"ASSETS"],[1460,1477,"ACTION"],[1487,1498,"ACTION"],[2184,2188,"ACTOR"],[2475,2483,"ACTION"],[2546,2555,"ASSETS"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,36,"ACTOR"],[47,55,"ACTION"],[56,61,"ASSETS"],[67,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[173,215,"ACTION"]]}],["Thousands of patients of a Jersey City doctor are vulnerable to identity theft after police say their medical records were stolen from a storage shed at the doctor's office earlier this week. Dr. Nisar A. Quraishi, an internist with an office at 1 Chopin Court, told police Tuesday night that he was contacted by a resident of the neighborhood and notified that his storage shed door was open, according to a police report. Quraishi arrived at his office at 5 p.m. Tuesday and found that both latches on the shed door had been cut with an unknown cutting tool. When he entered the shed, Quraishi immediately noticed all of the medical records of patients he had treated between 1982 and 2009 -- and may still be treating -- had been stolen, the report stated. Quraishi told police the majority of the records contained personal information, including social security numbers, dates of birth, home addresses and medical histories of each patient, according to the report. The doctor said he had \"no idea\" who broke into the shed and stated that he had not been to the property since Aug. 10, at which point the shed was still secure, the report said. Quraishi told police he was unable to immediately provide any of the names of the patients whose records were stolen from the shed, the report stated. Police said there were no security cameras or witnesses in the area or at the scene. Quraishi is listed as a specialist in internal medicine and a clinical assistant professor of medicine at the NYU Langone Trinity Center in New York. The thousands of medical records stolen from a Jersey City doctor's office storage shed were not A spokeswoman for NYU Langone Medical Center, where Quraishi has been employed since January, said the stolen records were not of NYU Langone patients. \"The patient records involved were from Dr. Quraishi's private practice ... and therefore do not include any treatments provided by him since his employment with NYU Langone as of January 2014,\" said Lisa Greiner, senior director of institutional communications at NYU Langone Medical Center. \"The medical records of patients who were treated at NYU Langone by Dr. Quraishi are not part of the breach in question.\" Quraishi could not be reached for comment at his Jersey City office and did not return calls to his New York office. The Manhattan-based medical center had no further comment, because the security breach involves patients from Quraishi's private practice.;",{"entities":[[64,78,"ACTION"],[118,129,"ACTION"],[519,531,"ACTION"],[725,740,"ACTION"],[1259,1270,"ACTION"],[1568,1582,"ACTION"]]}],["Web application compromise via undisclosed method led to PCI loss;",{"entities":[[0,15,"ASSETS"],[16,65,"ACTION"]]}],["WDBJ7 learned Wednesday that patient information from the hospital's billing department may have been compromised. The Secret Service tells WDBJ7 this is a multi-state investigation. A LewisGale spokesperson says approximately 40 local patients are affected. The billing company says the billing information of 400 people may have been compromised. We're talking about patients' names, addresses, insurance information and social security numbers. As one LewisGale patient says, it doesn't take much more than that to ruin someone's credit and someone's life. Jim Clendenen received the letter about a week ago. The letter says that his private, personal information may have gotten into the wrong hands. We're retired now and everything we got is taking care of. I'd hate to have somebody stumble in there and take care of everything that we've worked all these years for, Clendenen said. The letter is from Salem Hospitalists in Tennessee. The group is part of the LewisGale Regional Health System. According to the U.S. Secret Service, an employee from the group's billing office is being investigated for identity theft. The letter goes on to read that Clendenen's records were among those accessed by the now former employee between August 27, 2012 and April 23, 2013. Wondering how and why they would let an employee have access to something that he had no reason to have, Clendenen said. The Secret Service tells WDBJ7 the investigation is ongoing, and the suspect hasn't been indicted as of yet. But investigators say the former employee has fraudulently obtained credit, opened accounts, and even leased apartment with other people's information. As of right now, Clendenen's credit is clear, but he continues to worry about \"what if. I just hope maybe something can be done to prevent you or someone else going through what Im going through right now, Clendenen said. Click here to read the letter from the Secret Service: http://www.wdbj7.com/blob/view/-/25290570/data/26410166/-/neak6b/-/Letter-informing-LewisGale-patient-about-data-breach.pdf Here is a statement from LewisGale Regional Health System: LewisGale Regional Health System was recently informed that a former employee, whose job function required access to Patient Health Information protected by HIPAA, is under investigation for misuse of that information related to approximately 40 of our patients. All of these patients have been notified in writing and provided complimentary credit monitoring through a national credit reporting agency. We have also established a toll-free call center for patients with questions, as well as an email address to which they may submit written communications. We are fully committed to the security of Patient Health Information and the privacy of our patients. The employee in question has been terminated and we support this persons prosecution to the fullest extent of the law.;",{"entities":[[323,349,"ACTION"],[1048,1056,"ACTOR"],[1115,1130,"ACTION"],[1221,1236,"ACTOR"],[1322,1330,"ACTOR"],[1331,1385,"ACTION"],[1540,1555,"ACTOR"],[1556,1588,"ACTION"],[1590,1605,"ACTION"],[1611,1632,"ACTION"],[2193,2208,"ACTOR"],[2322,2348,"ACTION"],[2797,2805,"ACTOR"]]}],["Hackers Leak Details of 6,000 Numericable Customers After Firm Refuses to Pay Up;",{"entities":[[0,7,"ACTOR"],[63,80,"ACTION"]]}],["An emergency room doctor from St. Albert has been suspended for at least a month because she illegally tapped into restricted medical files. The College of Physicians & Surgeons of Alberta announced this week that it had found Deanne Dee Gayle Watrich, an emergency room doctor and a St. Albert resident, to be guilty of unprofessional conduct. Watrich had previously admitted to unprofessional conduct at a hearing tribunal held by the college last November. Specifically, the tribunal wrote in its ruling, Watrich accessed the electronic health records of three people 21 times between Aug. 5, 2009, and May 2, 2010, without having a patient/physician relationship with those people. Its okay for doctors to access patient records if they are actually treating those patients, explained college spokesperson Kelly Eby, but not otherwise. She accessed the electronic health records of three people who she was not treating, she said. Its an invasion of privacy. It also violates the provincial Health Professions Act and Health Information Act, and goes against the Canadian Medical Associations Code of Ethics and the colleges standards of practice. Watrichs case started when the provincial privacy commission began investigating a complaint from a man who had requested an Alberta Netcare log. The log showed that nine doctors, none of whom were treating him, had accessed his electronic health records. He alleged that Watrich might be the one responsible. The man listed his partner and mother as co-complainants, both of whom had their files accessed by three other doctors. Watrich admitted to the privacy commissioner and to the tribunal that she was responsible for accessing these restricted records using the logins of 12 other doctors. On 21 occasions, the tribunal heard, Watrich used computers in the emergency department of the Edmonton Misericordia Hospital to access these records after the previous user had not logged out, and did so knowing that her personal ID would not show up in the computers logs as a result. Watrich was in a personal relationship with one of the complainants when she accessed some of the records, the tribunal found, and in a relationship with the former spouse of said complainant when she accessed others. I dont know why I logged in to their Netcare and why I did it so many times, Watrich said at the hearing last November. It didnt actually give me any power. It didn't give me anything. In retrospect, she believed accessing these records might have been a way for her to cope with the difficult divorce and child-custody proceedings her partner was going through at the time. Watrich told the tribunal that she was humiliated and embarrassed by her actions and deeply disappointed in (herself). She had apologized to the complainants, and paid a significant monetary settlement to them in a related lawsuit. Covenant Health (which runs the Misericordia) had also put a reprimand on her record. Even though Watrich didnt disclose any of the information she accessed, the tribunal ruled, her actions were done repeatedly and with intent to deceive, and impugned the reputation of her fellow physicians.;",{"entities":[[18,24,"ACTOR"],[93,140,"ACTOR"],[227,251,"ACTOR"],[508,515,"ACTOR"],[516,554,"ACTION"],[844,882,"ACTION"],[942,962,"ACTION"],[971,1017,"ACTION"],[1050,1111,"ACTION"],[1152,1160,"ACTOR"],[1364,1376,"ACTION"],[1424,1431,"ACTOR"],[1582,1589,"ACTOR"],[1676,1727,"ACTION"],[1786,1793,"ACTOR"],[1799,1808,"ASSETS"],[1878,1941,"ACTION"],[1983,2035,"ACTION"],[2036,2043,"ACTOR"],[2113,2141,"ACTION"],[2272,2281,"ACTION"],[2331,2338,"ACTOR"],[2629,2636,"ACTOR"],[2959,2966,"ACTOR"]]}],["Loss of paper records exposes 1607.;",{"entities":[[0,7,"ACTION"],[8,13,"ASSETS"],[22,29,"ACTION"]]}],["Toyota has confirmed that as many as 3.1 million items of Toyota and Lexus customer data may have been breached following an attack on dealerships in Japan. The company says that \"information that may have been leaked this time does not include information on credit cards,\" but customers are already on edge following the cyber-attack that hit Toyota Australia in February. Notification about the breach was published in the company newsroom last week. The statement said that there was \"unauthorized access on the network\" of a number of dealerships in the Tokyo area of Japan on March 21. Up to 3.1 million pieces of customer data, stored on a server connected to that network, may have been compromised as a result. ;",{"entities":[[89,111,"ACTION"],[125,131,"ACTION"],[198,218,"ACTION"],[324,336,"ACTION"],[397,407,"ACTION"],[491,527,"ACTION"],[650,656,"ASSETS"],[684,709,"ACTION"]]}],["Veteran A received two medications that were meant for Veteran B from one of our outpatient pharmacies. Two patients medications got put in one sack and dispensed to a single patient. The error was caught quickly and the patient was contacted; however the patient was on his way home. The situation was discussed with the patient, was educated not to take the meds (pt understood. Pt did not want to return to the facility). Patient was sent an envelope to return the meds to us.;",{"entities":[[129,148,"ACTION"],[153,183,"ACTION"],[184,212,"ACTION"],[476,479,"ACTOR"]]}],["Wyatt Dental Group in Louisiana reported what sounds like an insider breach affecting 10,271 patients. According to the log entry, the breach occurred between November 4, 2011 and April 15, 2012 and involved ,Theft, Unauthorized Access/Disclosure,Electronic Medical Record. I was able to locate their attorneys report with the Maryland Attorney Generals Office, which confirms this was an insider breach. The dental group learned of it on July 19, 2012 from the Louisiana State Police.;",{"entities":[[61,68,"ACTOR"],[69,75,"ACTION"],[135,141,"ACTION"],[209,214,"ACTION"],[216,246,"ACTION"],[389,396,"ACTOR"],[397,404,"ACTION"]]}],[";",{"entities":[]}],["Two trash bags dumped in persons back yard filled with paper documents in folders containing PII for over 400 employee's of a local company.;",{"entities":[[4,42,"ACTION"],[55,70,"ASSETS"]]}],["hospital infected by ransomware, likely through phishing.;",{"entities":[[9,31,"ACTION"],[48,57,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["unauthorized access of a network server;",{"entities":[[0,22,"ACTION"],[25,39,"ASSETS"]]}],["Data breach no details provided.;",{"entities":[[0,11,"ASSETS"]]}],["A database within the University of Wisconsin-Madison Law School that contained Social Security numbers and name pairs corresponding with 1,213 Law School applicants for 2005-'06 was hacked last month, the university announced Tuesday.;",{"entities":[[2,10,"ASSETS"],[179,189,"ACTION"]]}],["Hacker breaks into 25 million accounts at a South Korean web portal. Once in, the hacker sent spam messages.;",{"entities":[[0,6,"ACTOR"],[7,38,"ACTION"],[57,68,"ASSETS"],[82,88,"ACTOR"],[89,108,"ACTION"]]}],["Managed Isolation and Quarantine (MIQ) staff have been reminded of their privacy obligations after a list of people staying in a facility was posted to a social media site. On Saturday morning (15 August) a security guard employed by First Security posted an image to a private group on Snapchat while on shift at the Sheraton Four Points managed isolation facility. Included in the image was a printed list containing the names, room numbers and arrival and departure dates of 27 returnees staying at the facility, along with the names and room numbers of five staff members. The photo was posted early on Saturday morning and removed around midday that day as soon as agencies became aware of the breach and had identified the security guard as the source. The guard has advised that the image was posted to a private group, and First Security have confirmed the image has been deleted from their phone. Managed Isolation and Quarantine staff are responsible for the health, safety and welfare of everybody staying in our managed isolation and quarantine facilities, and this includes the need to protect their privacy. The investigation into this incident has established the guard had legitimate access to the list, as part of their role processing and monitoring returnees going outside the building for exercise or other reasons. The actions of this person were unacceptable, and we sincerely apologise to those people whose privacy was breached. We have contacted all of those affected to inform them of the incident. The guard has been removed from duty at any managed isolation facility and First Security is undertaking an employment investigation. We have expressed our concerns about this incident to the employer. There is no information to suggest the guard is responsible for any other inappropriate disclosures of information. The Office of the Privacy Commissioner has been notified and staff have been reminded of their obligations around the importance of protecting returnees’ private information, and around filming, recording and sharing information relating to their work in MIQ.;",{"entities":[[138,172,"ACTION"],[208,222,"ACTOR"],[250,265,"ACTION"],[590,600,"ACTION"],[698,708,"ACTION"],[741,746,"ACTOR"],[767,772,"ACTOR"],[773,810,"ACTION"],[1185,1190,"ACTOR"],[1450,1459,"ACTION"],[1537,1542,"ACTOR"],[1775,1783,"ACTOR"]]}],["The Information Security Officers (ISO) were looking through the Sensitive Patient Access Report and came across an employee accessing a Veteran/employee's",{"entities":[[116,124,"ACTOR"],[125,134,"ACTION"]]}],["chart. The ISO gave the report to the Privacy Officer (PO). The PO will follow up with the employee who accessed the medical record to get a written response and authority for accessing the record. Employee admitted he looked at the record without a need to know.;",{"entities":[[91,99,"ACTOR"],[104,131,"ACTION"],[198,206,"ACTOR"],[219,263,"ACTION"]]}],["Misdelivery;",{"entities":[[0,11,"ACTION"]]}],["A newly emerging hacking group going with the handle of M4STR 1T4L!4N H@CKRS T4M (Master Italian Hackers Team) has hacked and defaced 8 official National Aeronautics and Space Administration (NASA) domains.;",{"entities":[[2,30,"ACTOR"],[56,80,"ACTOR"],[82,109,"ACTOR"],[111,121,"ACTION"],[126,133,"ACTION"],[198,206,"ASSETS"]]}],["An administrative error resulted in documents with sensitive information from Unisys members being emailed to an incorrect party associated with Unisys. The mistake occurred on December 13, 2012. The document may have contained names, Social Security numbers, dates of birth, and salary information. The mistake was immediately noticed by the recipient and the information was deleted from their computer.;",{"entities":[[3,32,"ACTION"],[36,45,"ASSETS"],[93,109,"ACTION"],[157,164,"ACTION"],[201,209,"ASSETS"],[305,312,"ACTION"],[397,406,"ASSETS"]]}],["A WOMAN has hit out at Musgrove Park Hospital after photos of her recovering foot were used in a training seminar without her consent.;",{"entities":[[23,45,"ACTOR"],[52,58,"ASSETS"],[82,134,"ACTION"]]}],[";",{"entities":[]}],["It's the busiest stretch of the mailing season from mid-November through Christmas. But for the United Parcel Service, one of its drivers not only focused on the timely delivery of packages, but also helped Philomath police nab a bad guy. The UPS driver, who regularly serves the Philomath route but asked that he not be identified, offered a tip to police on Nov. 17 that he suspected identity theft at a College Street address. \"The reason he suspected is because that particular unit and the one next to it were empty,\" Philomath Police Sgt. Ken Rueben said. \"But every day, he was delivering boxes to these locations with different names. So, he said, 'I know the people that lived there before and the people that lived there before them and these people's names are not the people on the packages.'\" UPS supplied a list of names of deliveries to the address and although the contents of the packages were unknown, they originated from retail stores such as Office Depot and Sears. The driver then returned to police with more useful information. \"He came in another day and said, 'I think the guy living in 1407 (College St.) is the guy that's ordering this stuff,'\" Rueben said. \"Because he saw the guy come out and he was looking around, and then a lady came out who ends up being the suspect's mom. She came out and said, 'it's my son, he's a criminal' and basically said 'hey, he's done this before.' ... So he reports this to us.\" Police researched the man's name, Richard Anthony Upshaw, and discovered he was the suspect in similar activities in the Fresno, California, area. A bit of confusion surrounded the whole situation because Upshaw, 42, was actually investigated in July by the Benton County Sheriff's Office. A case report shows Upshaw was renting a space and living in a recreational vehicle on the Philomath Frolic rodeo grounds. The first contact with Upshaw involved a domestic dispute call, which resulted in his arrest for violating a restraining order. An investigation soon followed and included interviews, property seizure and involvement of the U.S. Secret Service in California. Seized evidence pointed to identity theft and counterfeiting. The end result turned out to be 18 months of probation for Upshaw after a no contest plea to four felony charges. Fast forward to the Philomath PD's investigation, which determined that Upshaw was living in an RV parked behind four housing units at the 1407 College St. address. The man's connection to Philomath was his mother, who was living in one of the four apartments. Following interviews and phone calls, police learned that the name of a woman living with Upshaw was using the identity of a victim from the robbery of a Liberty Tax Service in Fresno. Various records were stolen, including income tax forms. \"These people started getting credit cards opened up in their name, typical identity theft type of thing,\" Rueben said. \"What makes this guy interesting though, is he changed all these people's addresses to addresses here.\" Upshaw apparently started applying for credit cards with all types of details about the Liberty victims _ names, dates of birth, social security numbers, home addresses and more. Police learned of another investigation in Scotts Valley, California, that also resulted in Upshaw's arrest. That occurred in May and included four felony charges _ forgery, making fictitious checks, identity theft and methamphetamine possession. The Scotts Valley Police Department did not prosecute while awaiting word from the Secret Service about the ongoing federal case. A California grand jury indicted Upshaw on Dec. 4 on several counterfeiting charges. Philomath PD arrested him on Dec. 8 after being contacted by the Secret Service. Pause Current Time 0:00 / Duration Time 0:00 Loaded: 0%Progress: 0%0:00 Fullscreen 00:00 Mute He was later transferred to U.S. custody in Portland with eventual extradition to California. \"They told us not to do any more investigation on the state case until they're finished with their federal stuff,\" Rueben said. If convicted, Upshaw faces serious time on the federal charges, perhaps 20 or more years. As a result, it's possible the local case against him would not continue, Rueben said. \"We put a call out to our local agencies that are getting $100 bills coming through and we've got five now that we think are him,\" Rueben said back on Dec. 12. \"We've got stuff to file on him if we need to.\" Filing a state case against Upshaw really wouldn't serve a purpose other than documentation, Rueben said. \"I contacted all of the victims __ they're all victims before in the Scotts Valley and Fresno cases, so they've all got their credit cards changed and credit histories blocked, etc.,\" Rueben said. In the end, it was the tip offered by the UPS driver that set the stage for Upshaw's arrest in Philomath on Dec. 8 \"These UPS guys know what's going on and if they see something suspicious (they take action),\" Rueben said. \"This guy could've really ripped off a bunch of people. If he would've gotten established and started ripping off people around here, identity theft can ruin your life.\";",{"entities":[[230,238,"ACTOR"],[387,401,"ACTION"],[583,644,"ACTION"],[755,807,"ACTION"],[1155,1174,"ACTION"],[1482,1504,"ACTION"],[1654,1660,"ACTOR"],[1760,1766,"ACTOR"],[1886,1892,"ACTOR"],[2150,2164,"ACTION"],[2169,2184,"ACTION"],[2244,2250,"ACTOR"],[2372,2378,"ACTOR"],[2652,2658,"ACTOR"],[2659,2693,"ACTION"],[2755,2774,"ACTION"],[2819,2871,"ACTION"],[2873,2895,"ACTION"],[2969,3028,"ACTION"],[3030,3036,"ACTOR"],[3037,3133,"ACTION"],[3302,3310,"ACTOR"],[3384,3408,"ACTION"],[3410,3424,"ACTION"],[3429,3456,"ACTION"],[4488,4494,"ACTOR"],[4841,4849,"ACTOR"],[5015,5044,"ACTION"],[5123,5137,"ACTION"]]}],["The Manawatu Standard revealed yesterday that Palmerston North woman Zelda McConachy was mailed other patients' mental health data after she applied to MidCentral to see her own files. Ms McConachy claimed she was mailed other mental health patients' files along with her own records. The Standard has viewed the most recent files. Along with her own records, she was sent two pages from another patient's file with details including his name, age, address, phone number, medication type and notes on his behavioural issues. MidCentral yesterday confirmed it made an error in that particular incident. ;",{"entities":[[85,95,"ACTION"],[152,162,"ACTOR"],[178,184,"ASSETS"],[254,259,"ASSETS"],[329,335,"ASSETS"],[410,414,"ASSETS"],[530,540,"ACTOR"],[561,577,"ACTION"]]}],["A beer vendor was arrested Sunday at Hard Rock Stadium after using a Square reader to charge more than $700 to a fan's credit card during a Miami Dolphins game, police said. Nathaniel Collier, 33, faces charges of third-degree grand theft and possession of a skimming device. According to an arrest affidavit, the victim ordered two beers from Collier during Miami's 30-10 loss to the Los Angeles Chargers and gave him his credit card to pay for them. But police said Collier used his personal card reader to charge the victim $724. The victim was notified of the charge by his bank a short time later. Collier was taken into custody without incident. Police said he had a Square credit card reader in his possession.;",{"entities":[[2,13,"ACTOR"],[69,82,"ASSETS"],[86,110,"ACTION"],[119,130,"ASSETS"],[175,192,"ACTOR"],[234,239,"ACTION"],[244,276,"ACTION"],[346,353,"ACTOR"],[425,436,"ASSETS"],[470,477,"ACTOR"],[478,528,"ACTION"],[607,614,"ACTOR"],[671,721,"ACTION"]]}],["Passwords to computer system were visible to the public;",{"entities":[[13,28,"ASSETS"],[29,55,"ACTION"]]}],["User database breach;",{"entities":[[5,13,"ASSETS"],[14,20,"ACTION"]]}],["Employee misuse ID theft;",{"entities":[[0,8,"ACTOR"],[9,24,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Decathlon misconfigured database resulting in leaking 123 million records, which includes personal data;",{"entities":[[10,23,"ACTION"],[24,32,"ASSETS"],[46,53,"ACTION"]]}],["An unencrypted flash drive was stolen from a teacher's car. It contained student Social Security numbers and other information. ;",{"entities":[[15,26,"ASSETS"],[27,42,"ACTION"],[55,59,"ASSETS"]]}],["partner organization employee looks at PHI;",{"entities":[[0,29,"ACTOR"],[30,42,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["radio station hacked to play erotic furry animal sex;",{"entities":[[14,52,"ACTION"]]}],["A hospital patient who stuck pencils in her eyes in a suicide attempt, then found out that a photo of her self-mutilation turned up on the Internet three years later, has agreed to settle the part of her lawsuit against Los Angeles County and one of its nurses, her attorney said Wednesday. Douglas Johnson, who represents the 24-year-old plaintiff, told Los Angeles Superior Court Judge Elizabeth Allen White that the proposed resolution would remove the county and nurse Shannon Lipham as defendants in the case. The case will proceed against nurse Kristin Ciasulli, who the plaintiff accuses of taking the photo at County-USC Medical Center, and Ciasulli's then- employer, HRN Services Inc., Johnson said. Johnson declined to state the amount of the settlement, but noted it would be public information if the Board of Supervisors approves it. He praised the county's lawyers for working with him toward a resolution of the case, which was filed in October 2014 and identifies the plaintiff only as Jane Doe. \"I absolutely think it was the right thing to do and I was impressed with the compassion they showed for my client,\" Johnson said. During today's hearing, the judge said Johnson needs to shore up only one of the four allegations against HRN Services intentional infliction of emotional distress. Johnson said the problem with the complaint can be easily fixed. The attorney also said he was pleased that the judge found the details behind the other three allegations negligent infliction of emotional distress, intrusion upon seclusion and negligent training, supervision and retention of an employee were sufficient, and that White rejected a defense argument that his client didn't have an expectation of privacy in the large emergency room where her unauthorized photo was taken. According to the complaint, the woman was admitted to the county-run hospital in June 2011 after trying to kill herself by thrusting pencils into her eyes. She survived, but was blinded. Lipham was a relief pool nurse employed by the county who also was assigned to care for the plaintiff, according to Doe's court papers, which say Lipham acknowledged in a June deposition that she sent the photograph to her niece, who in turn gave it to a man named Joshua Shivers, who the plaintiff's attorneys allege posted the photo. Ciasulli admitted during a deposition that she took a photo of the injured plaintiff and says she did so as a \"teaching tool.\" She says she later deleted the image and that it was not the photo that turned up on the Internet. Up to a half-dozen other medical workers took similar images of the plaintiff when the injured La Canada Flintridge resident was brought into the County-USC Medical Center emergency room, according to Ciasulli. Ciasulli worked at the time for HRN Services, which supplies hospitals with temporary and supplemental healthcare employees. Shivers uploaded the image in July 2014 onto \"one of the most visited shock websites in the world,\" the suit says. The same day, he took credit for his actions on a social networking site, saying, \"I finally made it in life. Please check out my shiz,\" and included a link to the photo, according to the complaint. A week later, he placed the same photo onto a \"popular entertainment and social media website,\" according to the plaintiff's attorney, who says it has received more than 192,000 Internet views. Ciasulli said she did not send a copy of the photo she took to Lipham. Shivers in deposition testimony said he didn't know how the photo he posted was taken, but said it was given to him by Alexis Brennecke Siwek, the niece of a nurse at the hospital.;",{"entities":[[91,147,"ACTION"],[547,569,"ACTOR"],[600,616,"ACTION"],[651,659,"ACTOR"],[1775,1804,"ACTION"],[1994,2000,"ACTOR"],[2140,2146,"ACTOR"],[2190,2222,"ACTION"],[2259,2273,"ACTOR"],[2305,2329,"ACTION"],[2331,2339,"ACTOR"],[2378,2390,"ACTION"],[2759,2768,"ACTOR"],[2770,2778,"ACTOR"],[2896,2903,"ACTOR"],[2904,2922,"ACTION"],[3152,3180,"ACTION"],[3228,3254,"ACTION"],[3406,3414,"ACTOR"],[3469,3476,"ACTOR"],[3478,3485,"ACTOR"],[3597,3619,"ACTOR"],[3625,3630,"ACTOR"]]}],["FREEPORT — The town’s municipal computer network is back up and running after a cyberattack one week ago that has been linked to Russian criminals and a global ransomware group, the town manager said Tuesday. Logically, a national information technology provider based in Portland, brought down the town’s network around 1 p.m. on June 8 after it detected a cyberattack, Town Manager Peter Joseph said. While the move successfully contained the attack, it shut down phone and online communications and disrupted municipal services across every department. The attack came with a ransom note directing the town to pay $10,000 in cryptocurrency through Avaddon, a ransomware group responsible for numerous malware incidents since 2020, Joseph said. The town didn’t respond to the note, paid no ransom and experienced no data breach, he said. “Our opinion is the attack was only partly successful and was stopped early,” Joseph said, emphasizing that no sensitive data was released, including that of town residents. Joseph said the attack has been reported to the Maine State Police Computer Crimes Unit, but no one had contacted him yet to investigate the incident. Exactly who was behind the attack is unclear, Joseph said, but it is believed to be a criminal operation based in Russia or a neighboring republic. Bleeping Computer, a tech news website, reported Friday that Avaddon had shut down its ransomware, likely because of increasing pressure by police agencies and governments worldwide, as well as President Biden’s plan to discuss cyberattacks with Russian President Vladimir Putin in Geneva on Wednesday. LOCAL & STATE Posted June 15 Updated June 16INCREASE FONT SIZEResize Font Freeport town computer network back up following ransomware attack The cyberattack has been linked to Russian criminals and the global ransomware group Avaddon. BY KELLEY BOUCHARDSTAFF WRITER Sharefacebooktweetredditemailprint8 COMMENTS FREEPORT — The town’s municipal computer network is back up and running after a cyberattack one week ago that has been linked to Russian criminals and a global ransomware group, the town manager said Tuesday. Logically, a national information technology provider based in Portland, brought down the town’s network around 1 p.m. on June 8 after it detected a cyberattack, Town Manager Peter Joseph said. While the move successfully contained the attack, it shut down phone and online communications and disrupted municipal services across every department. The attack came with a ransom note directing the town to pay $10,000 in cryptocurrency through Avaddon, a ransomware group responsible for numerous malware incidents since 2020, Joseph said. The town didn’t respond to the note, paid no ransom and experienced no data breach, he said. “Our opinion is the attack was only partly successful and was stopped early,” Joseph said, emphasizing that no sensitive data was released, including that of town residents. RELATED Freeport municipal offices disrupted by cyberattack Joseph said the attack has been reported to the Maine State Police Computer Crimes Unit, but no one had contacted him yet to investigate the incident. Exactly who was behind the attack is unclear, Joseph said, but it is believed to be a criminal operation based in Russia or a neighboring republic. Bleeping Computer, a tech news website, reported Friday that Avaddon had shut down its ransomware, likely because of increasing pressure by police agencies and governments worldwide, as well as President Biden’s plan to discuss cyberattacks with Russian President Vladimir Putin in Geneva on Wednesday. Advertisement Freeport’s cyberattack is the latest on a municipal computer network in Maine and one of a growing number of similar incidents. The Presque Isle Police Department was hit by an Avaddon ransomware attack that came to light in April, when the town refused to pay a ransom and hackers dumped 200 gigabytes of data on the dark web. And when the Rockport Town Office was hit in 2018, municipal officials also didn’t pay a ransom and IT staff worked throughout the weekend to restore encrypted data. While larger malware incidents like the recent Colonial Pipeline hack get a lot of attention, attacks on smaller targets wreak havoc, too, and many don’t make it into the news. The FBI receives two to three reports each week of ransomware attacks in Maine, The Associated Press reported. Joseph said the town had security systems to detect the cyberattack and the municipal network was not disabled by the attack. Freeport town offices remained open as usual during the phone and internet outage, but it made many basic municipal functions inconvenient or impossible, such as paying property taxes with a credit card or using the computerized book catalog at the public library. Residents were still able to call for emergency assistance from Freeport’s police and fire departments by dialing 911 because the neighboring town of Brunswick has dispatched emergency services for Freeport for several years.;",{"entities":[[32,48,"ASSETS"],[80,91,"ACTION"],[129,146,"ACTOR"],[153,176,"ACTOR"],[283,295,"ACTION"],[307,314,"ASSETS"],[359,370,"ACTION"],[446,452,"ACTION"],[454,472,"ACTION"],[503,531,"ACTION"],[562,587,"ACTION"],[593,618,"ACTION"],[653,660,"ACTOR"],[664,680,"ACTOR"],[859,869,"ACTION"],[1029,1039,"ACTION"],[1191,1201,"ACTION"],[1282,1288,"ACTOR"],[1378,1385,"ACTOR"],[1386,1414,"ACTION"],[1708,1724,"ASSETS"],[1743,1760,"ACTION"],[1765,1776,"ACTION"],[1796,1813,"ACTOR"],[1822,1845,"ACTOR"],[1846,1854,"ACTOR"],[1965,1981,"ASSETS"],[2013,2024,"ACTION"],[2062,2079,"ACTOR"],[2086,2109,"ACTOR"],[2216,2228,"ACTION"],[2240,2247,"ASSETS"],[2292,2303,"ACTION"],[2379,2385,"ACTION"],[2387,2431,"ACTION"],[2436,2464,"ACTION"],[2491,2525,"ACTION"],[2526,2551,"ACTION"],[2586,2593,"ACTOR"],[2597,2613,"ACTOR"],[2792,2802,"ACTOR"],[3023,3033,"ACTOR"],[3189,3195,"ACTOR"],[3276,3282,"ACTOR"],[3288,3309,"ACTOR"],[3372,3379,"ACTOR"],[3380,3408,"ACTION"],[3682,3698,"ASSETS"],[3808,3815,"ACTOR"],[3816,3838,"ACTION"],[3894,3900,"ACTION"],[3905,3912,"ACTOR"],[3913,3958,"ACTION"],[4220,4258,"ACTION"],[4354,4372,"ACTION"],[4491,4508,"ASSETS"],[4629,4694,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Looks like a Partner \"Baas was the computer systems administrator for a Cincinnati company that did business with Acxiom\" (victim). Actor had access to systems and downloaded a file he shouldn't have had access too (guessing /etc/shadow or passwd), ran pw cracker, came back in and stole customer information (Personal data);",{"entities":[[133,138,"ACTOR"],[139,152,"ACTION"],[153,160,"ASSETS"],[165,182,"ACTION"],[250,264,"ACTION"],[266,278,"ACTION"],[283,309,"ACTION"]]}],["Thompson Health says a CNA who worked there was accused of taking a picture of one of the patients without their knowledge, sending it out through Snapchat;",{"entities":[[23,26,"ACTOR"],[59,78,"ACTION"],[124,155,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["One of the data controller’s employees had emailed a spreadsheet containing the personal data of over 400 individuals to 60 employees in error.;",{"entities":[[11,38,"ACTOR"],[39,50,"ACTION"],[53,64,"ASSETS"],[134,143,"ACTION"]]}],["VA employee in Cardiology sent a CD-ROM containing results from a heart catheterization for one patient to the Denver VA Medical Center. The CD-ROM was sent Thursday utilizing UPS with the overnight option. The VA employee did receive a UPS tracking number (1Z 691 335 01 9064 817 4). The VA employee received a phone call from a UPS employee stating the contents were no longer in the package due to the package being wet. The UPS employee stated they would call back if the contents were found. The CD-ROM contained images from a recent heart catheterization, and the Information Security Officer (ISO) verified",{"entities":[[33,39,"ASSETS"],[141,147,"ASSETS"],[176,179,"ASSETS"],[330,333,"ASSETS"],[386,393,"ASSETS"],[394,423,"ACTION"],[428,431,"ASSETS"],[448,496,"ACTOR"],[501,507,"ASSETS"]]}],["the VA employee only printed the last name of patient on the CD-ROM. The CD-ROM was not encrypted. The VA employee will inform the ISO immediately if she",{"entities":[[7,15,"ACTOR"],[61,68,"ASSETS"],[73,79,"ASSETS"]]}],["receives a call from the UPS employee. A copy of the USP tracking details are attached to this ticket;",{"entities":[[25,38,"ACTOR"]]}],["Two letters were placed in the same envelope and sent to Patient A. Patient A to mail letter back to PO. Copy of letter mailed to Patient B. Letter contained Patient B's name, address, and medical information.;",{"entities":[[4,11,"ASSETS"],[86,92,"ASSETS"],[113,119,"ASSETS"],[141,147,"ASSETS"]]}],["A media group who regularly collects public employee salary and benefit information released Social Security numbers after they were mistakenly included in a file that the City of Berkeley provided. The information was sent by Berkeley in March and the mistake was discovered in early April. Around 2,000 active staff members and 9,000 retirees were affected. mistakenly released the Social Security numbers of the employees as well. ;",{"entities":[[2,13,"ACTOR"],[28,59,"ACTION"],[128,162,"ACTION"],[216,224,"ACTION"],[254,276,"ACTION"],[363,382,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The Veterans Affairs hospital in Fayetteville says documents containing the personal information of nearly 1,100 veterans were found in a recycling bin two months ago. The Fayetteville VA Medical Center announced Friday its notifying the 1,093 affected veterans whose consultation reports from the optical shop were incorrectly placed in a recycle bin over a three-month period. The documents found April 17 contained patients names, Social Security numbers, dates of birth, addresses and prescriptions. Officials say theres no indication the information has been misused. But the hospital is notifying veterans who visited the optical shop between Jan. 11 and April 16 and offering them free credit monitoring services. The hospital says the staff member who had been collecting the documents was retrained on what items should be shredded.;",{"entities":[[51,60,"ASSETS"],[122,151,"ACTION"],[312,352,"ACTION"],[384,393,"ASSETS"],[787,796,"ASSETS"]]}],["Theft od documents exposes 2828 records.;",{"entities":[[0,5,"ACTION"],[9,18,"ASSETS"]]}],["A French teenage hacker who goes by the name \"Hacker Fr0sty Fr0ze, hacked the American Choral Directors Association and published stolen data online. ;",{"entities":[[0,23,"ACTOR"],[46,65,"ACTOR"],[67,73,"ACTION"],[120,149,"ACTION"]]}],["Different victim for the sunshop campaign We recently identified another targeted attack campaign that leveraged both the recently announced Internet Explorer zero-day, CVE-2013-1347, as well as recently patched Java exploits CVE-2013-2423 and CVE-2013-1493. This campaign appears to have affected a number of victims based on the use of the Internet Explorer zero-day as well as the amount of traffic observed at making requests to the exploit server. This attack was likely executed by an actor we have named the Sunshop Group. This actor was also responsible for the 2010 compromise of the Nobel Peace Prize website that leverage a zero-day in Mozilla Firefox.;",{"entities":[[25,32,"ACTOR"],[82,97,"ACTION"],[318,368,"ACTION"],[384,429,"ACTION"],[437,452,"ASSETS"],[458,464,"ACTION"],[491,496,"ACTOR"],[515,529,"ACTOR"],[535,540,"ACTOR"],[611,618,"ASSETS"],[624,663,"ACTION"]]}],[" The account details of millions of online gamers have been stolen in a hack attack on games company Blizzard. The company, which makes the World Of Warcraft, StarCraft and Diablo franchises posted a message on its website today advising players using North American servers to change their passwords for the account management service. The compromised data relates to Battle.net accounts which are used for all of Blizzard's games. In a posting today the company said: This week, our security team found an unauthorized and illegal access into our internal network here at Blizzard. We quickly took steps to close off this access and began working with law enforcement and security experts to investigate what happened. The post goes on to explain that the data that was illegally accessed included a list of email addresses for global Battle.net users outside of China. Players on North America servers (which includes users in North America, Latin America, Australia, New Zealand and Southeast Asia), had their security question details hacked as well as information relating to Mobile and Dial-In authentication. Cryptographically scrambled Battle.net passwords were also taken. The company has advised that gamers that play online via North American servers should change their passwords as a precaution. The company has stressed it would be extremely difficult to access actual passwords using the scrambled data stolen. They also stressed that no financial data had been accessed, such as credit cards or billing addresses. Blizzard said that users should be aware of any potential phishing scams that may follow as a consequence of email details being out in the open. Blizzard Entertainment boss Mike Morhaime said the hack had been discovered on August 4th, and that the company were: truly sorry that this has happened. The company said it had spent the time since August 4th fixing the vulnerability in their systems and finding out what information had been compromised. Following the hack the company is likely to face criticism over its decision to make games that require a login via Battle.net and cannot be played offline. Despite the loss of passwords and email data Blizzard's use of a Secure Remote Password protocol is likely to have minimised the consequences for users as the system makes it near impossible to brute-force a password, a method hackers use in which a computer attempts every possible key or password until it succeeds. ;",{"entities":[[50,66,"ACTION"],[72,83,"ACTION"],[268,275,"ASSETS"],[343,390,"ACTION"],[511,547,"ACTION"],[561,568,"ASSETS"],[776,794,"ACTION"],[814,819,"ASSETS"],[902,909,"ASSETS"],[1045,1051,"ACTION"],[1172,1188,"ACTION"],[1739,1743,"ACTION"],[1934,1941,"ASSETS"],[2012,2016,"ACTION"],[2168,2200,"ACTION"],[2315,2321,"ASSETS"],[2350,2372,"ACTION"],[2383,2390,"ACTOR"],[2415,2473,"ACTION"]]}],["Thousands of people are now vulnerable to identity theft, and it's all because of a stolen laptop. The information, which includes Social Security and drivers license numbers, was on a King County sheriff's office computer that was stolen from a detective. The laptop and a personal hard drive were full of case files, including personal information about thousands of crime victims, suspects, witnesses and even police officers. The laptop was stolen last March from the backseat of a detective's undercover pickup truck. ;",{"entities":[[42,56,"ACTION"],[84,90,"ACTION"],[91,98,"ASSETS"],[215,223,"ASSETS"],[229,239,"ACTION"],[263,269,"ASSETS"],[285,295,"ASSETS"],[437,443,"ASSETS"],[444,454,"ACTION"],[512,525,"ASSETS"]]}],["The website of an Ontario hospital may have infected the computers of patients and staff with ransomware planted on the site during a hack attack, the internet security company Malwarebytes warns. Norfolk General Hospital, located in Simcoe, Ont., confirms its website was hacked by cybercriminals, but denies that visitors were ever at risk. The attack appears to be part of a trend of cybercriminals targeting hospitals, including one on the Ottawa Hospital in March and another in February that hit the Hollywood Presbyterian Medical Center in Los Angeles, which paid a $17,000 ransom to have its systems restored. Jrme Segura, a senior security researcher with Malwarebytes, reported in a blog post this week that in late February, Norfolk General Hospital's website was observed pushing ransomware called Teslacrypt to computers that visited the website. Teslacrypt locks your files and makes them inaccessible using encryption, then demands a ransom of $500 US to restore access. Drive-by download The file was served in a \"drive-by download\" attack, Segura said, meaning you don't have to click on anything on the page. \"You just go to the site that's compromised, and within a few seconds, malware is downloaded onto your computer and that's it,\" he told CBC News. In this case, visitors to the site would have included patients, their families and staff who accessed a staff portal with schedules and an internal directory via the website. Visiting Windows computers would have been vulnerable if they were running Internet Explorer or older versions of the Adobe Flash or Microsoft Silverlight players. Segura said hospitals are in many ways the \"perfect victim\" for cyberattacks. \"Their systems are out of date, they have a lot of confidential information and patient files. If those get locked up, they can't just ignore it.\" Segura said Malwarebytes detected an attack from the Norfolk General Hospital website via a user of Malwarebytes anti-exploit software. The free software detects and blocks web-based attacks, then sends a report back to Malwarebytes. The attack caught Segura's eye because he's based in Canada and the attack came from a site with a .ca domain name.;",{"entities":[[4,11,"ASSETS"],[35,52,"ACTION"],[57,66,"ASSETS"],[94,115,"ACTION"],[120,124,"ASSETS"],[134,145,"ACTION"],[262,269,"ASSETS"],[270,280,"ACTION"],[284,298,"ACTOR"],[349,355,"ACTION"],[389,403,"ACTOR"],[404,423,"ACTION"],[500,503,"ACTION"],[602,609,"ASSETS"],[766,773,"ASSETS"],[778,805,"ACTION"],[806,826,"ACTION"],[827,836,"ASSETS"],[854,862,"ASSETS"],[864,891,"ACTION"],[896,936,"ACTION"],[943,959,"ACTION"],[974,989,"ACTION"],[991,1018,"ACTION"],[1023,1061,"ACTION"],[1084,1132,"ACTION"],[1139,1177,"ACTION"],[1205,1231,"ACTION"],[1237,1245,"ASSETS"],[1311,1315,"ASSETS"],[1448,1456,"ASSETS"],[1475,1484,"ASSETS"],[1687,1700,"ACTION"],[1708,1715,"ASSETS"],[1886,1892,"ASSETS"],[1927,1934,"ASSETS"],[2022,2039,"ASSETS"],[2088,2094,"ACTION"],[2152,2199,"ACTION"]]}],["Use of stolen credential leads to access of nonpublic list of sfotware bugs.;",{"entities":[[7,24,"ACTION"],[25,40,"ACTION"]]}],["Notification of Potential Data Breach In December 2015, Oceans Acquisitions, Inc. began notifying patients in the Abilene area about a possible data security breach that may have resulted in exposure of a limited amount of protected health information (PHI). The potential exposure occurred when a laptop was stolen from an employee's car. The laptop stored emails that potentially contained PHI such as names, dates of birth, medical record numbers, diagnoses, payer information and admission dates. No patient social security numbers or bank account information was included in the emails. Upon learning PHI may have been present on the device, Oceans immediately took steps to identify the individuals with the potential to be impacted. Although the laptop was stolen April 9, 2015, only recently, during an unrelated systems review did Oceans learn the device contained PHI. In May 2015, Oceans validated that all portable devices and laptops have encryption technology active and in use. While there is no indication the personal information has been acquired or used, free identity protection resources are being provided to individuals who may have been impacted. Because it is possible the PHI contained on the laptops may have been improperly accessed, federal and state law requires Oceans to notify potentially affected patients of this incident. This notice in print media is being provided as notification to individuals for whom Oceans has out-of-date contact information and therefore cannot be notified via letter. If you believe you have been affected, you should review your credit reports for accounts or creditor inquiries that you do not recognize. ;",{"entities":[[26,37,"ACTION"],[135,164,"ACTION"],[191,199,"ACTION"],[263,281,"ACTION"],[298,304,"ASSETS"],[305,315,"ACTION"],[335,339,"ASSETS"],[344,350,"ASSETS"],[753,759,"ASSETS"],[760,770,"ACTION"],[857,863,"ASSETS"],[918,934,"ASSETS"],[939,946,"ASSETS"],[1219,1226,"ASSETS"]]}],["An Orlando Health hospital has sent breach notification letters to 68 patients after a document containing their Protected Health Information (PHI) was found \"in a neighborhood driveway\". The letters were sent \"out of an abundance of caution\", although potentially that information could have been read by an unauthorized individual. According to a WFTV news report, Channel 9 was contacted by a man after his son received a breach notification letter in the post telling him that his confidential health information may have been exposed in a security incident, which prompted reporters to investigate. John Henderson told reporters that his son was sent a letter saying that a patient list was discovered in a driveway which was found to contain patient names, medical record numbers, account numbers and medical diagnoses, although no insurance information, financial details or Social Security numbers were included on the list. He said he \"can't believe Orlando Health is this irresponsible.\" Hospitals must take great care to ensure that patient health information is properly protected, although even when technical, physical and administrative controls are put in place to protect data __ as required by the HIPAA Security Rule __ accidental disclosures of PHI can still occur as a result of human error. The breach notification letters sent by the hospital explain that the breach was caused when an employee took information out of the hospital by accident. The paper file containing the PHI and names of patients \"possibly fell out of the employees car\". Reporters attempted to contact the hospital for a statement to find out whether it was permitted for employees to take confidential healthcare data out of the hospital and how many people were affected, with the Orlando Health issuing a statement on the incident this Wednesday. Orlando Health told WFTV that the incident was thoroughly investigated as soon as it was discovered and the hospital determined the security breach to be an isolated incident. No evidence of any malicious intent was discovered and no further risk is believed to exist. The HIPAA breach was determined to have been purely accidental. The statement also said, \"We have a number of policies in place to ensure the security and privacy of all protected health information, and we continually evaluate and modify these policies to protect our patients.\";",{"entities":[[3,26,"ACTOR"],[87,95,"ASSETS"],[148,185,"ACTION"],[282,302,"ACTION"],[306,333,"ACTOR"],[518,539,"ACTION"],[679,722,"ACTION"],[729,763,"ACTION"],[961,975,"ACTOR"],[1001,1010,"ACTOR"],[1282,1315,"ACTION"],[1357,1369,"ACTOR"],[1387,1393,"ACTION"],[1413,1421,"ACTOR"],[1422,1471,"ACTION"],[1476,1481,"ASSETS"],[1528,1549,"ACTION"],[1554,1563,"ACTOR"],[1564,1569,"ASSETS"],[1605,1613,"ACTOR"],[1653,1717,"ACTION"],[1782,1796,"ACTOR"],[1850,1864,"ACTOR"],[2123,2135,"ACTION"],[2154,2182,"ACTION"]]}],["Not too long ago, the Erasmus University was a victim of a data breach. Although initial results indicated not too much sensitive information was obtained by hackers in the process, it looks as if those findings need to be revised. New data reveals that medical and financial details belonging to an undisclosed number of students were obtained during the breach. A total of 270,000 webforms residing on one particular web server were breached during the attack. Close to 5,000 forms contain student medical information, indicating their health and whether or not they suffer from specific ailments. Moreover, it also provides insights into diseases such as dyslexia, allergies, or other conditions relevant to their behavior. To make matters worse, an even larger undisclosed number of students also had financial information attached to their web forms. This includes bank account details and credit card information. However, no PIN codes or security codes are stored on the platform, which is a minor consolidation for now. A total of 17,000 students were affected by the data breach, although it is possible that the final tally will be much higher. Nearly 10,000 individuals had their nationality exposed, which should not necessarily be a grave concern. Preliminary results indicate that nearly the same number of students may suffer from identity theft in the future, due to their financial information or passport numbers being obtained by criminals. What is rather peculiar is how no passwords were part of the data breach. How that is even possible, remains everybody's guess for the time being. More worryingly, no one knows how hackers managed to breach the server security, or what they are planning to do with the obtained information. A sale of information on the deep web is not unlikely at this stage.;",{"entities":[[59,71,"ACTION"],[120,157,"ACTION"],[158,165,"ACTOR"],[336,363,"ACTION"],[420,430,"ASSETS"],[431,463,"ACTION"],[803,857,"ACTION"],[1082,1093,"ACTION"],[1455,1465,"ACTOR"],[1528,1540,"ACTION"],[1648,1655,"ACTOR"],[1678,1684,"ASSETS"]]}],["Reservist charged with theft, wire fraud. Misused SSN for purposes of ID theft;",{"entities":[[0,9,"ACTOR"],[23,28,"ACTION"],[30,41,"ACTION"],[42,78,"ACTION"]]}],[" Nina Monique Allen, 32, and Wendy Marie Johnson, 38, both of Dillon, have been sentenced in federal court in Florence, according to United States Attorney Bill Nettles. Allen previously pleaded guilty to Theft of Government Funds and Johnson previously pleaded guilty to Aggravated Identity Theft. United States District Judge R. Bryan Harwell of Florence, sentenced Allen to five months imprisonment and 3 years supervised release. Johnson was sentenced to 24 months imprisonment and three years supervised release. They were both ordered to pay $26,059.55 in restitution. Evidence established that Johnson worked preparing tax returns and Allen worked as an office manager for EZ Loan and Tax Services in Dillon. Johnson used personal information obtained from former clients of EZ Loan to file tax returns and obtain refunds electronically. Upon receiving the refund, Johnson and Allen would apply a small refund as a credit for loan payments on existing EZ Loan customer's accounts, then issue a \"change check\" in someone else's name. Allen would then recruit people to cash the new checks. Allen recruited nine individuals who were paid between $20 and $200 to cash the checks. The balances of approximately $30,000 received from the IRS was split between Johnson and Allen. ;",{"entities":[[2,20,"ACTOR"],[30,49,"ACTOR"],[171,176,"ACTOR"],[206,231,"ACTION"],[236,243,"ACTOR"],[273,299,"ACTION"],[370,375,"ACTOR"],[437,444,"ACTOR"],[606,613,"ACTOR"],[647,652,"ACTOR"],[722,729,"ACTOR"],[730,784,"ACTION"],[796,815,"ACTION"],[820,850,"ACTION"],[879,886,"ACTOR"],[891,896,"ACTOR"],[897,923,"ACTION"],[1000,1021,"ACTION"],[1048,1053,"ACTOR"],[1065,1103,"ACTION"],[1105,1110,"ACTOR"],[1111,1137,"ACTION"],[1142,1192,"ACTION"],[1272,1279,"ACTOR"],[1284,1290,"ACTOR"]]}],["city council publishes PII along with survey result on website;",{"entities":[[0,12,"ACTOR"],[13,62,"ACTION"]]}],["St. Mary’s County government’s servers and computers were attacked on the evening of Thanksgiving, leaving most services down over the weekend as repair work continued early this week.;",{"entities":[[31,38,"ASSETS"],[43,52,"ASSETS"],[53,66,"ACTION"],[99,125,"ACTION"]]}],["random defacement;",{"entities":[[0,17,"ACTION"]]}],["Bar applicants need to supply every single piece of personal information imaginable, from their birthday and Social Security number to their 10-year work history. If anyone with criminal intent ever got their hands on that information, we cant even begin to describe how screwed those poor bar applicants would be. As it turns out, some bar applicants are getting a taste of what it feels like to be violated by a state bar outside of a timed test-taking situation. Which state bar just exposed an untold number of exam applicants to identity theft due to a break-in? The State Bar of Nevada recently advised an undisclosed number of applicants that their confidential personal information may have been stolen from its storage facility. Heres the letter, in pertinent part: The State Bar of Nevada has learned that criminals have forced their way into a State Bar storage facility and stolen some confidential records. Through investigation and in cooperation with the Las Vegas Metropolitan Police Department we discovered that information furnished by you to the State Bar of Nevada may have been stolen. The State Bar has taken measures to secure all records to counter subsequent thefts and breaches in security.;",{"entities":[[693,713,"ACTION"],[723,740,"ASSETS"],[824,833,"ACTOR"],[834,860,"ACTION"],[873,889,"ASSETS"],[894,927,"ACTION"],[1094,1115,"ACTION"]]}],["Woman allowed plastic surgery clinic to take before and after photos of her nude body. The photos were accidentally published to the internet with her name attached.;",{"entities":[[40,86,"ACTION"],[91,97,"ASSETS"],[98,141,"ACTION"]]}],[";",{"entities":[]}],["Large group of people mob the US Capitol building, invading offices, and stealing computers and documents. Many posted on social media what they were doing. ;",{"entities":[[73,81,"ACTION"],[82,91,"ASSETS"],[96,106,"ASSETS"],[113,157,"ACTION"]]}],["The recent theft of an unencrypted laptop that may contain information on up to 400,000 inmates who served time in California prisons has been added to the federal tally of health data breaches. ;",{"entities":[[11,16,"ACTION"],[35,41,"ASSETS"],[173,194,"ACTION"]]}],["Records accessed by unauthorized agents on a de-commed server.;",{"entities":[[0,16,"ACTION"],[20,39,"ACTOR"],[55,62,"ASSETS"]]}],[" An in-home health care nursing assistant from St. Joseph faces federal charges of wire fraud and aggravated identity theft. Ashley N. Garr, 32, is accused of using bank account information taken from a client to illegally transfer $180,000. Tom Larson, Acting United States Attorney for the Western District of Missouri, cautioned the charges are only accusations. Garr’s preliminary hearing was held Monday, and she has been released on bond. According to an affidavit, Garr worked for the victim for approximately a year, leaving employment in 2015. Garr visited her victim in November 2016 and allegedly stole bank account information. In March 2017, the victim discovered unauthorized payments being made from her account. The affidavit lists $181,065 transferred in a series of 28 payments from Jan. 24 to March 31, 2017. The case was investigated by the FBI and the Internal Revenue Service-Criminal Investigation unit.;",{"entities":[[4,41,"ACTOR"],[83,93,"ACTION"],[109,124,"ACTION"],[126,140,"ACTOR"],[149,190,"ACTION"],[211,232,"ACTION"],[368,374,"ACTOR"],[475,479,"ACTOR"],[556,560,"ACTOR"],[601,642,"ACTION"],[681,702,"ACTION"]]}],["Volusion, an online store provider was hacked and had modified javascript upload to steal payment card data from over 6589 online stores it manages;",{"entities":[[35,45,"ACTION"],[50,80,"ACTION"],[84,107,"ACTION"]]}],["FBI notified North Georgia Tech of probable breach of one of their databases, in article, victim talked of database in past tense, assuming they just took it down rather than investigate.;",{"entities":[[35,50,"ACTION"],[67,76,"ASSETS"],[107,115,"ASSETS"]]}],["Three times John Nelson has asked for his late mother's medical records. Each time, he's been given someone else's.;",{"entities":[[24,72,"ACTION"],[84,115,"ACTION"]]}],["external hard drive containing the personal information of students disappeared ;",{"entities":[[0,19,"ASSETS"],[69,82,"ACTION"]]}],["Parents disclosed son had CF markers (but not CF) in his genes. Teachers told parents of kids who did have CF about other student.;",{"entities":[]}],["Spanish city of Jerez de la Frontera is hit by ransomware;",{"entities":[[37,57,"ACTION"]]}],["Retailer discovers malware on their online storefront which is copying off customer data including credit card numbers.;",{"entities":[[19,53,"ACTION"],[60,119,"ACTION"]]}],["email phissing schemem;",{"entities":[[0,14,"ACTION"]]}],["On August, 14th, Outbrain’s widget configuration tools were compromised by a phishing attack performed by the Syrian Electronic Army.;",{"entities":[[55,71,"ACTION"],[77,92,"ACTION"],[110,133,"ACTOR"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Doctor was accessing patient records without a valid reason. He asserts it was when he was teaching his wife to use the system (also not authorized).;",{"entities":[[0,6,"ACTOR"],[7,36,"ACTION"],[37,60,"ACTION"],[121,127,"ASSETS"],[134,148,"ACTION"]]}],["Tufts Health Plan warned subscribers Thursday that personal information for about 8,830 seniors enrolled in the insurer's Medicare plan was stolen. The Watertown-based organization said the theft included the names, birth dates and Social Security numbers of current and former subscribers of the Tufts Medicare Preferred plan. Medical and health information was not included in the theft, Tufts reported. \"As soon as we learned of this situation we took immediate action, conducting our own investigations while working very closely and in full cooperation with federal investigators,\" Tufts said in a statement. It was not immediately clear how or when the information was stolen. The insurer said in a news release that the theft was brought to Tufts' attention by federal officials during an investigation that continues. Tufts reported the theft was not caused by an electronic breach, hacking or information technology system vulnerability. A Tufts spokeswoman declined to provide more details on the theft. A spokesman for the Office of the Inspector General for Social Security did not immediately return a phone call late Thursday afternoon. The insurer said it would offer credit monitoring and identity theft protection to people impacted by the theft and to Tufts Medicare Preferred members whose information was not stolen. \"We cannot convey strongly enough our regret that this incident occurred,\" Tufts said in a statement. ;",{"entities":[[136,147,"ACTION"],[192,197,"ACTION"],[381,390,"ACTION"],[677,688,"ACTION"],[733,738,"ACTION"],[851,856,"ACTION"],[1015,1021,"ACTION"]]}],["Employee misused privilege to lookup personal contact information of a resident they were in an accident with.;",{"entities":[[0,8,"ACTOR"],[9,65,"ACTION"]]}],["a camera used to document patient skin conditions was stolen out of a physician's car last June. The photos date back to mid-February, and contain information such as patient names and dates of birth.;",{"entities":[[2,8,"ASSETS"],[50,60,"ACTION"]]}],["The College of the Desert experienced a data security breach on Thursday, June 5, 2014. The data security breach involved the release of the following types of your personal information: your name, ssn, dob, gender, home zip code, the titles of positions you held at the college (including start and end date of each position held), your employment anniversary date, employee identification number, health insurance benefit plan selection, health insurance subscriber identification number, amount or cost of health insurance subscriber premium, and active or retired employee status. The breach occurred in the afternoon on Thursday, June 5, 214. A College employee, without authorization, sent an electronic email message with an attached spreadsheet containing the above classes of personal information. This email message was sent to a group of approximately 78 college employees. A message recall was attempted and was successful with some but not all recipients. It is possible that the email and its attachment was delivered to approximately 50 people. We cannot determine how many people opened the email or viewed the attachment. The email was deleted from their mail boxes within 24 hours. ;",{"entities":[[98,113,"ACTION"],[592,598,"ACTION"],[654,670,"ACTOR"],[672,693,"ACTION"],[695,727,"ACTION"],[728,810,"ACTION"],[831,842,"ACTION"],[1147,1190,"ACTION"]]}],["ATM skimmers;",{"entities":[[0,3,"ASSETS"],[4,12,"ACTION"]]}],["Outage leads to disrupted service for Virgin Mobile customers. Glitch caused postpaid customers to be shown as prepaid customers with no credit.;",{"entities":[[13,33,"ACTION"]]}],["Yahoo! hacked using heartbleed bug and passwords stolen.;",{"entities":[[7,13,"ACTION"],[14,34,"ACTION"],[39,56,"ACTION"]]}],["The Japanese government's data protection policies have been called into question after it emerged that a decommissioned coast guard vessel was sold to a pro-North Korea organisation without any checks as to whether key data on board was first deleted.;",{"entities":[[140,148,"ACTION"],[154,182,"ACTOR"],[183,252,"ACTION"]]}],["Three (3) DICOM imaging DVDs (X-rays) were hand carried to the front desk of a Portland VA CBOC and turned over to VA staff. The Veteran presenting them indicated the DVDs had been mailed to him by mistake and he was returning them so they could be mailed correctly. This Veteran was not identified. The clinic staff sent the DVDs via inter-office mail to the Emergency Room Department in the main medical center. Employees brought them to the facility Privacy Officer after they had been in the department for multiple days. The media were not in the original envelope so we do not know who they had been mis-mailed to. It is unknown how long this Veteran had the DVDs in his possession before he took them to the clinic. Release of Information records show an authorized release request was submitted to their office on Feb 16, 2011. This is likely when the Imaging Department was forwarded the request so they could create the DVDs and mail them out. Imaging has been notified of the error and is checking to see what information they have related to this release. The Privacy Officer currently has the media secured in his office.;",{"entities":[[24,28,"ASSETS"],[30,36,"ASSETS"],[38,76,"ACTION"],[115,124,"ACTOR"],[167,171,"ASSETS"],[172,205,"ACTION"],[300,316,"ACTOR"],[317,352,"ACTION"],[537,570,"ACTION"],[598,621,"ACTION"],[666,670,"ASSETS"],[932,936,"ASSETS"],[941,955,"ACTION"],[989,994,"ACTION"]]}],[" In June 2015, former Metro employees, Michael and Margaret Abbott, were informed by the Internal Revenue Service (IRS) that they were victims of identity theft and that someone attempted to file a fraudulent tax return in Michael Abbott’s name. In August 2016, the Abbotts learned that their names, addresses, and social security numbers were inadvertently exposed in an HR Department training manual that had been posted on Metro’s public website from 2012 to 2016. The Enterprise Business Solutions (EBS) manual was created by HR in 2005 for internal use by Human Resources coordinators from each department. The EBS manual contained actual employee data and a total of 21 social security numbers were exposed. The EBS manual was placed online in December 2012 for ease of access to HR coordinators, but was also publicly available to anyone. On August 4, 2016, an HR coordinator from the Arts Commission reported a concern that the manual appeared to use actual employee data. The manual was removed from the website that same day, and the HR Department destroyed all paper copies of the training manuals and revised them to remove sensitive information. The EBS system had already been modified by the HR Department a few years earlier to mask sensitive employee data. All affected employees, including the Abbotts, were notified of this breach by certified letter on August 24, 2016 and offered two years of identity theft protection insurance. The Abbotts were notified by the IRS of the attempted false tax return, but did not lose any potential tax refund they were owed. They were offered one year of free identity theft protection from Metro HR and have since purchased their own identity theft insurance, which they intend to maintain indefinitely at a current cost of approximately $160 per year. Ms. Abbott has a history of stress and anxiety related medical issues and suffered a stress related heart attack in July 2015, one month after the letters from the IRS concerning identity theft. The statutory claims asserted in their complaint include provisions for attorneys’ fees and costs. The Abbotts have agreed to accept a total of $22,000 in full settlement of this case.;",{"entities":[[149,163,"ACTION"],[191,222,"ACTION"],[342,368,"ACTION"],[410,428,"ACTION"],[444,451,"ASSETS"],[732,749,"ACTION"],[810,848,"ACTION"],[1021,1028,"ASSETS"],[1351,1357,"ACTION"],[1508,1534,"ACTION"],[2002,2017,"ACTION"]]}],["Aetna warns that Social Security numbers and other personal data were potentially compromised for 850 Ohioans after a compact disc containing sensitive information got lost in the mail.;",{"entities":[[118,130,"ASSETS"],[131,185,"ACTION"]]}],["public terminal provided access to PII ;",{"entities":[[16,38,"ACTION"]]}],["An employee inappropriately accessed patient information. The incident or incidents were discovered on April 16. Patient clinical and other medical information may have been exposed. No Social Security numbers were exposed.;",{"entities":[[3,11,"ACTOR"],[12,57,"ACTION"],[161,183,"ACTION"]]}],["Portable hard drive that contained sensitive information was lost. Hard drive was not protected by full disk encryption or a password.;",{"entities":[[0,19,"ASSETS"],[57,66,"ACTION"],[67,77,"ASSETS"]]}],["Two hospital employees have been fired for illegally accessing the electronic health record (EHR) of a Massachusetts physician who was being treated for Ebola in the facilitys isolation unit. The HIPAA violation was discovered by Nebraska Medical Center officials conducting an audit of their EHR system, according to a statement released by the Omaha, NE-based facility. Richard Sacra, MD, contracted Ebola while working as a medical volunteer in Liberia. He was flown back to the US in September and was placed in a specialized isolation unit, one of only a handful like it in the country. The unit featured a remote monitoring system which allowed Sacra to communicate with his family members via videoconferencing technologies. In its statement to the media, hospital officials said the unauthorized access of Sacras record constitutes a HIPAA violation, an issue we take very seriously, the statement said. Based on the results of the investigation conducted, two employees no longer work for the organization and other corrective action has been taken. The hospital said it informed Sacra about the breach prior to his discharge from the facility. The incident should serve as a reminder to providers that the records of patients with extra notoriety, such as the potentially panic-inducing diagnosis of Ebola, may require an extra measure of security. As is often the case of breaches involving celebrities, the level of curiosityor perhaps the price tagfor information of this nature is high.;",{"entities":[[13,22,"ACTOR"],[39,91,"ACTION"],[192,211,"ACTION"],[791,810,"ACTION"],[842,857,"ACTION"],[965,978,"ACTOR"],[1105,1111,"ACTION"]]}],[";",{"entities":[]}],["Hospital employee accesses 7 patient records against policy.;",{"entities":[[0,17,"ACTOR"],[18,60,"ACTION"]]}],["Law firm \"runner\" used access to information about clients to defraud people in excess of 1.8 million dollars.;",{"entities":[[0,8,"ACTOR"],[18,58,"ACTION"],[59,76,"ACTION"]]}],["Nearly $20 million stolen from the DeFi protocol Pickle Finance;",{"entities":[[19,30,"ACTION"]]}],["“The investigation further revealed that, in March 2012, Nikkita Chesney, who was employed by a health care provider that provided substance abuse treatment, including a detoxification program in Bridgeport, began to steal the personal identification information of Medicaid clients who were patients of her employer,” Durham noted. “The personal identifying information included the patients’ Medicaid identification number, Social Security Numbers and dates of birth.”;",{"entities":[[57,72,"ACTOR"],[208,262,"ACTION"]]}],["un secure database;",{"entities":[[10,18,"ASSETS"]]}],["Attackers attacked cloud backup vendor and used ransomware to encrypt customer data. Vendor paid ransom.;",{"entities":[[0,9,"ACTOR"],[10,38,"ACTION"],[43,84,"ACTION"],[93,105,"ACTION"]]}],["The Regional Office (RO) sent a Veterans Claims Assistance Act of 2000 (VCAA) letter to Veteran A, which had attached another VCAA letter for Veteran B. Veteran B's name and full SSN were compromised. This is informational for Mis-Mailed incidents and is the representative ticket. There were a total of 143 Mis-Mailed incidents this reporting period. Because of repetition, the other 142 are not included in this report, but are included in the \"Mis-Mailed Incidents\" count at the end of this report. In all incidents, Veterans will receive a notification letter and/or credit monitoring will be offered if appropriate.;",{"entities":[[0,24,"ACTOR"],[25,29,"ACTION"],[78,84,"ASSETS"],[99,137,"ACTION"],[183,200,"ACTION"],[228,248,"ACTION"],[309,319,"ACTION"],[448,468,"ACTION"]]}],["TTPD arrest two men in ATM skimming scam - Red River Federal Credit Union;",{"entities":[[12,19,"ACTOR"],[23,26,"ASSETS"],[27,40,"ACTION"]]}],[";",{"entities":[]}],["A Health Share data breach has exposed the personal information of many of its members. This comes after a laptop was stolen from a company vehicle. Advances in cybertechnology mean that a hacker can sit anywhere in the world and potentially break into a computer network. New methods and tactics have made it even easier for criminals to steal personal identifiable information (PII), medical records, complete identities and more. However, that does not mean the threat from “old-fashioned” crimes has diminished. Health Share of Oregon has just announced a data breach of its members’ PII—including names, birthdates and Social Security numbers, but not medical records—due to a laptop being stolen from a vendor’s vehicle. The vendor, GridWorks, provides patient transportation to some Health Share members. A company vehicle was broken into and the laptop was stolen. Health Share has not been able to determine whether or not the members’ information has been used maliciously by the thief as part of the Health Share data breach. Therefore, the company is providing a year of credit monitoring and identity monitoring to its affected members. Health Share is already taking proactive steps to prevent this kind of incident in the future. For example, they are conducting audits of their third-party vendors and implementing tech training for any vendors who are able to access member information. ;",{"entities":[[27,63,"ACTION"],[107,113,"ASSETS"],[114,129,"ACTION"],[132,148,"ASSETS"],[193,199,"ACTOR"],[259,276,"ASSETS"],[568,609,"ACTION"],[690,696,"ASSETS"],[697,709,"ACTION"],[726,734,"ASSETS"],[822,837,"ASSETS"],[838,853,"ACTION"],[862,868,"ASSETS"],[869,880,"ACTION"],[998,1007,"ACTOR"]]}],["stolen laptop;",{"entities":[[0,6,"ACTION"],[7,13,"ASSETS"]]}],["In June, a healthcare assistant from St Luke’s Hospital was accompanying a patient on a transfer to another hospital when he left their chart on the roof of the car before setting off. He realised the mistake only when he arrived at their destination. The chart was later retrieved from a member of the public who had picked it up. The HSE responded by notifying the patient of the incident and reported the matter to the Data Commissioner. The staff member was reminded of their responsibilities under data-protection legislation.;",{"entities":[[125,129,"ACTION"],[136,141,"ASSETS"],[161,164,"ASSETS"],[202,209,"ACTION"],[257,262,"ASSETS"]]}],["hacking by student to change grades;",{"entities":[[0,7,"ACTION"],[11,18,"ACTOR"],[19,35,"ACTION"]]}],["Scammer obtains W-2 forms of Monarch Beverage employees;",{"entities":[[0,7,"ACTOR"],[8,25,"ACTION"]]}],["Pakistan's Inter-Services Intelligence called Indian owned BSNL and posed as a major from the Indian Army. They then followed up this call with an email to the staffer at BSNL to obtain critical information.;",{"entities":[[0,38,"ACTOR"],[39,45,"ACTION"],[68,76,"ACTION"],[118,156,"ACTION"],[177,208,"ACTION"]]}],["In February 2009, Mercy Walworth Medical Center in Lake Geneva, Wis., dismissed two nurses for allegedly using their cell phone cameras to take photos of a patient’s x-ray and later posting them on the Internet.;",{"entities":[[80,90,"ACTOR"],[95,116,"ACTION"],[117,127,"ASSETS"],[136,171,"ACTION"],[176,211,"ACTION"]]}],["Breach of college network led to file with 2800 records of employee PII being disclosed. No details of breach have been provided.;",{"entities":[[0,6,"ACTION"],[18,25,"ASSETS"],[59,88,"ACTION"]]}],["The San Diego Unified School District said they have alerted employees and families to an incident involving the security of their personal data on the district’s information systems. According to the district they have reason to believe some employee and student personal data may have been compromised through the access or use by an unauthorized individual. Roughly 50 staff members whose accounts were compromised had the security on their accounts reset immediately upon discovery. Families of students whose data may have been accessed have been contacted by the district. The breach is believed to date back to January 2018 and could impact as many as 500,000 students who were enrolled in the district between the 2008-09 and 2018-19 school years, according to district officials. SDUSD Information Technology staff discovered an unauthorized user was gathering network access log-in information from staff and using that information to log into the district’s network services, including the district student database. This happened through “phishing,” a scam technique where a person creates phony emails that appear to be from a legitimate source and contain harmful links. Unfortunately, this type of scam has become widespread throughout the world.;",{"entities":[[305,323,"ACTION"],[334,361,"ACTOR"],[403,419,"ACTION"],[585,591,"ACTION"],[841,858,"ACTOR"],[859,906,"ACTION"],[972,988,"ASSETS"],[1021,1030,"ASSETS"],[1045,1062,"ACTION"],[1123,1160,"ACTION"]]}],["Records were provided to a contract nursing home (CNH) on a patient discharged to the CNH. A surgical schedule was mixed in with the records containing 26 patient's full names, full social security numbers, and protected health information.;",{"entities":[[8,24,"ACTION"],[111,123,"ACTION"]]}],["Blended attack (DDoS, phishing, malware) launched in protest of Flint water debacle.;",{"entities":[[0,14,"ACTION"],[16,20,"ACTION"],[22,30,"ACTION"],[32,39,"ACTION"]]}],["Indian Hackers Harsha Vardhan Boppana and Codie Root claimed that they hacked into Stanford university website. ;",{"entities":[[0,14,"ACTOR"],[15,37,"ACTOR"],[42,52,"ACTOR"],[71,77,"ACTION"],[103,111,"ASSETS"]]}],["actor gained access and maintained for 3 months, getting over 50,000 personal information, credit cards and username/password combinations.;",{"entities":[[0,5,"ACTOR"],[6,19,"ACTION"]]}],["Veteran A received information on Veteran B in the mail from the Release of Information (ROI) Department. Veteran A returned the information to the Community Based Outpatient Clinic (CBOC), so that it could be returned to the correct Veteran. The information contained Veteran B's name, address, full SSN and diagnosis.;",{"entities":[[10,33,"ACTION"],[51,55,"ASSETS"],[65,105,"ACTOR"]]}],["unauthorized release of an electronic copy of all 2015 W2s;",{"entities":[[0,23,"ACTION"]]}],["Hackers gain access to payroll system for Agincourt Wallboard LLC;",{"entities":[[0,7,"ACTOR"],[8,22,"ACTION"],[31,37,"ASSETS"]]}],["Some patients referred to Tennova Cardiology by Summitt Medical Center are being warned that their personal information may have been stolen. According to a press release from Tennova, a laptop belonging to an independent, third-party transcription contractor was stolen from a vehicle in Nashville on October 22. \"Tennova Cardiology has no reason to believe that this information has been accessed or misused in a way that would cause harm to the affected patients. The unencrypted laptop contained data from patients referred to Tennova Cardiology by Summit Medical Group for cardiac diagnostic tests. The diagnostic tests were performed at the Summit diagnostic services locations,\" the release said. Tennova said they are working to identify all patients whose information may have been on the laptop and has mailed a letter to the 2,777 patients who may have been affected. The information on the stolen laptop may include names, dates of birth, referring physician names, and health information about patient treatment and diagnostic procedures. There is no evidence that any Social Security numbers were included in the information contained on the laptop. The contractor is no longer performing services for the physician group. If you think your information may have been compromised, you can call (866) 369-0422 for more information.;",{"entities":[[120,141,"ACTION"],[188,194,"ASSETS"],[261,271,"ACTION"],[279,286,"ASSETS"],[485,491,"ASSETS"],[801,807,"ASSETS"],[906,912,"ACTION"],[913,919,"ASSETS"],[1160,1167,"ASSETS"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["ATM Skimmer;",{"entities":[[0,3,"ASSETS"],[4,11,"ACTION"]]}],[";",{"entities":[]}],[";",{"entities":[]}],["DDoS on central bank;",{"entities":[[0,4,"ACTION"]]}],["Illegal credit card skimmers found at Antioch gas pumps - Valero;",{"entities":[[0,34,"ACTION"],[46,55,"ASSETS"]]}],["A dishonest intern was caught using a cell phone to illegally photograph patient Social Security numbers and names. The photos were then sent to another person; presumably for fraudulent activity. The office intern was charged with fraudulent use of personal identification information. It is unclear when the breach was discovered since the photos were taken between May 7 and June 19.;",{"entities":[[0,18,"ACTOR"],[38,48,"ASSETS"],[52,80,"ACTION"],[128,145,"ACTION"],[177,197,"ACTION"],[234,288,"ACTION"],[312,318,"ACTION"],[344,350,"ASSETS"]]}],["Scott Disick reportedly checked into rehab last Tuesday after relapsing into drug and alcohol abuse, but after photos leaked of the star at All Points North Lodge in Colorado, he was apparently so upset that he decided to check himself out. Read more: https://www.inquisitr.com/6034826/scott-disick-rehab-photo-sue/#ixzz6dW5cVoos;",{"entities":[[0,12,"ACTOR"],[101,127,"ACTION"]]}],[";",{"entities":[]}],["Unauthorized person sets up a bogus account on valic.com to access information of customer.;",{"entities":[[0,19,"ACTOR"],[20,46,"ACTION"],[57,91,"ACTION"]]}],["Small hosting company, Zone Technologies from south Africa has been hit by hackers going under the handle of “The Israeli Hackers Team”. The hack has resulted in the dumping of accounts and personal information but its at least worth noting they did encrypt passwords, although there was still clearly a exploit within the server that has allowed hackers to obtain this data. ;",{"entities":[[59,71,"ACTION"],[75,82,"ACTOR"],[109,136,"ACTOR"],[142,146,"ACTION"],[167,186,"ACTION"],[305,319,"ACTION"],[324,330,"ASSETS"],[348,355,"ACTOR"],[356,376,"ACTION"]]}],["NBTC to probe alleged privacy breach by AIS employee;",{"entities":[[14,36,"ACTION"],[40,52,"ACTOR"]]}],["WASHINGTON -- A data broker operation sold payday loan applicants' financial information to scammers, who took in millions of dollars by debiting bank accounts and charging credit cards without authorization, the Federal Trade Commission charged Wednesday. The data brokers bought \"hundreds of thousands of consumer payday loan applications\" and, instead of passing them to legitimate payday lenders, sold them to non-lending third parties, the FTC charged in a complaint. Among the companies, was Ideal Financial Solutions Inc., which bought 500,000 applications and raided the accounts for at least $7.1 million, the FTC said. \"These non-lender third parties included phony Internet merchants, such as Ideal Financial, that used consumers' sensitive information to commit fraud by debiting consumers' bank accounts for purported financial products that the consumers never purchased,\" the complaint said. The FTC is seeking a permanent injunction against the defendants -- Sequoia One of Wyoming, Gen X Marketing of Florida and individuals associated with the companies, Jason A. Kotzker, Theresa D. Bartholomew, John E. Bartholomew Jr., and Paul T. McDonnell -- and the return of ill-gotten gains. In a statement, Jessica Rich, director of the FTC's Bureau of Consumer Protection, said that data brokers that act unethically are as culpable as the scammers themselves.;",{"entities":[[16,37,"ACTOR"],[38,65,"ACTION"],[92,100,"ACTOR"],[106,159,"ACTION"],[164,207,"ACTION"],[262,274,"ACTOR"],[275,281,"ACTION"],[402,414,"ACTION"],[1298,1310,"ACTOR"],[1316,1375,"ACTION"]]}],["Bryan was accused last December of using information on former workers to continue to receive their paychecks and cash them.;",{"entities":[[0,5,"ACTOR"],[35,70,"ACTION"],[71,124,"ACTION"]]}],["About 5,000 patients of Palomar Health had personal information including medical diagnoses stolen last month when someone swiped a company laptop and two flash drives from an employees SUV, a company official announced Friday. The inland North County health care system is reaching out to patients affected by the late February theft of the items, spokeswoman Bobette Brown said. Palomar Health runs Palomar Medical Center in Escondido and Pomerado Hospital in Poway. The laptop was encrypted, but the two flash drives were not, Brown said. ;",{"entities":[[94,100,"ACTION"],[117,124,"ACTOR"],[125,131,"ACTION"],[142,148,"ASSETS"],[157,169,"ASSETS"],[178,191,"ASSETS"],[477,483,"ASSETS"],[511,523,"ASSETS"]]}],["\"The website of Radio Free Europe/ Radio Liberty, a media organization that has 700 journalists across 21 countries, was disrupted by a distributed denial-of-service (DDOS) attack on Sunday, just as it was providing extensive coverage on the ongoing protests in Kiev, Ukraine.\";",{"entities":[[5,12,"ASSETS"],[117,130,"ACTION"],[136,179,"ACTION"]]}],[";",{"entities":[]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Database compromise leads to public posting of 4500 usernames, passwords, and e-mail addresses. Passwords were hashed, but not salted and many were cracked.;",{"entities":[[0,8,"ASSETS"],[9,46,"ACTION"],[143,156,"ACTION"]]}],[";",{"entities":[]}],["hacker using the handle Game Over has leaked data that comes from a website that produces custom content for The Sims.;",{"entities":[[0,6,"ACTOR"],[34,49,"ACTION"],[68,75,"ASSETS"]]}],["Internal employee uses access to credit card machine to process returns onto his own credit card.;",{"entities":[[0,17,"ACTOR"],[18,32,"ACTION"],[33,52,"ASSETS"],[53,97,"ACTION"]]}],["Publishing error;",{"entities":[[0,16,"ACTION"]]}],["There was a privacy breach this morning for a brief period (10-15 minutes) where the Pharmacy Bingo Board was displaying private patient information on monitors throughout the hospital. The PO is on leave for the remainder of the week. The Chief and Assistant Chief, IT, were included on message to provide details on how this occurred and provide a list of Veterans which may have been impacted.",{"entities":[[12,26,"ACTION"],[85,105,"ACTOR"],[106,148,"ACTION"],[152,160,"ASSETS"]]}],["Incident Update",{"entities":[]}],["05/05/10:",{"entities":[]}],["A user chose the wrong device to send their report to. The facility is in the process of working with the National Help Desk to block the availability of this device to only a select group of users who use this device strictly for the Pharmacy Bingo Board display. The ISOs are unable to determine where the print-out was sent from. The device acts like a printer and it is unable to tell who sent it once the job has been sent. The Pharmacy Bingo board can display up to 8 patient names at one time, there were eight names to include full SSN's being displayed. The facility is working with national VISTA programmers to prevent a recurrence of this incident. This occurred because the Bingo board is a printer and a full print screen was sent to the screen instead of the typical last name, first initial.",{"entities":[[7,37,"ACTION"],[159,165,"ASSETS"],[211,217,"ASSETS"],[235,243,"ACTOR"],[337,343,"ASSETS"],[344,363,"ACTION"],[433,441,"ACTOR"],[704,711,"ASSETS"],[716,747,"ACTION"]]}],["Eight (8) patients will receive a letter offering credit protection services.;",{"entities":[]}],["Association of National Advertisers Suffers Phishing Attack, Possible Theft Of Data ;",{"entities":[[36,59,"ACTION"],[70,83,"ACTION"]]}],["Personal data accidentally exposed on website during maintenance and not deleted. 402 records accessed, 5,118 expose;",{"entities":[[14,37,"ACTION"],[38,45,"ASSETS"],[86,102,"ACTION"],[111,117,"ACTION"]]}],["Veteran A returned the Release of Information CD that contained the information that she requested. The CD also contained PHI for Veteran B including full name, full SSN, and DOB.;",{"entities":[[46,48,"ASSETS"],[104,106,"ASSETS"]]}],["An April 17 burglary resulted in the possible exposure of patient information. Someone entered locked rooms and cabinets in order to take money. No records or electronic devices were taken; however the room where client medical charts were stored was accessed. Social Security numbers, health information, and other personal information may have been exposed.;",{"entities":[[12,20,"ACTION"],[46,78,"ACTION"],[80,87,"ACTOR"],[88,108,"ACTION"],[122,145,"ACTION"],[249,262,"ACTION"],[344,362,"ACTION"]]}],["County disposal service didn't lock up paper documents en route for disposal instead they flew out of the back of the truck;",{"entities":[[0,15,"ACTOR"],[24,38,"ACTION"],[39,54,"ASSETS"],[85,123,"ACTION"]]}],["\"A merchant where you used your American Express Card detected unauthorized access to their website files.\" May be either Paragon or 1ink, both are at same address apparently.;",{"entities":[[63,82,"ACTION"],[92,99,"ASSETS"]]}],["DENVER (CBS4) - Three men are now suspected of installing devices at light-rail ticketing machines that steal consumers credit card information. The devices, called skimmers, were discovered before they could transmit any information. Investigators said nobodys information was compromised. Surveillance video shows two men who may have installed the devices into ticketing machines at the Mineral station in the south metro area. The devices were also found on ticket machines at the Dry Creek and County Line stops.;",{"entities":[[16,25,"ACTOR"],[47,65,"ACTION"],[69,98,"ASSETS"],[104,144,"ACTION"],[204,235,"ACTION"],[318,325,"ACTOR"],[330,365,"ACTION"],[366,384,"ASSETS"],[464,479,"ASSETS"]]}],["employee stole patients credit card;",{"entities":[[0,8,"ACTOR"],[9,14,"ACTION"],[24,35,"ASSETS"]]}],["Customer returns faulty laptop and receives new one. Sainsbury's sells the faulty laptop on Ebay, apparently without wiping the hard drive (which was supposed to have been done by a 3rd party contractor). The laptop is purchased, and the buyer contacts the original owner to let them know their profile and personal info is still on the system.;",{"entities":[[24,30,"ASSETS"],[65,81,"ACTION"],[82,88,"ASSETS"],[128,138,"ASSETS"],[182,202,"ACTOR"],[209,215,"ASSETS"],[216,228,"ACTION"]]}],["Marijuana dispensary shared patient's emails in cc field.;",{"entities":[[0,20,"ACTOR"],[21,57,"ACTION"]]}],["A security weakness in an online application database left the electronic protected health information of 612,402 individuals accessible to unauthorized individuals over the internet. The organization was investigated by the HHS OCR and found to be at fault. The resulting fine was $1.7 million to settle.;",{"entities":[[45,53,"ASSETS"],[54,102,"ACTION"],[140,164,"ACTOR"]]}],["Partner engineering firm sold CAD drawings developed for the victim to another company in violation of contract.;",{"entities":[[0,24,"ACTOR"],[25,29,"ACTION"],[30,42,"ASSETS"],[90,112,"ACTION"]]}],["On Friday, February 8, 2013, around 7:00 am we discovered a forcible break-in at Mercedes-Benz of Walnut Creek’s dealership. Between the close of business on Thursday, February 7th and the morning of Friday, February 8th, a thief or thieves pried open a locked exterior door to the dealership, another locked interior door into the Business Office was pried open, and once inside the Business Office, locked file cabinets containing customer deal jackets were pried open and some customer deal files were removed. Additionally, some files containing customer personal information were removed from our Service Department.;",{"entities":[[60,77,"ACTION"],[224,229,"ACTOR"],[233,240,"ACTOR"],[241,277,"ACTION"],[348,362,"ACTION"],[460,470,"ACTION"],[494,499,"ASSETS"],[500,513,"ACTION"],[533,538,"ASSETS"]]}],["Unknown web vuln led to compromise of PII;",{"entities":[[0,41,"ACTION"]]}],["Savannah resident convicted for bank fraud, aggravated identity theft - Wells Fargo Bank;",{"entities":[[0,17,"ACTOR"],[32,42,"ACTION"],[55,69,"ACTION"]]}],["Sacramento Regional Transit employee suspected in ID theft of 30 co-workers;",{"entities":[[28,36,"ACTOR"],[50,61,"ACTION"]]}],["Isuzu.fr site compromised via SQL injection. Attacker posted DB contents to public website.;",{"entities":[[9,13,"ASSETS"],[14,44,"ACTION"],[45,53,"ACTOR"],[54,91,"ACTION"]]}],["EasyDraft, which processes payments for Bright Horizons Family Solutions, recently began notifying an undisclosed number of current and former Bright Horizons customers that their names, bank routing numbers and bank account numbers were mistakenly made available online (h/t DataBreaches.net). According to the notification letter [PDF], Bright Horizons learned on January 8, 2014 that one of EasyDraft's internal Web sites was accessible online, and informed EasyDraft of the issue. The Web site in question was then shut down, and an investigation determined that the Web server storing the files had been misconfigured since October 8, 2012, \"resulting in a lack of proper secure authentication requirements,\" according to EasyDraft.;",{"entities":[[233,270,"ACTION"],[416,425,"ASSETS"],[426,447,"ACTION"],[491,499,"ASSETS"],[512,530,"ACTION"],[573,583,"ASSETS"],[602,624,"ACTION"],[649,713,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The Saint Louis University (SLU) is notifying 3,000 people that their protected health information might have been compromised after some of the institutions employees fell victim to a sophisticated phishing scam.;",{"entities":[[99,126,"ACTION"],[185,213,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Initially four hard drives sold eBay in October and November 2010 were found to contain were found to contain sensitive personal data of both patients and staff. Despite the Trust's assurance that these were the only drives lost, further hard drives were recovered by the ICO after being sold on eBay. The Trust was unable to explain how an unnamed individual, who was sub-contracted by a sub-contractor to the IT supplier to the Trust to destroy the 1,000 hard drives, managed to remove at least 252 of the 1,000 hard drives he was supposed to be destroying from the hospital during his five days on the premises. Despite the security precautions taken there were insufficient records taken to provide a reliable audit trail of which hard drives were and were not destroyed. The Information Commissioner (ICO) ended up imposing a fine of 325,000 after sensitive patient data of thousands of people was discovered on hard drives sold on eBay. An investigation found that at least 232 de-commissioned drives that should have been deep cleaned and destroyed by a contractor ended up being sold second hand.;",{"entities":[[15,26,"ASSETS"],[27,31,"ACTION"],[88,133,"ACTION"],[217,223,"ASSETS"],[224,228,"ACTION"],[238,249,"ASSETS"],[282,301,"ACTION"],[514,525,"ASSETS"],[735,746,"ASSETS"],[756,775,"ACTION"],[919,930,"ASSETS"],[931,944,"ACTION"],[1064,1074,"ACTOR"],[1075,1107,"ACTION"]]}],["Ransomware prevents access to small business medical records;",{"entities":[[0,60,"ACTION"]]}],["Jewel-Osco hit again by data hack - hacker installed malware into the portion of Supervalu's computer network that processes payment cards at some of its Cub stores, as well as its Shop'n Save and Shoppers Food & Pharmacy chains located respectively in the St. Louis and the Washington, D.C., areas. Supervalu believes the malware may have succeeded in capturing account numbers, and in some cases, expiration dates, and cardholders' names at the four stores.;",{"entities":[[11,20,"ACTION"],[36,42,"ACTOR"],[43,60,"ACTION"],[93,109,"ASSETS"],[320,350,"ACTION"],[354,379,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Hackers leaked nearly 2,000 incidents of Austin surveillance. Here's what they found ;",{"entities":[[0,7,"ACTOR"],[8,14,"ACTION"]]}],["Web site defacement;",{"entities":[[0,8,"ASSETS"],[9,19,"ACTION"]]}],["mispublished personal information through web app;",{"entities":[[0,33,"ACTION"],[42,49,"ASSETS"]]}],["Attorneys representing more than 1,500 women whose personal medical information was compromised when their records were blown from a dumpster on a windy day in May have reached a settlement agreement with the medical group responsible. In the settlement agreement, which still has to be approved by a judge in January, Midwest Womens Healthcare Specialists agree to set up a victims fund of $400,000 to compensate the estimated 1,532 women whose documents were improperly disposed of in a dumpster outside Research Medical Center . Midwest Womens Healthcare will also separately agree to pay for up to two years of credit monitoring for the affected women, and it will re-train its employees in the proper handling of sensitive documents. We are pleased to have reached an agreement that is satisfactory to all parties, a spokesperson for the group said in an emailed statement. As we said previously, we have taken steps to enhance the security of patient information. The spokesperson added there have been no reports of anyones personal information being compromised. Attorney Maureen Brady, who filed the class-action suit on behalf of victim Brittany Short back in June, said she, too was pleased with the proposed settlement. \"Both sides worked very hard to get this resolved quickly, and to seek justice for all of those involved,\" Brady told 41 Action News. ;",{"entities":[[51,95,"ACTION"],[115,141,"ACTION"],[209,235,"ACTOR"],[448,457,"ASSETS"],[458,499,"ACTION"]]}],["American Express is strongly committed to the security of all our Cardmembers’ information and wants to inform you that a merchant where you have used your American Express Card for payment detected unauthorized access to their website. At this time, we believe the merchant’s affected data files included your American Express Card account number, your name and the expiration date on your card. Importantly, your Social Security number is not impacted and our systems do not show any indication of unauthorized activity on your Card account related to this incident.;",{"entities":[[199,218,"ACTION"],[228,236,"ASSETS"]]}],["Company received a communication from a former contractor claiming he had possession of credit card information of some of their customers. The contractor refused to return the data and to identify precisely what data he has. ;",{"entities":[[40,57,"ACTOR"],[70,111,"ACTION"],[145,155,"ACTOR"],[156,182,"ACTION"]]}],["Invoice with SSN and medical information lost in transit by USPS. Mail was damaged during processing and likely shredded.;",{"entities":[[0,7,"ASSETS"],[41,56,"ACTION"],[60,65,"ACTOR"],[66,70,"ASSETS"],[71,100,"ACTION"],[105,121,"ACTION"]]}],["Anonymous publishes five encrypted files that purportedly contain classified information. Activist group is threatening to publish the encryption keys.;",{"entities":[[0,9,"ACTOR"],[10,40,"ACTION"],[90,104,"ACTOR"],[108,151,"ACTION"]]}],["Due to a glitch in the website parents who were signing their children up for healthcare could see the information of other participants. Not known how many people were affected but the article states 'very few'.;",{"entities":[[0,18,"ACTION"],[23,30,"ASSETS"],[89,114,"ACTION"]]}],[" The Vermont Department of Taxes admitted this week that the social security numbers of 1,332 Vermont tax payers and federal ID numbers of 245 businesses were inadvertently posted online. The personal data were contained in a weekly batch of property transfer tax returns, according to a report by the Burlington Free Press citing a Vermont Department of Taxes statement. The information was available for viewing for two hours on a vendor portion of the tax department's website, the statement said.;",{"entities":[[1,32,"ACTOR"],[154,187,"ACTION"],[389,414,"ACTION"],[456,480,"ASSETS"]]}],["Point of Sale compromise leads to capture of restuarant's customers' payment card information. ;",{"entities":[[0,13,"ASSETS"],[14,44,"ACTION"]]}],["Skimming devices have been found on two separate Sunoco Gas Stations in Brooklyn.;",{"entities":[[0,32,"ACTION"]]}],["Veteran A was mailed a consultation sheet with a consult request for medical service for Veteran B. Veteran A mailed the papers back to the Privacy Officer.;",{"entities":[[10,20,"ACTION"],[36,41,"ASSETS"],[110,116,"ACTION"],[121,127,"ASSETS"]]}],["Memory stick led to stolen computer - Nottinghamshire Police;",{"entities":[[0,12,"ASSETS"],[13,26,"ACTION"],[27,35,"ASSETS"]]}],["error reported when a new car parking permit application site went live on their website earlier this month;",{"entities":[[0,5,"ACTION"],[45,61,"ASSETS"],[81,88,"ASSETS"]]}],["Ohio-based Endocrinology Associates reported a potential data security incident after it realized that a POD containing patient information was missing its padlock. They stated that no charts were missing but they are not certain that no one opened the charts and looked through them.;",{"entities":[[0,35,"ACTOR"],[140,164,"ACTION"],[242,259,"ACTION"],[264,284,"ACTION"]]}],["Patient B_s name and type of medical supply was compromised. Patient A reported the incident to the Muskogee VA Medical Center and a replacement has been requested for Patient B. Dallas Consolidated Mail",{"entities":[[44,60,"ACTION"]]}],["Patient A received a Medline Industries medical supply intended for Patient B.",{"entities":[[10,18,"ACTION"]]}],["Outpatient Pharmacy (CMOP) investigation concludes that this was a Medline packing error. The packing error has been reported to Medline for investigation and corrective action.;",{"entities":[[75,89,"ACTION"],[94,107,"ACTION"]]}],["randsomware on pastors computer;",{"entities":[[0,11,"ACTION"],[23,31,"ASSETS"]]}],["Spain's National Court on Tuesday granted conditional freedom to a former HSBC bank employee who is wanted by Switzerland for stealing confidential information on thousands of customers with Swiss accounts. The court ordered Herve Falciani's release on the prosecutor's recommendation, which argues that Falciani was co-operating with authorities in several European countries in investigations on tax, money-laundering, corruption and terrorism financing. The prosecutor noted Falciani has been detained for some time and that his extradition case could drag on. He was ordered to hand over his passport, not to leave Spain and to appear before police every three days. He was also told to establish a residence in Spain and to inform authorities if he moved house. Falciani, a French-Italian citizen, has been jailed provisionally since being arrested July 1 in Barcelona on a Swiss warrant. He had previously fled Switzerland to France. The data he allegedly stole about 24,000 customers of HSBC's Swiss subsidiary potentially exposed many people to prosecution by tax authorities in their home countries. Falciani, who obtained the information between late 2006 and early 2007 when he worked in the bank's information technology development unit, passed the list to French authorities. France's former Finance Minister Christine Lagarde, now head of the International Monetary Fund, later relayed the list to many European Union countries and the United States. France said there were up to 130,000 names involved.;",{"entities":[[67,92,"ACTOR"],[126,134,"ACTION"],[226,242,"ACTOR"],[305,313,"ACTOR"],[422,457,"ACTION"],[479,487,"ACTOR"],[770,778,"ACTOR"],[782,804,"ACTOR"],[956,971,"ACTION"],[1114,1122,"ACTOR"],[1128,1152,"ACTION"]]}],["Veteran A received an appointment letter that also contained Veteran B's appointment letter. The letter contained Veteran B's name, partial social security number and protected health information.;",{"entities":[[10,18,"ACTION"],[22,40,"ASSETS"],[97,103,"ASSETS"]]}],["Web application compromised to steal rewards points;",{"entities":[[0,15,"ASSETS"],[16,51,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["A clerk gave another Patient B's discharge papers to a Patient A. The papers had name, date of birth and social security number on it.;",{"entities":[[2,7,"ACTOR"],[8,12,"ACTION"],[43,49,"ASSETS"],[70,76,"ASSETS"]]}],["On October 12, 2012, an employee of the Office of the Medicaid Inspector General (OMIG) is suspected of having made a personal decision, without agency involvement or authorization from OMIG leadership or his or her personal supervisors, to send 17,743 records of Medicaid recipients to his or her own personal e-mail account. This employee conducted this action without the collaboration of other OMIG staff. The private information which may have been exposed includes, but may not be limited to, first and last name, date of birth, Medicaid client information number, and Social Security number. The employee is on administrative leave while a full, independent investigation is being conducted by the New York State Inspector Generals office. OMIG is cooperating fully with this investigation. OMIG expects all employees to act in a professional, ethical manner while in the workplace, and will not tolerate behavior that leads to the release of confidential information, said Medicaid Inspector General James C. Cox. OMIG followed all processes and procedures necessary following such a breach, including notifying each individual whose information was potentially compromised. OMIG sent each person a letter containing instructions on how to monitor his or her credit, as well as ways in which to ensure that what was inappropriately sent to the employees home computer not translate into identity problems for the individuals involved. Since this incident occurred, OMIG has devised tighter controls in its information technology department to limit access to data, ensuring that only those investigators and auditors who need data for specific investigatory or auditing purposes can retrieve such information. Under this enhanced approach, the employee would not have had access to the information included in this breach. OMIG has also retrained all agency employees on data security, using a nationally accredited program. OMIG has recommended that the individuals involved place an alert on their credit reports by contacting the three major credit reporting agencies (Equifax, Experian, and TransUnion). These agencies will provide free credit monitoring services for one year. OMIG has also set up a toll-free number for individuals to contact if they have questions about this situation: 1-855-809-7205. OMIG has a dedicated e-mail for people to use as well: security@omig.ny.gov. ;",{"entities":[[24,32,"ACTOR"],[104,135,"ACTION"],[238,326,"ACTION"],[333,341,"ACTOR"],[442,463,"ACTION"],[607,615,"ACTOR"],[1834,1841,"ACTION"]]}],["Veteran A's spouse requested Veteran A's records and was inadvertently given Veteran B's records. The spouse then gave them to the community physician. Upon discovery of the different records, the physician returned the records to the Veteran's spouse, who says they were torn up and thrown away. Veteran B's name and social security number was disclosed.;",{"entities":[[53,97,"ACTION"],[131,151,"ACTOR"],[341,355,"ACTION"]]}],["internal actor downloaded a trove of company documents about 40 gigabytes over a four-year period, including code;",{"entities":[[0,14,"ACTOR"],[15,54,"ACTION"]]}],["Confidential documents found at a waste disposal site. Documents were supposed to be buried but the contractor hired to dispose of the documents failed to do so.;",{"entities":[[0,22,"ASSETS"],[23,54,"ACTION"],[55,64,"ASSETS"],[100,110,"ACTOR"],[111,130,"ACTION"],[135,144,"ASSETS"],[145,161,"ACTION"]]}],["Lawyers working with Guantanamo Bay detainees had to pause their work after being told to stop using the Pentagon's computer system. An unspecified issue left over 500,000 emails unsafe to access or deleted from a Pentagon common drive. The breach left defense files unsecured and it may have been possible for prosecutors to view confidential defense emails.;",{"entities":[[76,100,"ACTION"],[116,124,"ASSETS"],[187,207,"ACTION"],[242,277,"ACTION"],[324,360,"ACTION"]]}],["Lombard Metals was duped into giving a spoofed client 136k dollars;",{"entities":[[15,53,"ACTION"]]}],["Personal details about hundreds of London-based research students were posted online in an apparent breach of data privacy laws. The University of Greenwich has apologised and said it is in the process of contacting those affected. The matter was brought to the BBC's attention by one of the students, who discovered the information could be found via a Google search. They also flagged the matter to the UK's data watchdog. The Information Commissioner's Office has confirmed that an investigation is under way. One legal expert warned there could be financial consequences. \"It does look as though there has been a significant breach of the Data Protection Act's obligations to process personal data securely, fairly and lawfully,\" said Ruth Boardman from the law firm Bird & Bird. \"[The university] may face enforcement action by the Information Commissioner (ICO) and claims by affected individuals. \"Under new rules due to be adopted in Brussels later in March, it would face a penalty of up to 10m euros [$11.2m; 7.8m].\" At present, the largest fine the ICO can impose is 500,000. Medical problems Students' names, addresses, dates of birth, mobile phone numbers and signatures were all uploaded to the university's website. They were posted alongside minutes from the university's Faculty Research Degrees Committee, which oversees the registrations and progress of its research students. In some cases, mental health and other medical problems were referenced to explain why students had fallen behind with their work. In one example, it was disclosed that a student had a brother who was fighting in a Middle Eastern army and references were made to an asylum application. Supervisors' comments about the students' progress were also documented. In some instances, copies of emails between university staff and individual students were also published. The university believes all the documents are now offline and has contacted Google to try to ensure cached copies of the documents cannot be retrieved from its search engine. \"I am very sorry that personal information about a number of postgraduate research students has been accessible on the university website,\" said Louise Nadal, the university's secretary. \"This was a serious error, in breach of our own policies and procedures. The material has now been removed. This was an unprecedented data breach for the university and we took action as quickly as possible, once the issue came to light. \"We are now acting urgently to identify those affected. I will be contacting each person individually to apologise and to offer the support of the university. \"At the same time, I am also conducting an investigation into what went wrong. This will form part of a robust review, to make sure that this cannot happen again. The findings and recommendations of the review will be published. \"We are co-operating fully with the Information Commissioner and we will take all steps necessary to ensure that we have the best systems in place for the future.\" The university was unable to say whether or not any of its staff were aware of the problem before it was contacted by both the BBC and the ICO on Monday. The watchdog confirmed that its investigation was at an early stage. \"We are aware of an incident at Greenwich University and are making enquiries,\" it said. 'Huge relief' The student who discovered the uploads has not revealed their identity. They said they welcomed the fact the documents had been made inaccessible. \"It's sad that it took an investigation by the BBC to get the documents off the internet,\" they said.;",{"entities":[[88,122,"ACTION"],[333,368,"ACTION"],[617,676,"ACTION"],[1222,1230,"ASSETS"],[1785,1791,"ASSETS"],[1841,1861,"ACTION"],[1894,1903,"ASSETS"],[1983,1992,"ASSETS"],[2167,2174,"ASSETS"],[2230,2249,"ACTION"],[2251,2280,"ACTION"],[2337,2369,"ACTION"],[3449,3458,"ASSETS"],[3549,3558,"ASSETS"]]}],[";",{"entities":[]}],["Medical records of 24 hospital patients have been found dumped in a bin in Coventry.;",{"entities":[[0,15,"ASSETS"],[40,71,"ACTION"]]}],["Undefined internal School District data was posted to a public forum and then erased after parents complained. Unknown everything except discovery method, assuming personal information data type.;",{"entities":[[35,68,"ACTION"],[73,110,"ACTION"]]}],["She had jabbed pencils into her eyes to try to kill herself. When the woman was brought to a Los Angeles County emergency room in 2012 alive and in pain, a hospital employee snapped a photograph, breaking a federal patient privacy law. Two years later, when that photograph appeared on a website that features gory images, the patients medical information had been shared publicly, violating a state regulation. The womans story is extreme, but her experience is an example of how her privacy was violated and her medical data breached. Both crimes, which are on the rise, can lead to identity theft or to misuse of information by health insurance companies, said Pam Dixon, executive director of the San Diego-based World Privacy Forum. The employee disclosed sensitive information about the patient inappropriately and then when the photograph was posted online and went viral, that constituted a data breach, Dixon said. That data breach is against the law. California state law requires hospitals to report breaches of patient medical data. The number of incidents investigated by the California Department of Public Health rose to 4,213 last year, or an 81 percent increase from 2009 when there were 2,333 cases.;",{"entities":[[157,174,"ACTOR"],[175,195,"ACTION"],[197,236,"ACTION"],[265,275,"ASSETS"],[276,323,"ACTION"],[358,382,"ACTION"],[384,413,"ACTION"],[488,508,"ACTION"],[517,539,"ACTION"],[588,602,"ACTION"],[609,630,"ACTION"],[634,660,"ACTOR"],[746,754,"ACTOR"],[755,786,"ACTION"],[839,849,"ASSETS"],[850,867,"ACTION"],[872,882,"ACTION"],[889,914,"ACTION"],[933,944,"ACTION"],[948,964,"ACTION"]]}],["anon group \"Raptor Swag\" hacking Chinese, \"China Chamber of International Commerce (CCOIC) Zhejiang Chamber of Commerce (ccpitzj.gov.cn)\" through SQLinjection. ;",{"entities":[[0,10,"ACTOR"],[12,23,"ACTOR"],[25,32,"ACTION"],[139,160,"ACTION"]]}],["Flight Centre says human error behind customer information leak;",{"entities":[[19,30,"ACTION"],[38,63,"ACTION"]]}],["We only recently were alerted that our Company was the victim of an illegal data security attack by sophisticated criminals between the dates of June 30 and July 4, 2013. Based on our ongoing review, we believe that the attackers gained access to the Ouidad customer database, compromising your Ouidad account information. It appears the attackers obtained or viewed information about one or more transactions you completed at Ouidad.com.;",{"entities":[[68,96,"ACTION"],[100,123,"ACTOR"],[220,229,"ACTOR"],[230,246,"ACTION"],[267,275,"ASSETS"],[338,347,"ACTOR"],[348,378,"ACTION"]]}],["Confidential legal aid details of a Bay man accused of breaching community work were mistakenly sent to a woman in a major privacy breach. The Katikati man's name, address and what his case was about were contained in a letter sent to a Tauranga mother who had applied for legal aid for her daughter. Private details of two other men from outside the region were also sent to the woman about their legal aid applications - the documents relate to legal representation at parole hearings. The woman contacted the Bay of Plenty Times yesterday, speaking on the basis that she was not named. She said she was \"horrified\" to discover the letters among documents sent to her by the Ministry of Justice's Legal Aid Office in Rotorua. The Bay of Plenty Times has sighted the letters. The letter addressed to a Katikati man confirmed his application for legal aid had been granted. The woman who received the documents said she had lodged a legal aid application for her daughter, over a drink-driving case. She learned by letter the application had been declined and put it aside. Last week, she discovered the three other letters. \"If it was just one letter, I probably wouldn't have thought anything more about it but there was three other people's private information and I know if it was me I would want to know my privacy has been breached and someone is held accountable for what's happened. \"I really thought, given all the other recent privacy breaches, government agencies would have upped their game and put in place stricter processes, so things like this don't happen.\" The 39-year-old Katikati man at the centre of the blunder said he was \"blown away\" when contacted last night: \"It's come as a huge shock and at the moment I don't know what I can do about the damage this has caused me, but I will be seeking some legal advice, for sure.\" The man's lawyer could not be contacted for comment. Porirua-based lawyer Mary More, who represents the other two men, said she would take instructions from her clients before commenting further. The latest case comes after a series of blunders involving privacy breaches by government departments, including Immigration NZ, ACC, the Ministry of Social Development, IRD, Environment Ministry and the Earthquake Commission. Last month an Earthquake Commission claims manager accidentally sent a spreadsheet containing 98,000 claimants' confidential details to an insurance advocate. In October, up to 700 Work and Income self-service kiosks were left unsecured, meaning private information was accessible to anyone who used them. Last night Justice Minister Judith Collins said protection of personal information must be taken seriously: \"We expect all agencies to treat such information carefully and respectfully. However, if someone receives information that is clearly not intended for them, then the appropriate thing to do is to give it back.\". Legal Aid Services general manager Michele McCreadie said it appeared a staffer had mistakenly included more than one letter in one envelope. The ministry had been alerted. Labour Party spokeswoman Sue Moroney, also its ACC spokeswoman, said: \"This Government proudly cut back office functions right across the public service and they wonder why privacy breaches and administration mistakes are happening on an almost daily basis.\";",{"entities":[[80,103,"ACTION"],[115,138,"ACTION"],[221,227,"ASSETS"],[228,235,"ACTION"],[360,377,"ACTION"],[429,438,"ASSETS"],[638,645,"ASSETS"],[681,731,"ACTOR"],[772,780,"ASSETS"],[786,792,"ASSETS"],[907,916,"ASSETS"],[1021,1027,"ASSETS"],[1122,1130,"ASSETS"],[1152,1158,"ASSETS"],[1445,1461,"ACTION"],[1634,1641,"ACTION"],[1772,1801,"ACTION"],[2084,2102,"ACTION"],[2113,2129,"ACTION"],[2133,2155,"ACTOR"],[2167,2181,"ACTOR"],[2183,2186,"ACTOR"],[2192,2222,"ACTOR"],[2224,2227,"ACTOR"],[2229,2249,"ACTOR"],[2258,2280,"ACTOR"],[2296,2317,"ACTOR"],[2325,2332,"ACTOR"],[2333,2350,"ACTION"],[2353,2364,"ASSETS"],[2500,2519,"ACTION"],[2529,2566,"ACTION"],[2796,2854,"ACTION"],[2984,2991,"ACTOR"],[2992,3053,"ACTION"]]}],["Patient A received a Medline Industries medical supply intended for Patient B. Patient B's name and type of medical supply was compromised. Patient A reported the incident to the medical center and a replacement has been requested for Patient B. Great Lakes Consolidated Mail Outpatient Pharmacy (CMOP) investigation concluded that this was a Medline packing error. The packing error has been reported to Medline for investigation and corrective action.;",{"entities":[[0,18,"ACTION"],[21,28,"ACTOR"],[40,54,"ASSETS"],[55,67,"ACTION"],[108,122,"ASSETS"],[123,139,"ACTION"],[343,350,"ACTOR"],[351,365,"ACTION"],[370,383,"ACTION"],[405,412,"ACTOR"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,46,"ACTOR"],[47,85,"ACTION"],[86,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[178,215,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The recent data breach at Adobe that exposed user account information and prompted a flurry of password reset emails impacted at least 38 million users, the company now says. It also appears that the already massive source code leak at Adobe is broadening to include the companys Photoshop family of graphical design products.;",{"entities":[[11,22,"ACTION"],[37,69,"ACTION"],[74,103,"ACTION"],[104,116,"ACTION"],[208,235,"ACTION"]]}],["An unauthorized peson gained access to part of our computer network that supports the websites we operate. Based on the investigation, we believe an unauthorized person may have been able to acquire a copy of the email addresses and account password, as well as the last four digits and expiration of the credit card used by the individuals who have logged in to the websites we operate. Although we do not store passwords in plain text, we believe the person has the ability to convert them to plain text.;",{"entities":[[3,21,"ACTOR"],[22,38,"ACTION"],[51,59,"ASSETS"],[60,67,"ASSETS"],[86,94,"ASSETS"],[150,169,"ACTOR"],[170,191,"ACTION"],[192,209,"ACTION"],[368,376,"ASSETS"],[455,461,"ACTOR"],[478,508,"ACTION"]]}],["The cardiac arrest leading to Joan Rivers' death happened as the comedian's personal doctor began performing a biopsy on her vocal cords, a source close to the death investigation told CNN. A staff member at Manhattan's Yorkville Endoscopy clinic told investigators that the doctor, who has not been publicly identified, took a selfie photo in the procedure room while Rivers was under anesthesia, the source said. Rivers, 81, was at the clinic for a scheduled endoscopy by another doctor, gastroenterologist Dr. Lawrence Cohen. That procedure, intended to help diagnose her hoarse voice and sore throat, involved the insertion of a camera down her throat. After Cohen, the clinic's medical director, finished his work, a biopsy was done on Rivers without her prior consent, according to the source. An ear, nose and throat specialist not certified by the clinic as required by law performed a biopsy on her vocal cords. The doctor is described by the source as Rivers' personal ear-nose-throat physician. Clinic: Vocal-cord biopsy did not kill Joan Rivers \"Even though you are a licensed physician, you still should have, if you will, the checks and balances to get your approval to practice in that particular place,\" said Dr. Arthur Caplan, a medical ethicist at New York University's Langone Medical Center. Investigators believe that Rivers' vocal cords began to swell during the allegedly unauthorized biopsy, cutting off the flow of oxygen to her lungs, which led to cardiac arrest on the morning of August 29, the source said. Rivers, 81, was rushed by paramedics from Yorkville Endoscopy to New York's Mount Sinai Hospital a mile away, where she died a week later. Yorkville Endoscopy issued a statement last Thursday denying reports that any vocal cord biopsy has ever been done at the clinic, although federal privacy law prevented any patient information from being released. The day after the denial was issued, the clinic confirmed that Dr. Cohen \"is not currently performing procedures... nor is he currently serving as medical director.\" The source said that at this time neither Cohen nor the ear, nose and throat doctor have been accused of wrongdoing by investigators. The clinic declined to respond to the source's comments about a biopsy or a selfie, citing federal privacy law.;",{"entities":[[271,281,"ACTOR"],[321,362,"ACTION"],[748,773,"ACTION"],[1386,1415,"ACTION"],[2162,2172,"ACTION"],[2267,2273,"ACTION"]]}],["A Jordanian hacker going with the handle of Evil-Jo has hacked and defaced the official website of Palestine Ministry of Justice.;",{"entities":[[2,18,"ACTOR"],[44,51,"ACTOR"],[56,62,"ACTION"],[67,74,"ACTION"],[88,95,"ASSETS"]]}],["A floppy disk containing the personal details of employees of Devon and Cornwall has been found at recycling centre. Data breached includes employee names, addresses, telephone numbers and rank. The floppy disk was in an obsolete computer that had been used by the force and had been sent for recycling. A spokesperson for Devon and Cornwall Police said, “Recycling old computers was a conscious decision taken by the force as part of an overall cost cutting exercise and hard drives are always wiped clean but it appears that on this occasion the floppy disk has been overlooked.\";",{"entities":[[2,13,"ASSETS"],[49,58,"ACTOR"],[81,116,"ACTION"],[118,131,"ACTION"],[201,212,"ASSETS"],[213,240,"ACTION"],[277,305,"ACTION"],[373,382,"ASSETS"],[475,486,"ASSETS"],[551,562,"ASSETS"],[563,583,"ACTION"]]}],["A SCOTTISH council has been fined £140,000 after repeatedly releasing sensitive information about vulnerable children and carers to the wrong people. Midlothian Council was guilty of five data protection breaches in as many months last year. It is the first local authority in Scotland to be fined by the Information Commissioner’s Office (ICO), which is calling for stronger auditing powers to detect other breaches. Midlothian has apologised and said staff have been subject to disciplinary proceedings, but insisted no-one was put at risk. In one instance, on 1 June, child protection minutes were sent to the former home of a mother’s partner, who had lived there in a previous relationship. “The commissioner understands that the former partner may have further disseminated this information to individuals in the wider local community,” the ICO report said.;",{"entities":[[2,18,"ACTOR"],[49,91,"ACTION"],[151,169,"ACTOR"],[189,213,"ACTION"],[421,431,"ACTOR"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,36,"ACTOR"],[47,61,"ACTION"],[67,85,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[178,215,"ACTION"]]}],["Misdelivery of banking information;",{"entities":[[0,35,"ACTION"]]}],["Employee was emailing back and forth with a patient regarding patient issues from her home computer. The Privacy Officer will speak to the employee involved ",{"entities":[[0,8,"ACTOR"],[9,41,"ACTION"],[91,100,"ASSETS"],[139,147,"ACTOR"]]}],["tomorrow to get the actual details.;",{"entities":[]}],["Phishing for W2s;",{"entities":[[0,16,"ACTION"]]}],[";",{"entities":[]}],["A VA Employee accessed her ex-husband's medical record.;",{"entities":[[2,13,"ACTOR"],[14,55,"ACTION"]]}],["Alabama Man Sentenced to Prison for Million Dollar Scheme Using Prisoner Identities to Obtain False Tax Refunds Harvey James was sentenced today to serve 110 months in prison for his role in a stolen identity refund fraud scheme, announced Assistant Attorney General Kathryn Keneally of the Justice Department's Tax Division and U.S. Attorney George L. Beck Jr. for the Middle District of Alabama. James previously pleaded guilty to one count of mail fraud and one count of aggravated identity theft on Oct. 25, 2013. James was also ordered to serve three years of supervised release and to pay $618,042 in restitution. Between January 2010 and 2012, James and his sister, Jacqueline Slaton, obtained stolen identities from various individuals, including one person who had access to inmate information from the Alabama Department of Corrections. James and others used those inmate names to file federal and state tax returns that claimed fraudulent refunds. James directed some of the false refunds to prepaid debit cards, and directed others to be issued in the form of a Treasury check. Vernon Harrison, a U.S. Postal Service employee, provided James with addresses from his postal route, which were used as mailing addresses for the fraudulent prepaid debit cards and state tax refund checks. Harrison collected the debit cards and checks and provided them to another individual, who in turn gave them to James and Slaton. In total, James filed over 1,000 federal and state income tax returns that claimed over $1 million in fraudulent tax refunds. Slaton was sentenced to serve 70 months in jail, and Harrison was sentenced to serve 111 months in jail. The case was investigated by Special Agents of the IRS - Criminal Investigation. Trial Attorneys Jason H. Poole and Michael Boteler of the Justice Departments Tax Division and Assistant U.S. Attorney Todd Brown prosecuted the case. Additional information about the Tax Division and its enforcement efforts may be found at the division website.;",{"entities":[[58,111,"ACTION"],[113,125,"ACTOR"],[194,229,"ACTION"],[400,405,"ACTOR"],[448,458,"ACTION"],[487,501,"ACTION"],[521,526,"ACTOR"],[656,661,"ACTOR"],[678,695,"ACTOR"],[697,723,"ACTION"],[853,858,"ACTOR"],[897,931,"ACTION"],[937,964,"ACTION"],[966,971,"ACTOR"],[972,1029,"ACTION"],[1035,1096,"ACTION"],[1098,1113,"ACTOR"],[1117,1145,"ACTOR"],[1156,1161,"ACTOR"],[1245,1275,"ACTION"],[1280,1304,"ACTION"],[1306,1314,"ACTOR"],[1315,1391,"ACTION"],[1418,1423,"ACTOR"],[1428,1435,"ACTOR"],[1447,1452,"ACTOR"],[1453,1458,"ACTION"],[1482,1506,"ACTION"],[1564,1570,"ACTOR"],[1617,1625,"ACTOR"]]}],["Cashier used handheld skimmer to capture payment card information.;",{"entities":[[0,7,"ACTOR"],[8,29,"ACTION"],[30,66,"ACTION"]]}],["Stolen laptop leads to potential data security breach in NY;",{"entities":[[0,6,"ACTION"],[7,13,"ASSETS"],[14,53,"ACTION"]]}],["Two men wanted for placing various skimmers on 711 gas pumps;",{"entities":[[0,7,"ACTOR"],[19,46,"ACTION"],[51,60,"ASSETS"]]}],["Malware discovered on a server containing personal and medical data.;",{"entities":[[0,7,"ACTION"],[24,30,"ASSETS"]]}],["The Ashland Police Department and Ashland County Sheriff's Office say skimming devices were discovered at three Ashland area gas stations. The skimming devices were uncovered at the Circle K stations at 1207 Claremont Avenue and 411 East Main Stree,t as well as the Easy Trip gas station on U.S. Route 250 East, just east of the Interstate-71 exit. An employee of the Ashland County Auditor's Office found the devices that were located inside a gas pump panel and not visible to the customer.;",{"entities":[[70,102,"ACTION"],[144,175,"ACTION"],[447,461,"ASSETS"],[466,494,"ACTION"]]}],["Government employee leaked classified documents.;",{"entities":[[0,19,"ACTOR"],[20,48,"ACTION"]]}],["A Headland police officer, Jason Carey Hughes, pleaded guilty in 2009 to using the Law Enforcement Tactical System database to look up the criminal background of a minor. Court records indicate Hughes believed the minor raped one of his relatives. If the minor was ever tried or convicted of rape, there's no publicly available court record of it. After Hughes was kicked off the police force, the former officer was also convicted of drug distribution.;",{"entities":[[2,25,"ACTOR"],[27,45,"ACTOR"],[115,123,"ASSETS"],[124,170,"ACTION"],[194,200,"ACTOR"],[398,412,"ACTOR"]]}],["Patient data accidentally faxed to a news station.;",{"entities":[[0,50,"ACTION"]]}],["Security researchers with vpnMentor recently discovered that retail consultancy firm Aliznet was leaking the data of 2.5 million Canadian Yves Rocher customers via an unsecured Elasticsearch database. The exposed data includes names, phone numbers, email addresses, dates of birth and postcodes. In addition, the researchers found six million customer orders on the leaky server. The orders mentioned a unique customer ID that made it possible to link them to clients in the database. The server also exposed detailed information about the business operations of Yves Rocher that could be of significant value to the cosmetic giant’s competitors.;",{"entities":[[93,113,"ACTION"],[191,200,"ASSETS"],[367,372,"ASSETS"],[373,380,"ASSETS"],[486,496,"ASSETS"],[497,530,"ACTION"]]}],["WTVM reports that a former Blue Cross Blue Shield customer service employee has pleaded guilty to filing false tax returns, wire fraud, and aggravated identity theft. Danielle Wallace admitted to filing 180 fraudulent tax returns and stealing nearly $500,000. The false returns used personal information obtained from Blue Cross Blue Shield members who had called the customer service number for assistance. The Ledger-Inquirer adds that Wallace filed the fraudulent tax documents between Jan. 1 and March 24, 2014, and used the customers' information through a tax-preparation business that she owned, Simple Cash 1.;",{"entities":[[67,75,"ACTOR"],[95,122,"ACTION"],[124,134,"ACTION"],[140,166,"ACTION"],[168,184,"ACTOR"],[194,230,"ACTION"],[235,260,"ACTION"],[443,450,"ACTOR"],[451,485,"ACTION"],[525,556,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Retailer Lakeland is warning customers of a potential data breach after a “sophisticated and sustained attack” last weekend that exploited a recently-identified Java flaw. The company has found that two encrypted databases were accessed, but so far it has been unable to find any evidence that the data has been stolen. hacked-binary-290x230-iSTOCK.jpg “However, we have decided that it is safest to delete all the customer passwords used on our site and invite customers to reset their passwords next time they visit the Lakeland site,” it told customers. The company has also advised customers that if the password they used for Lakeland is used for other sites and services, they should update the password for those accounts too.;",{"entities":[[54,65,"ACTION"],[74,110,"ACTION"],[129,171,"ACTION"],[214,223,"ASSETS"],[224,237,"ACTION"],[321,353,"ACTION"],[533,537,"ASSETS"]]}],["The research compliance officer conducted an audit of a research protocol and found that a signed HIPAA authorization was not in the study file for one patient. The patient submitted a letter to the facility indicating that he remembered signing the HIPAA authorization and that the research team must have misplaced the document. The document could not be located. Due to the full SSN being at risk, Veteran A will be sent a letter offering credit protection services.;",{"entities":[[302,316,"ACTION"],[321,330,"ASSETS"],[335,343,"ASSETS"]]}],["DeCicco;s grocery chain attacked for customers credit card information;",{"entities":[[24,32,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The February 27 theft of a computer resulted in the exposure of patient information.;",{"entities":[[16,21,"ACTION"],[27,35,"ACTION"],[52,84,"ACTION"]]}],[";",{"entities":[]}],[";",{"entities":[]}],["email sent identifying their email address;",{"entities":[[0,5,"ASSETS"],[6,42,"ACTION"]]}],["police files were leaked to the public, which revealed widespread monitoring of Muslims;",{"entities":[[7,12,"ASSETS"],[13,38,"ACTION"],[46,87,"ACTION"]]}],["Break-in results in stolen devices, which contained PII of current and former employees.;",{"entities":[[20,34,"ACTION"],[36,55,"ACTION"]]}],["Private health information for 6,000 patients was put in jeopardy when data was stolen from a server connected to Anthem Blue Cross Blue Shield of Indiana, Anthem Blue Cross Blue Shield of Ohio and Empire Blue Cross Blue Shield of Indiana.;",{"entities":[[46,65,"ACTION"],[71,86,"ACTION"],[94,100,"ASSETS"]]}],["Manduka had their e-commerce platform infected by malware affecting 9,616 users in February and once again in May.;",{"entities":[[18,37,"ASSETS"],[38,57,"ACTION"]]}],["ATM Skimmer;",{"entities":[[0,3,"ASSETS"],[4,11,"ACTION"]]}],["Veteran A called the Portland VAMC and stated he received a letter from his PCP's office, dated 7/18/2012, reporting recent lab results. He turned the page over and found Veteran Bs medical record information on the back side of the page. Included in this other patient's information was his full name, date of birth, full social security number and specific medical record information, which Veteran A provided to the employee who received the call. From the description, the other patient's information was not in letter form (i.e. test results) but actual printed CPRS medical records. The caller indicated Veteran Bs information was printed on 7/17/12 at 18:33. There is a single page note from a VA provider to Veteran B that was electronically signed on the indicated date and time.;",{"entities":[[60,66,"ASSETS"],[76,88,"ACTOR"],[165,208,"ACTION"],[633,647,"ACTION"],[731,759,"ACTION"]]}],["Ransomware;",{"entities":[[0,10,"ACTION"]]}],["Names, social security numbers and radiation exposure data for two employees who were in radiology were posted up in public hallway.;",{"entities":[[89,98,"ACTOR"],[99,132,"ACTION"]]}],[";",{"entities":[]}],["third party module updated;",{"entities":[]}],["FireEye has discovered a campaign leveraging the recently announced zero-day CVE-2013-3893. This campaign, which we have labeled Operation DeputyDog, began as early as August 19, 2013 and appears to have targeted organizations in Japan. FireEye Labs has been continuously monitoring the activities of the threat actor responsible for this campaign. Analysis based on our Dynamic Threat Intelligence cluster shows that this current campaign leveraged command and control infrastructure that is related to the infrastructure used in the attack on Bit9.;",{"entities":[[68,91,"ACTION"],[113,148,"ACTION"],[196,236,"ACTION"],[305,317,"ACTOR"],[440,484,"ACTION"],[535,541,"ACTION"]]}],["The Raley's supermarket chain warned customers Thursday that part of the company's computer network may have been targeted in a cyber attack. The company stated in a news release that it could not confirm if any unauthorized access had been made to payment card data, but that an internal investigation remains ongoing. However, the company said it did not believe that debit PINs could have been accessed.;",{"entities":[[83,99,"ASSETS"],[100,141,"ACTION"],[213,232,"ACTION"]]}],["BSNL gets hacked by the Pakistani hacker with the handle Ch3rn0by1. The Ch3rn0by1 hacker is a crew member of P4K M4D HUNT3RS hacking group. ;",{"entities":[[5,16,"ACTION"],[20,40,"ACTOR"],[57,67,"ACTOR"],[72,88,"ACTOR"],[92,139,"ACTOR"]]}],["Former Insurance Co. Employee Sentenced For Identity Theft (UPDATED) - Aetna;",{"entities":[[0,29,"ACTOR"],[44,58,"ACTION"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,36,"ACTOR"],[47,61,"ACTION"],[67,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[173,215,"ACTION"]]}],["Someone broke into Viator but there are no details as to how it happened;",{"entities":[[0,7,"ACTOR"],[8,18,"ACTION"]]}],["The Medical College of Wisconsin is contacting hundreds of people after a patient privacy breach. A spokesperson says a document containing private information on approximately 400 patients and a laptop with information on one patient were stolen. It happened when somebody broke into a doctor's car. The Medical College says no social security numbers or addresses were stolen and issued the following statement: \"The Medical College of Wisconsin is committed to safeguarding the privacy of our patients' healthcare information. Firm policies are in place prohibiting the downloading of patient information to portable media, as well as the secured transport of documents containing patient information. A violation of these policies occurred on February 15, 2015, resulting in the theft of a document containing private information on approximately 400 patients, as well as information stored on a laptop computer pertaining to one patient. We sincerely regret that this unfortunate event occurred. Impacted patients are being contacted and we have taken steps to prevent this type of event from reoccurring. We want to assure our community that the Medical College of Wisconsin takes incidents such as this very seriously and individuals who violate our privacy policies are subject to disciplinary action.\";",{"entities":[[74,97,"ACTION"],[121,129,"ASSETS"],[197,203,"ASSETS"],[236,248,"ACTION"],[267,275,"ACTOR"],[276,286,"ACTION"],[298,302,"ASSETS"],[617,631,"ASSETS"],[669,678,"ASSETS"],[713,754,"ACTION"],[774,799,"ACTION"],[802,810,"ASSETS"],[908,923,"ASSETS"]]}],["Veteran A received correspondence for Veteran B who has the same first & last name. The correspondence included the name, date of birth, social security number, home mailing address and telephone number. Veteran A returned the documents to the clinic.;",{"entities":[[10,37,"ACTION"],[240,251,"ACTOR"]]}],["A Devon doctors’ surgery that attempted to improve its service for patients has seen its efforts backfire after a newsletter was sent out with patients’ email addresses on display. The security breach affected around 1,000 patients of Pembroke House Surgery in Paignton on Tuesday afternoon. Following the administrative error, the surgery wrote to patients to apologise for any concern or inconvenience caused and to reassure them that no other details besides their email addresses had been divulged.;",{"entities":[[2,24,"ACTOR"],[114,124,"ASSETS"],[125,180,"ACTION"],[185,200,"ACTION"],[307,327,"ACTION"],[333,340,"ACTOR"],[469,484,"ASSETS"]]}],["Cone Health is notifying 2,076 patients of Southeastern Heart and Vascular Center about a very limited breach of patient information. A clerical error resulted in patient letters being sent to the wrong addresses. The letters named the patient, their doctor and the name of the practice they were seeing. None of the letters disclosed social security numbers, dates of birth or insurance information. Patients are being individually notified of the mix up. Cone Health regrets any confusion resulting from the incorrect mailing.;",{"entities":[[0,11,"ACTOR"],[103,133,"ACTION"],[137,151,"ACTION"],[172,179,"ASSETS"],[180,214,"ACTION"],[219,226,"ASSETS"],[288,305,"ACTION"],[319,326,"ASSETS"],[452,459,"ACTION"],[460,471,"ACTOR"],[513,531,"ACTION"]]}],["Taipei employees’ financial data leaked;",{"entities":[[18,39,"ACTION"]]}],["Sears improperly disposes of employee records. Sold at liquidation sale.;",{"entities":[[6,46,"ACTION"],[47,72,"ACTION"]]}],["Two patients ran a google search of their names and were able to find their medical information online. Doctors' reports with medications, medical treatments, lab information, future and past treatment plans, physical examination information, and lifestyle information could be downloaded by anyone who found the information online. The documents were from November 2012 through January 2013 and discovered online in mid-March. Portal Healthcare secured the sensitive information on its servers on March 14. A lawsuit was filed against Glens Falls Hospital, Portal Healthcare Solutions LLC, and Carpathia Hosting in mid-April for patient privacy violations.;",{"entities":[[13,32,"ACTION"],[52,103,"ACTION"],[270,299,"ACTION"],[304,333,"ACTION"],[339,348,"ASSETS"],[490,497,"ASSETS"],[540,560,"ACTOR"],[562,593,"ACTOR"],[599,616,"ACTOR"]]}],["Incident associated with Miniduke campaign.;",{"entities":[[25,43,"ACTION"]]}],[";",{"entities":[]}],["A dishonest nurse and three co-conspirators were linked to medical identity fraud after she posted details about the fraud on a social media account. The ring had been active since 2004 and had brought in $675,000 over the past five years. The nurse had been fired from South Shore Physicians after falsifying her work hours. The co-conspirators face at least 64 counts related to fraud, falsifying records, and theft.;",{"entities":[[2,17,"ACTOR"],[22,43,"ACTOR"],[59,81,"ACTION"],[92,149,"ACTION"],[242,251,"ACTOR"],[301,327,"ACTION"],[333,348,"ACTOR"],[381,389,"ACTION"],[391,409,"ACTION"],[415,421,"ACTION"]]}],["On August 5, 2015, the offices of Max M. Bayard, MD PC were broken into and computer devices were stolen. As soon as the theft was discovered, we notified law enforcement and are cooperating with their investigation. Immediately after the break-in, we began an investigation to determine what information was on the devices. While the information on the devices varies by person, we were able to determine that patients' names, Social Security numbers, and other limited treatment-related information may have been on the devices. Although the treatment-related information varies by person, examples include dates of birth, Medicare/Medicaid enrollment information, dates of treatment, types of treatment, and diagnoses. We take the privacy and security of the information in our possession very seriously and are cooperating with law enforcement personnel in their investigation. We deeply regret these circumstances and are committed to keeping impacted individuals informed. We mailed a letter to each individual potentially impacted by this event, explaining the details and providing a toll free number to assist those who have questions. Although we are not aware of any misuse of any information, as an added precaution, we are offering at no cost to impacted individuals access to credit monitoring and identity theft resolution services through AllClear ID. We value the privacy and security of our patients' information, and have taken steps to prevent this type of event from happening again, including changing the firewall password, all software-related, login, and email account passwords, installing security cameras, securing the computers in a safe when not in use, encrypting all computers, and reviewing policies and procedures for the secure storage of personal information. Our staff is being trained on these additional safeguards.;",{"entities":[[55,71,"ACTION"],[76,92,"ASSETS"],[93,105,"ACTION"],[122,127,"ACTION"],[318,326,"ASSETS"],[357,364,"ASSETS"],[525,533,"ASSETS"]]}],["A computer system employee of Bank Sarasin turned himself into police 1 January, it was revealed late Tuesday, after sharing documents linked to currency transactions made by the family of Philipp Hildebrand, chairman of the Swiss National Bank. The documents were given to an attorney who is close to the UDC, Switzerland’s right-wing People’s Party. The employee, who was promptly fired by the bank says the lawyer made an appointment to meet Christoph Blocher 11 November. Blocher is a former leader of the UDC who was a member of the Swiss government until 2007.;",{"entities":[[18,26,"ACTOR"],[117,124,"ACTION"],[125,134,"ASSETS"],[142,174,"ACTION"],[253,262,"ASSETS"],[263,276,"ACTION"],[359,367,"ACTOR"]]}],["McDonald's employee is being investigated for fraud after it was found he was allegedly card skimming.;",{"entities":[[11,19,"ACTOR"],[46,51,"ACTION"],[78,102,"ACTION"]]}],["Orange Community MRI in New Jersey notified HHS of a breach involving their business associate, Vcarve LLC, who does business as MD Manage. The breach tool entry indicates that 585 patients were affected by a breach on April 6, 2014 that involved Unauthorized Access/Disclosure of data on their Network Server. ;",{"entities":[[53,59,"ACTION"],[76,94,"ACTOR"],[96,106,"ACTOR"],[209,215,"ACTION"],[247,285,"ACTION"],[295,310,"ASSETS"]]}],["CVS pharmacy settled a case in which the attorney general's office alleged that they had been caught dumping patient health information documents in publicly open dumpsters. They settled the suit with a fine of $250,000 US. ;",{"entities":[[0,12,"ACTOR"],[85,173,"ACTION"]]}],["documents found in dumpster;",{"entities":[[0,9,"ASSETS"],[10,27,"ACTION"]]}],["User sent email with personnel action out unencrypted. One of the recipients was chosen incorrectly from the global address list and the mail was sent instead to an individual working with the Navy Department on detachment to the VA at an outside facility. The mail was recalled and all other recipients were within the VISN 16 encrypted connections.;",{"entities":[[0,4,"ACTOR"],[5,9,"ACTION"],[10,15,"ASSETS"],[77,104,"ACTION"],[137,141,"ASSETS"],[142,161,"ACTION"],[261,265,"ASSETS"]]}],["medical records given to wrong person;",{"entities":[[0,15,"ASSETS"],[16,37,"ACTION"]]}],["A Pennsylvania nurse last week admitted to secretly filming multiple female patients, including a teenage girl, while they were undressed and in his care.;",{"entities":[[0,20,"ACTOR"],[40,84,"ACTION"],[112,154,"ACTION"]]}],["A laptop was stolen from an employee's car on or around December 10. APG employees may have had their names, Social Security numbers, bank account information, and other information exposed. ;",{"entities":[[2,8,"ASSETS"],[9,19,"ACTION"],[39,42,"ASSETS"],[183,191,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The hacker used a proxy computer internet protocol (IP) server to hack into the hotel's computer and demanded $400 to unlock it.;",{"entities":[[4,10,"ACTOR"],[56,62,"ASSETS"],[66,70,"ACTION"],[88,96,"ASSETS"],[101,128,"ACTION"]]}],["stolen confidential documents from home;",{"entities":[[0,19,"ACTION"],[20,29,"ASSETS"]]}],["Ransomware attackers wanted $80,000 from York Animal Hospital. They won't pay.;",{"entities":[[0,20,"ACTION"]]}],["Theft of a desktop computer exposes 1200 records.;",{"entities":[[0,5,"ACTION"],[11,27,"ASSETS"],[28,49,"ACTION"]]}],["Hackers demanded a ransom from two more Southern California hospitals last week and federal authorities are investigating the case. Prime Healthcare Services Inc., a fast-growing national hospital chain, said the attackers infiltrated computer servers on Friday at two of its California hospitals, Chino Valley Medical Center in Chino and Desert Valley Hospital in Victorville. The company said the cyberattack had not affected patient safety or compromised records on patients or staff. Two sources familiar with the investigation said the hackers had demanded a ransom to unlock the hospital computer systems, similar to what happened last month at Hollywood Presbyterian Medical Center in Los Angeles. Hollywood Presbyterian said it paid $17,000 in bitcoin to hackers to regain access to the institution's computers. Fred Ortega, a spokesman for Prime Healthcare, declined to comment on whether Prime received a ransom demand or paid any money, citing the ongoing investigation. \"This is similar to challenges hospitals across the country are facing, and we have taken extraordinary steps to protect and expeditiously find a resolution to this disruption,\" Ortega said. \"The concern now is to let law enforcement do their thing and find the culprit.\" FBI spokeswoman Laura Eimiller said Tuesday \"we are investigating a compromise of the network at these locations.\" She declined to discuss specifics of the case. The FBI also has been investigating the attack at Hollywood Presbyterian. Ortega said the two hospitals affected remain operational and steps are being taken to restore their computer systems to full functionality. He said some IT systems were shut down by hospital staff as a preventive measure so malicious software didn't spread further. hacker-computer-code-e1458648376542The company said it's working with data security experts and the California Department of Public Health on the matter. Prime Healthcare, based in Ontario, Calif., has acquired struggling hospitals across the country and has become one of the nation's largest health systems. It runs 42 hospitals in 14 states. The company is led by its outspoken chairman and chief executive, Dr. Prem Reddy. A series of high-profile data breaches in the past year have raised fresh questions about the ability of hospitals, health insurers and other medical providers to safeguard the vast troves of electronic medical records and other sensitive data they are stockpiling on millions of Americans.;",{"entities":[[0,7,"ACTOR"],[8,25,"ACTION"],[214,223,"ACTOR"],[224,235,"ACTION"],[236,252,"ASSETS"],[401,412,"ACTION"],[544,551,"ACTOR"],[552,583,"ACTION"],[597,613,"ASSETS"],[766,773,"ACTOR"],[812,822,"ASSETS"],[919,932,"ACTION"],[1346,1353,"ASSETS"],[1462,1468,"ACTION"],[1598,1614,"ASSETS"],[1722,1740,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Misconfigured DB exposed Passport numbers, credit card data;",{"entities":[[0,13,"ACTION"],[14,16,"ASSETS"],[17,59,"ACTION"]]}],["Documents on a network storage device were left unencrypted and available on the network for a month and a half. The device had been decrypted and reset to factory settings in order to troubleshoot a problem. It would only be accessed on the internal network. It contained student loan documents from students who attended MSU in 2006. The information included names, DOB, SSN. ;",{"entities":[[0,9,"ASSETS"],[15,37,"ASSETS"],[38,59,"ACTION"],[64,88,"ACTION"],[118,124,"ASSETS"],[125,143,"ACTION"],[148,173,"ACTION"],[174,209,"ACTION"]]}],["A binder containing Veteran PII from a research project dating back to 1991 was found by a visitor in an open unsecured closet located in a construction zone outside of the campus GI clinic. The information contained information from three separate hospitals that participated in the project, including VA.;",{"entities":[[2,8,"ASSETS"],[76,98,"ACTION"]]}],["Stolen Blue Ridge Surgery Center laptop was encrypted, but password was with it. employee's encrypted work laptop had been stolen during a break-in at the employee's residence that same day. The employee reported the theft to law enforcement and we immediately began our own investigation. Our investigation determined that the password was with the laptop at the time of the theft, and the laptop contained email files that may have included patients' names, addresses, treatment information and health insurers' names, identification numbers and in some instances, Social Security numbers.;",{"entities":[[0,6,"ACTION"],[33,39,"ASSETS"],[108,114,"ASSETS"],[115,130,"ACTION"],[140,148,"ACTION"],[218,223,"ACTION"],[351,357,"ASSETS"],[377,382,"ACTION"],[392,398,"ASSETS"]]}],["The gains and losses sheet up on the 7th floor went missing. It is unknown whether this was placed in the trash, shred bin, or taken by someone.;",{"entities":[[21,26,"ASSETS"],[47,60,"ACTION"],[88,111,"ACTION"],[113,122,"ACTION"],[127,132,"ACTION"],[136,144,"ACTOR"]]}],["A staff member witnessed his co-worker accessing her ex-spouses CPRS record. This affects one veteran.;",{"entities":[[29,38,"ACTOR"],[39,76,"ACTION"]]}],["had their payment card information stolen by hackers in the last several months;",{"entities":[[0,41,"ACTION"],[45,52,"ACTION"]]}],["On April, 1, 2013, a laptop and ten patient files were stolen during a car break - in. The patient files were subsequently recovered. However, information regarding some patients of Orthopedic Physician Associates , a division of Proliance Surgeons, may have been compromised by this theft. Sensitive information, including name, address, telephone number, social security number, name of provider, health insurance information and the reason for the patient’s appointment was included in emails stored in the laptop’s cache file. ;",{"entities":[[21,27,"ASSETS"],[44,49,"ASSETS"],[50,86,"ACTION"],[99,104,"ASSETS"],[251,276,"ACTION"],[280,291,"ACTION"]]}],["An unauthorized individual accessed the network of a BAR service provider between May 2012 and March 2013. The bank routing information of Smog Check stations licensed with the BAR was exposed. Those who may have had their accounts accessed are encouraged to close their old accounts and open new accounts with new PINs or passwords.UPDATE (07/11/2013): Approximately 7,500 Smog Check stations had bank account and routing numbers associated with the businesses exposed.;",{"entities":[[3,26,"ACTOR"],[27,35,"ACTION"],[40,47,"ASSETS"],[182,194,"ACTION"],[453,472,"ACTION"]]}],["Police in South Korea have reportedly arrested two people for hacking into the network of KT Corp., the country's second largest mobile carrier and selling the data. According to a report by the Yonhap News Agency, police arrested a 40-yeard-old suspect identified only by his family name of Choi as well as a second person and accused them of leaking the personal information of roughly 8.7 million mobile phone subscribers since February. ;",{"entities":[[47,57,"ACTOR"],[62,69,"ACTION"],[79,86,"ASSETS"],[346,381,"ACTION"]]}],["Unauthorized access exposes 10000 records.;",{"entities":[[0,42,"ACTION"]]}],["Financial data from some the world’s biggest companies – including Porsche, Oracle, Toshiba and more – has been stolen and published in a ransomware attack on the large, Germany-based IT provider Citycomp.;",{"entities":[[103,118,"ACTION"],[123,135,"ACTION"],[138,155,"ACTION"]]}],["A couple of weeks ago Dropbox hired some \"outside experts\" to investigate why a bunch of users were getting spam at e-mail addresses used only for Dropbox storage accounts. The results of the investigation are in, and it turns out a Dropbox employee's account was hacked, allowing access to user e-mail addresses. In an explanatory blog post, Dropbox today said a stolen password was \"used to access an employee Dropbox account containing a project document with user email addresses.\" Hackers apparently started spamming those addresses, although there's no indication that user passwords were revealed as well. Some Dropbox customer accounts were hacked too, but this was apparently an unrelated matter. \"Our investigation found that usernames and passwords recently stolen from other websites were used to sign in to a small number of Dropbox accounts,\" the company said. Dropbox noted that users should set up different passwords for different sites. The site is also increasing its own security measures. In a few weeks, Dropbox said it will start offering an optional two-factor authentication service. This could involve users logging in with a password as well as a temporary code sent to their phones. That 2012 Dropbox hack that recently led to additional password resets? The 2012 hack reportedly affected 68,680,741 accounts. And maybe someone can explain why in 2016 we're all first finding out the scope of older breaches like this one and LinkedIn, Tumblr, and MySpace, to name just some. Were people not putting hacked data up for sale for years while they misused it? The breached companies often said there was no evidence of real misuse. So why were these data not on the black market and just collecting cyberdust until now?;",{"entities":[[95,112,"ACTION"],[116,122,"ASSETS"],[260,270,"ACTION"],[272,313,"ACTION"],[365,380,"ACTION"],[385,428,"ACTION"],[442,458,"ASSETS"],[487,494,"ACTOR"],[514,538,"ACTION"],[645,660,"ACTION"],[770,776,"ACTION"],[788,796,"ASSETS"],[797,817,"ACTION"],[950,956,"ASSETS"],[961,965,"ASSETS"]]}],["An eOPF document regarding employee As performance award was inappropriately uploaded in employee Bs eOPF. Human Resources was notified by employee A and took action to correct the error.;",{"entities":[[3,16,"ASSETS"],[57,85,"ACTION"],[181,187,"ACTION"]]}],["A laptop stolen from a local surgeon traveling in Argentina contained the personal information of about 1,100 patients, the Washington University medical school announced today.;",{"entities":[[2,8,"ASSETS"],[9,15,"ACTION"]]}],["LAKEVILLE, Minn.-Christopher Endicott, the suspended Lakeville middle school principal previously accused of felony burglary and stalking, was charged Friday, June 8, with four more crimes. Endicott now is accused of stealing personal and financial information from employees of the Rosemount-Apple Valley-Eagan school district, their family members and others.;",{"entities":[[11,37,"ACTOR"],[109,124,"ACTION"],[129,137,"ACTION"],[191,199,"ACTOR"],[218,261,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Massachusetts Mutual Life Insurance Company and its subsidiaries (MassMutual) understand the importance of protecting the privacy and security of information about our customers, and take seriously our obligations to protect this information. This is to inform you of an incident involving the inadvertent disclosure of information about you and your retirement plan. On December 3, 2013, a MassMutual retirement services account manager sent a secure email to an individual at a MassMutual retirement services client. However, the account manager inadvertently included information about you and your retirement plan in that message to the other MassMutual client. The individual who received the information in error was contacted by MassMutual and confirmed to MassMutual both verbally and in writing that the email and the information received in error was deleted. We have conducted an investigation into the incident to determine the extent and its impact on our customers. We have determined that the information provided to the other MassMutual client did contain personal identifying information, including your name, address, date of birth, Social Security number, and your retirement plan name and group number. MassMutual employees are instructed to safeguard client information. However, even after taking reasonable steps to protect confidential information, a security breach may occur. When we are informed of such situations, we investigate the matter and take appropriate corrective action. Based on the particular circumstances of this incident, we have no indication that your personal information has been or will be subject to misue or further disclosure. However, in an effort to provide you with additional protection for your personal and credit information, MassMutual has arranged with Equifax Personal Solutions to provide you with a free two year subscription for Equifax Credit WatchTM Gold with 3-in-1 Monitoring and Credit Report Control. A description of this product and enrollment instructions are enclosed. The promotion code to activate the product is located at the top of the enrollment instructions. Also, please note that this code is valid for 60 days. We would like to bring to your attention various steps you may want to consider taking to protect yourself against the possibility of identity theft.;",{"entities":[[0,43,"ACTOR"],[306,331,"ACTION"],[391,401,"ACTOR"],[422,437,"ACTOR"],[452,457,"ASSETS"],[532,547,"ACTOR"],[548,588,"ACTION"],[710,718,"ACTION"],[736,746,"ACTOR"],[764,774,"ACTOR"],[813,818,"ASSETS"],[848,856,"ACTION"],[1223,1233,"ACTOR"],[1784,1794,"ACTOR"]]}],["Purdue University is tracking down more than 26,000 prospective students to alert them that their names, birthdays, and Social Security numbers were inadvertently sent to the parent of one student applicant.;",{"entities":[[144,170,"ACTION"]]}],[";",{"entities":[]}],["Original Medicine Acupuncture & Wellness, LLC of New Mexico reported that 540 patients had PHI on laptops stolen in an office burglary on September 7, 2012. I was able to locate a copy of their media notice.;",{"entities":[[98,105,"ASSETS"],[106,112,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["A binder containing patient data was stolen.;",{"entities":[[2,8,"ASSETS"],[9,44,"ACTION"]]}],["Employee stole debit card and account information from two elderly guests of Kindred Transitional Care in Glendora to purchase items for himself online, including furniture, Nike tennis shoes and car parts;",{"entities":[[0,8,"ACTOR"],[9,14,"ACTION"],[15,25,"ASSETS"],[115,151,"ACTION"]]}],["Middle school student accesses file that contained personal information of employees. During a data transfer process a folder was left \"open\" that made the file accessible to anyone on the school network.;",{"entities":[[0,21,"ACTOR"],[22,85,"ACTION"],[86,116,"ACTION"],[119,125,"ASSETS"],[126,141,"ACTION"],[156,160,"ASSETS"]]}],["E-mail database of GPS review forum compromised via unknown method.;",{"entities":[[0,6,"ASSETS"],[7,15,"ASSETS"],[36,67,"ACTION"]]}],["A former patient of Lee Memorial Hospital says he will sue the health center after an employee photographed him recovering from life-threatening injuries from a motorcycle crash. The attorney for that patient, Dylan Meracle of Cape Coral, notified the hospital and its operator, Lee Health, of the pending lawsuit this week. In Florida, a plaintiff needs to file an intent to sue notice before filing suit against a government agency. Meracle lost his left arm in the July crash, suffered two broken legs and spent three weeks in an induced coma at the hospital, he told WINK News. He said a stranger, claiming to be a friend of a hospital nurse, sent him photos of his recovery.;",{"entities":[[86,94,"ACTOR"],[95,111,"ACTION"],[658,664,"ASSETS"]]}],["Users of Spartanburg County Public Libraries were unable to check out or return books for a second day Tuesday after a ransomware attack sent out by cybercriminals shut down the library system’s computer network and website.;",{"entities":[[45,69,"ACTION"],[119,136,"ACTION"],[149,163,"ACTOR"],[164,185,"ACTION"],[186,194,"ASSETS"],[195,203,"ASSETS"],[204,211,"ASSETS"],[216,224,"ASSETS"]]}],["Employee requested sensitive patient access report as he believes a colleague was in his medical record. There was an inappropriate access, though it is not clear if the employee requested the other employee to access the record or not. A HIPAA notification letter will",{"entities":[[0,8,"ACTOR"],[9,50,"ACTION"],[107,140,"ACTION"]]}],["be sent.;",{"entities":[]}],["Private personal information of potentially thousands of people was unintentionally available on public access computers ;",{"entities":[[64,110,"ACTION"],[111,120,"ASSETS"]]}],["Employee shared X-Ray of patients on social media ;",{"entities":[[0,8,"ACTOR"],[9,15,"ACTION"],[16,21,"ASSETS"],[37,49,"ASSETS"]]}],["external actor uses spearphishing to entice a user to click a link and download malware.;",{"entities":[[0,14,"ACTOR"],[15,36,"ACTION"],[37,66,"ACTION"],[71,88,"ACTION"]]}],["MCG Health had their infrastructure compromised by unknown external actor which impacted 10 hospitals;",{"entities":[[21,35,"ASSETS"],[36,47,"ACTION"],[51,73,"ACTOR"]]}],["Hackers breach website and post non-public information.;",{"entities":[[0,7,"ACTOR"],[8,14,"ACTION"],[15,22,"ASSETS"]]}],["March 27, 2020·6 min read LAKEWOOD, N.J., March 27, 2020 /PRNewswire/ -- Center for Health Education, Medicine & Dentistry (\"CHEMED\") is providing notice of an incident that may affect the security of some of its patients' personal information. While CHEMED currently has no indication that patient information has been misused in relation to this incident, CHEMED is providing information on the incident, measures it has taken, and what individuals may do to better protect their personal information should they feel it appropriate to do so. On March 27, 2020, CHEMED began mailing written notice to patients it determined were impacted by this incident. CHEMED also posted notice of the incident on its website at https://www.chemedhealth.org/images/website-notice.pdf. CHEMED uses a third-party Radiology imaging system (Konica) to send and store its studies to Radiologists to read. On December 10, 2019, CHEMED was notified that many Radiology providers across the Country had possibly been vulnerable to a potential opening which could allow unauthorized access to patient information. Working with outside computer forensics specialists, CHEMED commenced an investigation to determine the full extent of the issue. On February 20, 2020, the investigation determined that the vulnerability existed between July 28, 2015 and December 10, 2019. Although there were attempted unauthorized connections to the server from the public internet during that time period, CHEMED was unable to determine whether those connections were successful and specific patient records were actually subject to unauthorized access. CHEMED is therefore providing impacted patients with notice of this incident in an abundance of caution. The following types of patient information were determined to be at risk for possible unauthorized access: patient name, procedure date, patient date of birth, patient ID, exam ID, physician's name, and medical organization name (CHEMED).;",{"entities":[[157,244,"ACTION"],[311,327,"ACTION"],[707,714,"ASSETS"],[1039,1094,"ACTION"],[1382,1406,"ACTION"],[1414,1420,"ASSETS"]]}],["ATM skimmer;",{"entities":[[0,3,"ASSETS"],[4,11,"ACTION"]]}],["The facility Administrator on Duty (AOD) called the PO at approximately 8:10 a.m. and stated that Patient A presented for check-in for a Podiatry consult. Patient A stated he had been seen in the ER on Saturday but the medications listed on the sheet he was given from the ER were incorrect. The AOD then checked Patient A's ER sheet and discovered it was actually a progress note that belonged to Patient B and contained Patient B's name, social security number, date of birth and medical information.;",{"entities":[[245,250,"ASSETS"],[276,291,"ACTION"],[328,333,"ASSETS"],[352,397,"ACTION"]]}],["Computer equipment was stolen that resulted in one person's personal information being compromised. ;",{"entities":[[0,18,"ASSETS"],[19,29,"ACTION"],[60,99,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Stolen laptop. ;",{"entities":[[0,6,"ACTION"],[7,14,"ASSETS"]]}],["CoinWallet shut down after hacking;",{"entities":[[11,34,"ACTION"]]}],["hit with ransomware on several of its computers recently;",{"entities":[[0,3,"ACTION"],[9,19,"ACTION"],[38,47,"ASSETS"]]}],[";",{"entities":[]}],["At 3:12 PM Thursday, Trooper Adam Mcbeth responded to the Chuckles Gas Station on Broadway Street in Loogootee. Employees reported that two skimming devices had been removed from their gas pumps.;",{"entities":[[140,156,"ACTION"],[157,178,"ACTION"],[185,195,"ASSETS"]]}],["former employee of an IT firm has been booked for allegedly stealing data from that company and selling it to industry competitors;",{"entities":[[0,15,"ACTOR"],[50,73,"ACTION"],[96,130,"ACTION"]]}],["On 04/22/13 a Veteran and the Veteran's wife reported that they received medical record information in error. The information was released by VA in error. In",{"entities":[[59,109,"ACTION"],[148,154,"ACTION"]]}],["addition, the information released was records that VA was maintaining from a fee-based facility.",{"entities":[]}],["Incident Update",{"entities":[]}],["04/22/13:",{"entities":[]}],["Due to full SSN and medical information being exposed. Veteran B will be sent a letter offering credit protection services.;",{"entities":[[20,54,"ACTION"]]}],["international atm skimmer;",{"entities":[[14,17,"ASSETS"],[18,25,"ACTION"]]}],["Old documents for Lakeshore Mental Health patients were found at the doorstep of an abandoned building. A location where these files were stored had been vandalized in 2012, and it is suspected that they were stolen at that time.;",{"entities":[[4,13,"ASSETS"],[51,103,"ACTION"],[127,132,"ASSETS"],[145,164,"ACTION"],[204,215,"ACTION"]]}],["Actors used email accounts of leaders to instruct \"financial personnel\" at the headquarters to initiate [fraudulent] money transfers/transactions.;",{"entities":[[0,6,"ACTOR"],[7,26,"ACTION"],[92,146,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["E-commerce website compromised and payment card information stored unencrypted compromised along with it.;",{"entities":[[11,18,"ASSETS"],[19,30,"ACTION"],[35,78,"ACTION"],[79,105,"ACTION"]]}],["Theft of a desktop computer exposes 3269 records.;",{"entities":[[0,5,"ACTION"],[11,27,"ASSETS"],[28,49,"ACTION"]]}],["Unknown hack, customers notified.;",{"entities":[[0,12,"ACTION"]]}],[";",{"entities":[]}],["Emory University System Center Server accidentally sends out a command to all workstations and servers to format themselves and install Windows 7. By the time the error was discovered even the SCCM server itself had formatted itself.;",{"entities":[[38,73,"ACTION"],[78,90,"ASSETS"],[95,102,"ASSETS"],[103,123,"ACTION"],[128,146,"ACTION"],[198,204,"ASSETS"],[212,233,"ACTION"]]}],["XSS attack on Uber poll.;",{"entities":[[0,10,"ACTION"]]}],["Two Veterans were given each other's information. The documents contained the Veterans' full name, full SSN and address. The mistake was noted a few minutes afterwards while the two were still at the clinic.;",{"entities":[[0,12,"ACTOR"],[13,49,"ACTION"],[54,63,"ASSETS"],[125,132,"ACTION"]]}],["On February 19, 2009, OCR notified the Covered Entity of its initiation of an investigation of a complaint alleging that the Covered Entity had impermissibly disclosed electronic protected health information (ePHI) by making it publicly available on the Internet. From July 3, 2007 until February 6, 2009, Covered Entity posted over 1,000 separate entries of ePHI on a publicly accessible, Internet-based calendar;",{"entities":[[39,53,"ACTOR"],[125,139,"ACTOR"],[140,207,"ACTION"],[215,263,"ACTION"],[307,321,"ACTOR"],[322,328,"ACTION"]]}],["Hackers using the handles HeRoTurk and Ajanlar.org today have posted to pastebin a small list of 8 websites that have been breached and left with a new file named, x.htm. The websites that have been defaced are all government websites and appear to be on shared hosting in the cook islands. The breached sites belong to the Ministry of Internal Affairs, Ministry of Cultural Development, Ministry of Foreign Affair, Cook Islands Investment Corporation, Business Trade Investment Board, Ministry of Agriculture and Ministry of Transport.;",{"entities":[[0,7,"ACTOR"],[26,34,"ACTOR"],[39,50,"ACTOR"],[57,93,"ACTION"],[99,107,"ASSETS"],[113,131,"ACTION"],[136,170,"ACTION"],[175,183,"ASSETS"],[189,206,"ACTION"],[226,234,"ASSETS"],[295,303,"ACTION"],[304,309,"ASSETS"]]}],["Officials said the security breach, which happened on June 6, prompted an internal review and the discovery of a second breach in 2012 in which less detailed information about more than 6,000 patients was mistakenly sent to job applicants. In both cases, the files were sent as training files to evaluate the skills of job applicants, Rady officials said. The investigation revealed that a similar breach happened in August, November and December of 2012, when an employee mailed a file containing information on 6,307 patients to three job applicants as part of the evaluation process. That file had less information and did not include dates of birth, diagnoses, street addresses, or social security, insurance or credit card numbers. The hospital plans to notify the patients involved as soon as possible, Metcalf said.;",{"entities":[[19,34,"ACTION"],[120,126,"ACTION"],[201,223,"ACTION"],[259,264,"ASSETS"],[265,274,"ACTION"],[399,405,"ACTION"],[465,473,"ACTOR"],[474,482,"ACTION"],[483,487,"ASSETS"],[593,597,"ASSETS"]]}],["Thousands of people have had their private data publically exposed, after hackers reportedly got into a server at UNC’s Lineberger Cancer Center. The Chapel Hill News reports that the victims found out shortly after Christmas, when center director Dr. Shelley Earp sent out letters of apology; center employees found out about the breach last spring. The incident affected about 3,500 individuals, exposing information such as their Social Security and passport numbers. In the letter, Earp told the victims that authorities have no way to know whether the data will be misused. The situation reportedly didn’t involve any patient information, although it did involve a small number of people who were subjects in research projects.;",{"entities":[[35,66,"ACTION"],[74,81,"ACTOR"],[104,110,"ASSETS"],[332,338,"ACTION"],[400,428,"ACTION"]]}],["The March 20 loss of paper records may have exposed the information of patients. ZDI lost the records of their associate Delta Dental of Pennsylvania.;",{"entities":[[13,17,"ACTION"],[21,34,"ASSETS"],[35,80,"ACTION"],[81,84,"ACTOR"],[85,101,"ACTION"]]}],["Partner-administered web application / database was misconifgured in such a way that PII was publicly available and searchable. 506 employees' PII was at risk.;",{"entities":[[0,20,"ACTOR"],[21,36,"ASSETS"],[39,47,"ASSETS"],[48,65,"ACTION"],[69,111,"ACTION"],[116,159,"ACTION"]]}],["Without the victim's knowledge or consent, and in violation of our office policies, a physician formerly associated with our practice requested that one of our administrative staff provide him with the names and contact information of our patients, presumably for purposes of notifying them of his new practice information. Without consulting a supervisor or anyone else in senior management, the employee complied and provided the physician with a hard copy print out of patient contact information.;",{"entities":[[47,82,"ACTION"],[86,115,"ACTOR"],[134,143,"ACTION"],[160,180,"ASSETS"],[249,290,"ACTION"],[324,370,"ACTION"],[397,405,"ASSETS"],[432,441,"ACTOR"]]}],["The L.A. Gay & Lesbian Center recently learned that the security of certain of our information systems was compromised by a criminal cyber attack apparently designed to collect social security numbers, credit card numbers and other financial information. Between November 22, 2013 and December 3, 2013 our forensic investigators confirmed that this attack potentially exposed certain of your information to unauthorized access and acquisition. I say potentially because, to date, there is no evidence that any information was actually accessed or acquired as a result of this criminal invasion. However, the information potentially exposed may have included your name, contact information, medical or healthcare information, date of birth, credit card information, Social Security number and health insurance account number. Based upon our investigation, the period during which your information may have been exposed appears to have been between September 17, 2013 and November 8, 2013. Out of an abundance of caution, we want to make you aware of the attack and our efforts to help safeguard your information. Immediately upon learning of this criminal attack and the potential exposure of private patient information, the Center took action. Specifically, upon learning of the potential of this incident, we promptly took the following actions: (i) curtailed the intrusion; (ii) hired numerous experts, including two leading national forensic investigation firms, to help us investigate the situation and determine the individuals and information potentially affected; and (iii) began the process of notifying potentially affected individuals. In addition, we have notified law enforcement and are taking steps to further guard against this type of criminal attack in the future. As always, we recommend that you remain vigilant by reviewing your explanation of benefits for medical services and financial account statements, as well as free credit reports for unauthorized activity. From the moment we learned of the potential exposure, our primary concern has been ensuring that you are protected against risks related to this incident. Therefore, we have engaged Experian, one of the leading providers of credit monitoring products, to provide you with its ProtectMyID Alert membership, including credit monitoring, for one year at no cost to you. Enclosed with this letter is information regarding these services and instructions for enrollment, as well as an insert providing additional useful information regarding steps you can take to protect yourself against identity theft. We have also engaged Experian to provide a dedicated call center to answer questions about this incident. If you have any questions regarding this incident or would like assistance enrolling in ProtectMyID Alert, please contact the Experian call center at 888-451-6562 from 6:00 AM to 6:00 PM, Pacific Time, Monday through Friday, or 8:00 AM to 5:00 PM, Pacific Time, Saturday and Sunday.;",{"entities":[[103,118,"ACTION"],[122,132,"ACTOR"],[146,200,"ACTION"],[344,403,"ACTION"],[407,443,"ACTION"],[604,639,"ACTION"],[896,917,"ACTION"],[1053,1059,"ACTION"],[1141,1161,"ACTION"],[1170,1219,"ACTION"],[1752,1767,"ACTION"],[1964,1986,"ACTION"],[2571,2586,"ACTION"]]}],["More than 5,500 patients of Virginia-based NOVA Chiropractic & Rehab Center of Sterling may have had personal information including Social Security numbers compromised after an unencrypted thumb drive containing the data was possibly thrown away. How many victims? 5,534, according to HHS.gov. What type of personal information? Names, addresses, health records, and, in some cases, Social Security numbers, dates of birth, diagnoses, insurance claim forms, and payment information, including expired credit card data. What happened? An unencrypted thumb drive that contained the data was misfiled and put into regular office circulation, inadvertently wiped clean, or possibly thrown away. What was the response? NOVA is interviewing involved individuals and taking inventory of electronic devices as part of an ongoing investigation. NOVA is improving security by only using encrypted and password protected devices. NOVA has issued a notification that is posted to the website, and is offering a free examination, regular office visit, or therapy session to impacted individuals or their family members. Details: NOVA learned of the incident on Jan. 30. The unencrypted drive was used to transfer older electronic files. Quote: Please rest assured that your health information is intact and our office still has your important records, John Ratcliffe, clinic director with NOVA, wrote in the notification posted online. The likelihood that there indeed was a breach of information is extremely low. Source: sterlingchiropractortherapy.com, Important HIPAA notice, March 25, 2014.;",{"entities":[[158,169,"ACTION"],[191,202,"ASSETS"],[223,248,"ACTION"],[543,566,"ASSETS"],[591,603,"ACTION"],[608,643,"ACTION"],[645,670,"ACTION"],[675,696,"ACTION"],[1181,1186,"ASSETS"],[1187,1231,"ACTION"]]}],["Charles Schwab website down after being hit with DoS attack.;",{"entities":[[15,22,"ASSETS"],[23,43,"ACTION"],[49,60,"ACTION"]]}],["Allegations that a nurse at a major Chicago hospital tweeted about a shooting victim's death and blood-soaked hospital room are a stunning cautionary tale that health care providers can use to hammer home how workers may be held liable for privacy lapses, attorneys say. The allegations surfaced in a new lawsuit accusing Karrie Anne Runtz, a trauma nurse at Mount Sinai Hospital, of \"recklessly and outrageously\" tweeting about the April 2015 death of 24-year-old Mikal Johnson. According to the suit, Runtz sent tweets to 1,300 followers describing Johnson as \"DOA\" and included a grisly photograph of a large pool of blood in his treatment room. The now-deleted Twitter account, which was known to local media, used the screename \"Dixie McCall,\" the handle @traumanatrix and the hashtags #sinaitrauma and #westsideshitshow to complain about a steady stream of patients with bullet wounds in Mount Sinai's emergency department. The account's bio section read, \"diva of death..mistress of mayhem. kicking ass, taking names & saving lives. tough as nails chicago chick. you think you know, but you have no idea.\" ;",{"entities":[[17,24,"ACTOR"],[53,92,"ACTION"],[240,254,"ACTION"],[323,340,"ACTOR"],[342,356,"ACTOR"],[504,509,"ACTOR"],[510,524,"ACTION"],[591,601,"ASSETS"]]}],["The Houston Chronicle is reporting that sources say that at least one stolen electronic file containing sensitive personal information on thousands of current and former Harris County employees was found in Vietnam by the FBI. County sources spoke under condition of anonymity to the paper, saying that at least one of the breached files had been found by the federal agency in Vietnam. First Assistant County Attorney Robert Soard declined to confirm the FBI was the agency that contacted the county two weeks ago concerning the files. A FBI spokeswoman declined to comment Saturday to The Associated Press Saturday. The two breached files, created in 2005 and 2007, held names, Social Security numbers, birth dates and hire dates of 21,000 employees working at the county at those times.;",{"entities":[[70,76,"ACTION"],[77,92,"ASSETS"],[333,338,"ASSETS"],[638,643,"ASSETS"]]}],["A US telemarketing company has leaked the personal details of potentially tens of thousands of consumers after misconfiguring a cloud storage bucket, Infosecurity can reveal. A team at vpnMentor led by Noam Rotem found the unsecured AWS S3 bucket on December 24 last year. It was traced to Californian business CallX, whose analytics services are apparently used by clients to improve their media buying and inbound marketing. According to its website, the firm counts lending marketplace Lendingtree, Liberty Mutual Insurance and smart security vendor Vivint among its customers. Rotem found 114,000 files left publicly accessibly in the leaky bucket. Most of these were audio recordings of phone conversations between CallX clients and their customers, which were being tracked by the firm’s marketing software. An additional 2000 transcripts of text chats were also viewable. Personally identifiable information (PII) contained in these files included full names, home addresses, phone numbers and more. With the leaked data, attackers could launch convincing phishing, fraud and vishing attacks, warned vpnMentor.;",{"entities":[[27,37,"ACTION"],[105,125,"ACTION"],[128,148,"ASSETS"],[234,247,"ASSETS"],[642,647,"ACTION"],[648,655,"ASSETS"],[675,691,"ASSETS"],[1021,1032,"ACTION"],[1034,1043,"ACTOR"],[1044,1076,"ACTION"],[1078,1083,"ACTION"],[1088,1103,"ACTION"],[1105,1122,"ACTION"]]}],["back up HD missing after security upgrades;",{"entities":[[0,10,"ASSETS"],[11,42,"ACTION"]]}],["Syrian Electronic Army uses Social Engineering to gain passwords to systems and then uses the passwords to post unauthorized twitter messages. Also posted content of staff email to their own Twitter feed;",{"entities":[[28,46,"ACTION"],[50,64,"ACTION"],[68,75,"ASSETS"],[85,142,"ACTION"],[148,165,"ACTION"]]}],["Break in leads to stolen assets and data;",{"entities":[[0,40,"ACTION"]]}],["During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of \"NCFTA_iOS_devices_intel.csv\" turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts. no other file on the same folder makes mention about this list or its purpose. ;",{"entities":[[52,60,"ASSETS"],[200,212,"ACTION"],[213,265,"ACTION"],[267,291,"ACTION"],[292,323,"ACTION"],[675,699,"ACTION"]]}],["The Alternate Privacy Officer received a call that a logbook containing multiple SPI was found on a side street exit near a VA Wichita offsite facility. The logbook was found by an Employee/Veteran on October 29, 2015 at around 1:00 p.m. It appears the logbook has been run over multiple times. The Privacy Officer is still determining how long the logbook has been lying in street.;",{"entities":[[30,45,"ACTION"],[53,60,"ASSETS"],[85,123,"ACTION"],[158,165,"ASSETS"],[254,261,"ASSETS"],[350,357,"ASSETS"]]}],["Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;",{"entities":[[25,36,"ACTOR"],[47,61,"ACTION"],[67,106,"ACTION"],[108,110,"ACTION"],[112,133,"ACTION"],[139,155,"ACTION"],[164,172,"ASSETS"],[173,215,"ACTION"]]}],["The names, postal addresses, phone and fax numbers and titles or positions of 307 contacts were dumped on the Internet.;",{"entities":[[91,119,"ACTION"]]}],["WADA hacked by Fancy Bear;",{"entities":[[5,11,"ACTION"],[15,25,"ACTOR"]]}],["The City of Henderson in Kentucky notified HHS that 1,008 were affected by a breach that began or occurred on June 28, 2012 and that was discovered on March 3, 2014. The incident involved a business associate, Keystone Insurers Group. The city kindly provided PHIprivacy.net with a copy of the legal notice they posted in The Henderson Gleaner on May 9, 2014: In 2012, the City of Henderson, Kentuckys health benefit plan (Plan) began exploring the possibility of opening a health clinic for its employees and their dependents to try to reduce health plan costs, and began providing information to its broker to help with this process. On several occasions between January 23, 2013 and March 3, 2014, the broker shared data from the Plan with several health care providers (and one business associate of a provider) who were being considered as possible partners with the City in development of such a clinic. On March 11, 2014, the City learned that the data shared with these potential partners included its Plan Participants detailed individually identifiable health information. The City has conducted an investigation and concluded that more health information was disclosed than was minimally necessary to obtain proposals for the health clinic, although there is no reason to believe the information was misused in any way. The information released to the broker and then to the providers included names of Plan participants, insurance ID numbers, addresses, gender, birthdate, and information about the treatment, diagnosis, prescriptions, expenses, providers, and workers compensation claims (if applicable) of Plan Participants. The City has no reason to believe that your information has been misused or disclosed inappropriately by anyone who received it. All the recipients are required to comply with the federal Health Insurance Portability and Accountability Act (HIPAA) privacy law and protect the information they received. In addition, all of them have assured us that they have not forwarded the information to anyone else (other than the business associate, who forwarded the information to one of the providers). We have asked the recipients to destroy any copies of the information they may have had in their files. Nevertheless, in an abundance of caution, we are in the process of sending notification letters to those persons affected so that they may take any extra precautions that they might consider to be necessary. The City is treating this matter very seriously and is working to ensure something like this does not happen again. It has put procedures in place to assure only the minimum amount of your health information is used, disclosed or requested for its future administrative needs, and it has asked its broker to provide us with assurances that its employees have received adequate training on all applicable HIPAA requirements. The safety and security of your health information are among the Citys and the Plans highest priorities. Even though the City has no evidence that Plan Participant information has been misused, it encourages Plan Participants to review carefully all regular and electronic correspondence received from UMR (the company that processes the Plans health care claims) for unauthorized activity, such as claims paid out of the HRA that Participants do not recognize, or an explanation of benefits detailing treatment Participants did not receive. If you have other questions concerning your health information, please contact Dawn S. Kelsey, City Attorney, at 270-831-1200, City of Henderson, P.O. Box 716, Henderson, KY 42419-0716.;",{"entities":[[58,83,"ACTION"],[714,725,"ACTION"],[953,1007,"ACTION"],[1699,1715,"ACTION"],[1719,1744,"ACTION"],[1748,1754,"ACTOR"],[3245,3266,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["Stolen laptop contained patient PHI.;",{"entities":[[0,6,"ACTION"],[7,13,"ASSETS"]]}],["n investigation has been launched into how confidential medical records were found in a garden in Londonderry. The Western Health Trust has confirmed that the documents contained \"sensitive personal information\" and said it had reported the breach to the Information Commissioner's office. The trust said a local newspaper and a member of the public brought the matter to its attention on Tuesday. The editor of the Derry News, Ciaran O'Neill, said it involved 17 patients. \"The details of 13 women and four men were on eight A4 sheets of papers,\" he said. \"There are a few lines on each and they go into intimate detail about their treatment, condition and their past history.\" Mr O'Neill said the woman who found the documents in her garden \"was shocked\". \"She found it hard to believe that these could be hospital documents,\" he said. \"We contacted the Western trust and they confirmed that they were documents relating to local patients.\" A spokesperson for the trust said they had now secured the information and had a full investigation was under way.;",{"entities":[[56,71,"ASSETS"],[72,110,"ACTION"],[159,168,"ASSETS"],[241,247,"ACTION"],[539,545,"ASSETS"],[719,728,"ASSETS"],[817,826,"ASSETS"],[904,913,"ASSETS"]]}],["A skimming device was found on a gas pump at the Pilot Travel Center in Monroe County, MI. More than a dozen people complained about fraudulent charges on their cards after using it a the gas pump.;",{"entities":[[0,27,"ACTION"],[33,41,"ASSETS"],[133,166,"ACTION"],[188,197,"ASSETS"]]}],["Two unencrypted computer backup tapes were found to be missing. The company believes they were thrown away and are now buried in a landfill. They contained names, addresses, SSNs, Driver's license numbers, financial account information and transaction records. ;",{"entities":[[16,37,"ASSETS"],[38,63,"ACTION"],[86,107,"ACTION"],[120,141,"ACTION"]]}],[";",{"entities":[]}],["A nurse who was working on a project to convert ICD-9 diagnoses to ICD-10 lost a list of names and SSNs of Veterans whose diagnoses were to be converted. Two pages of a three page report were lost in the VA Canteen. Each page contained the name and SSNs of 60 Veterans.;",{"entities":[[2,7,"ACTOR"],[74,78,"ACTION"],[158,163,"ASSETS"],[175,179,"ASSETS"],[187,196,"ACTION"],[221,225,"ASSETS"]]}],["Investment management company mailed shareholder documents with customer SSN potentially visible in the envelope window;",{"entities":[[0,29,"ACTOR"],[30,36,"ACTION"],[49,58,"ASSETS"]]}],["Dreamhost leaked over 815 million customer records;",{"entities":[[10,50,"ACTION"]]}],["NHS apologises for sending vital patient information to WRONG GPs for five years;",{"entities":[[0,3,"ACTOR"],[19,52,"ACTION"]]}],["Core Technology Services, the information technology arm of the North Dakota University System, has discovered and shut down suspicious access to one of the university system's servers. An entity operating outside the United States apparently used the server as a launching pad to attack other computers, possibly accessing outside accounts to send phishing emails. Unfortunately, personal information, such as names and Social Security numbers, was housed on that server. There is no evidence that the intruder accessed any of the personal information. Their breach involved a server accessed using compromised login accounts. No information has yet been released on how the account was taken over, but spearphishing is a likely candidate. The illicit access began in October 2013, and was discovered in early February. Public disclosure was not made until March 3rd.;",{"entities":[[115,145,"ACTION"],[177,185,"ASSETS"],[252,258,"ASSETS"],[278,303,"ACTION"],[305,340,"ACTION"],[341,365,"ACTION"],[466,473,"ASSETS"],[504,512,"ACTION"],[562,568,"ACTION"],[580,586,"ASSETS"],[587,629,"ACTION"]]}],["Veteran A received Veteran B's medical results report because the wrong address was used. The report contained Veteran B's name, but had Veteran A's address. The letter also contained Veteran B's partial SSN and the results of his exam.;",{"entities":[[10,18,"ACTION"],[62,89,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The official blog of USEmbassy.gov a portal for US embassies, consulates and diplomatic missions has been hacked and defaced by an Indonesian hacker using the online moniker Dbuzz.;",{"entities":[[0,20,"ASSETS"],[36,44,"ASSETS"],[99,114,"ACTION"],[119,126,"ACTION"],[133,150,"ACTOR"],[151,182,"ACTION"]]}],["The NZNO yesterday notified our Office – as we would expect – that it had fallen victim to a spear phishing scam. An NZNO staff member received an email purportedly from its chief executive asking for names and contact details of all its members. Unfortunately, these details were sent to that email address before it became clear the request was fraudulent. The information lost consisted of the first names, surnames and the email addresses of all its members. NZNO advised us that its IT team attempted to retrieve the email but it was too late. It also attempted to contact the email address provider, Yahoo. The organisation reported the incident to Police and has emailed its members to inform them about the breach.;",{"entities":[[70,113,"ACTION"],[135,169,"ACTION"],[190,246,"ACTION"],[276,288,"ACTION"],[294,307,"ASSETS"],[315,358,"ACTION"],[375,379,"ACTION"],[716,723,"ACTION"]]}],["Database of voting registration lists for millions of US voters mispublished to the Internet.;",{"entities":[[0,8,"ASSETS"],[64,76,"ACTION"]]}],["On Saturday, June 15 th, one of our employees informed us that she had been the victim of a burglary during the early morning hours on June 15 th at approximately 2:45 a.m. and that her company laptop had been stolen. The laptop contained certain aspects of patient information which she needed as part of her role with our company.;",{"entities":[[92,100,"ACTION"],[194,200,"ASSETS"],[201,217,"ACTION"],[222,228,"ASSETS"]]}],["On January 4, Coulee Medical Center in Grand Coulee, Washington, posted this notice on its web site: This notice is posted pursuant to federal Health Insurance Portability and Accountability Act of 1996 breach notification regulations found at 45 CFR Parts 160 and 164 and the Health Information Technology for Economic and Clinical Health Act Section 13402(e)(1). On Nov. 5, 2013, it was discovered that a Coulee Medical Center employed physician had shared certain patient information with his wife. The information shared includes: patient account number (a number used solely by the hospital for purposes of identification), date of service, CPT code and description of health care services that the patient received at Coulee Medical Center. The information that was accessed may have, in some instances, also included the patients name. Coulee Medical Center has taken measures to prevent further access to this information. Coulee Medical Center is committed to providing quality care and protecting patients personal information, and apologizes for the inconvenience and concern this may be for affected patients. The affected patients will receive direct mail correspondence from Coulee Medical Center. If you have questions about this incident or concerns about how it may impact you, please contact the Coulee Medical Center Privacy Officer at (509) 633-1753. Although I havent yet found a copy of the actual notification letter mailed to patients, at least one recipient was not appreciative at all. And the doctor in question, who reportedly was not named in the letter sent to patients, publicly responded and indicated that he felt the medical center had unfairly tarnished his reputation: In an interview, Dr. Andrew Castrodale said the HIPAA notice, made under the federal Health Insurance Portability and Accountability Act, implied the work had been about figuring out bonus pay, but was actually meant to devise a reliable tool for measuring and reporting the efficiency and productivity of health care providers at Coulee Medical Center. Although it did not name Castrodale, the Notice of Patient Privacy Breach that arrived in mailboxes Jan. 3 and 4 said the doctor had improperly shared patient information with his wife. Castrodale said his wife, Sherril, is an actuary, and was helping him build a standardized statistical tool that could be used by Coulee Medical Center. None of this has to do with anyones medical history, he said. I find it somewhat shocking that a physician would suggest that PHI that includes CPT codes, description of services, and in some cases, patients names, is not covered by HIPAA or that this was not a big deal particularly in a small town where people might be recognized by unusual conditions or services. In any event, unless the physician wishes to claim that PHI is not PHI, it seems hat the doctor shared patients PHI with his wife without authorization or consent of the patients. However noble his intentions, and however much he believes the medical center may have misrepresented his motivation, unless he had consent or a HIPAA waiver, I think its pretty clear he did violate HIPAAs Privacy Rule. That said, was the hospitals notification accurate and appropriate? Did they have an obligation to explain to recipients that the disclosure to the doctors wife was reportedly so she could provide actuarial advice? Was this, as some of have suggested, a political dirty trick to discredit the doctor? The incident wound up contributing to the medical center hiring new legal counsel: A majority of hospital district commissioners voted Thursday to immediately hire new legal counsel, then went into closed session with the new attorney. Commissioner Jerry Kennedy said the boards reasons for changing attorneys had been compounded the week before when the hospital administration mailed a notice of a privacy breach, reportedly to thousands, saying a doctor had violated federal patient privacy rules. One of the hopes that I had was that _ having legal counsel involved in that would help minimize reputational damage to the institution and to staff that might be potentially involved, Kennedy said. I didnt feel, as a lot of people didnt feel, that that happened. The HIPAA notice, made under the Health Insurance Portability and Accountability Act, came at a time when the hospital administration has been at seemingly irreconcilable odds with its doctors, who have expressed no confidence in administration. So how does a political controversy factor into a HIPAA breach notification? It shouldnt, of course, and if the medical center did not give patients the information they needed to assess their risk of harm because of any secondary or political agenda, then thats problematic. Id love to see what HHS does with this one if they get all the facts. But this is also a useful reminder of why covered entities should consult with lawyers and experts on breach response before making any statements or sending out any notification letters.;",{"entities":[[418,458,"ACTOR"],[459,502,"ACTION"],[779,791,"ACTION"],[2901,2907,"ACTOR"],[2908,2963,"ACTION"],[3183,3211,"ACTION"],[3343,3373,"ACTION"],[3506,3512,"ACTOR"]]}],["On November 27, 2017, we received a security incident report from our EMR system vendor indicating that unauthorized software had been installed on the server the vendor supports on our behalf. The unauthorized software was installed to generate digital currency, more commonly known as “cryptocurrency.” Although the hospital’s investigation is ongoing, they believe that an unauthorized individual accessed the server housing the EMR system to inject the software. The goal of the attack did not appear to be the acquisition or exfiltration of patients’ personally identifiable information or protected health information, and the hospital has no evidence that PII or PHI was acquired or viewed. But as is the case so often, they could not definitively prove that there was no access or viewing, and so, they must notify patients.  Information contained on the affected server included demographic information such as patient names, addresses, dates of birth, and Social Security numbers, clinical information such as diagnosis and treatment information, and other information such as insurance billing information.;",{"entities":[[104,144,"ACTION"],[152,158,"ASSETS"],[198,233,"ACTION"],[234,262,"ACTION"],[373,399,"ACTOR"],[400,408,"ACTION"],[413,419,"ASSETS"],[443,466,"ACTION"]]}],["Targeted malware aimed at victims in Taiwan;",{"entities":[[0,43,"ACTION"]]}],["application sent message history based on email number w/o confirming email number ownership so reuse of email number caused breach.;",{"entities":[[12,41,"ACTION"],[118,132,"ACTION"]]}],["India's largest online restaurant guide Zomato confirmed today that the company has suffered a data breach and that accounts details of millions of its users have been stolen from its database. In a blog post published today, the company said about 17 Million of its 120 Million user accounts from its database were stolen. The stolen account information includes user email addresses as well as hashed passwords. Also, Zomato stressed that the breach did not impact or compromise any payment card data, as the financial information of its customers is stored in a separate database different from the one illegally accessed.;",{"entities":[[95,106,"ACTION"],[158,174,"ACTION"],[184,193,"ASSETS"],[303,311,"ASSETS"],[312,324,"ACTION"],[330,336,"ACTION"],[448,454,"ACTION"],[577,585,"ASSETS"]]}],["County purchasing employee steals computer equipment and resells on craigslist.org. One of his customers reported that sensitive county information resided on system which led to search of his residence and discovery of truckloads of stolen assets.;",{"entities":[[27,33,"ACTION"],[34,52,"ASSETS"],[57,67,"ACTION"],[220,248,"ACTION"]]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}],["The Information Security Officer (ISO) is investigating the unauthorized use of employee and veteran health information. 02/24/12:",{"entities":[[0,38,"ACTOR"],[60,76,"ACTION"]]}],["The medical center had a shooting on campus on Wednesday and now there are employees accessing the medical records of those involved in the shooting incident. All medical records have been marked sensitive so they can track who is accessing the record. The Privacy Officer (PO) and the ISO are working together to find out who had authorized access and who did not.",{"entities":[[19,36,"ACTION"],[75,84,"ACTOR"],[85,114,"ACTION"]]}],["02/27/12:",{"entities":[]}],["The records of two living individuals and one deceased individual were accessed inappropriately. The two living individuals will receive a letter offering credit protection services and the deceased individual's next of kin will receive a letter of notification;",{"entities":[[66,96,"ACTION"]]}],["Gaming website compromised via undisclosed method. User information in the form of usernames and passwords posted to pastebin.com;",{"entities":[[7,14,"ASSETS"],[15,50,"ACTION"],[107,116,"ACTION"]]}],["On October 7, 2015, an internal printing error resulted in approximately 100 CalOptima Medi- Cal members with diabetes receiving a health incentive survey that may have included an extra survey meant for another member. We became aware of the error on October 8, 2015, and immediately stopped all printing. However, we were not able to retrieve the surveys that had already been processed for mailing.;",{"entities":[[23,46,"ACTION"],[243,248,"ACTION"]]}],["gas pump skimmer;",{"entities":[[0,8,"ASSETS"],[9,16,"ACTION"]]}],["Anonymous defaced Indonesia government websites Submitted by siavash on Thu, 01/31/2013 - 15:22 The coordinated cyber attack is seen as retaliation for the arrest of 22-year-old Wildan Yani Ashari, who hacked the presidents website earlier in January. Anonymous Indonesia and its supporters have rallied against his arrest on twitter and other social media networks. Additional Information: Source: http://www.youtube.com/watch?v=28dhauO4p7c;",{"entities":[[0,9,"ACTOR"],[10,17,"ACTION"],[39,47,"ASSETS"],[62,69,"ACTOR"],[116,128,"ACTION"],[206,212,"ACTION"],[228,235,"ASSETS"],[257,266,"ACTOR"]]}],null,["Illinois Public Health Website Hit With Ransomware Amid Coronavirus Hackers infected an Illinois Public Health provider website with ransomware during the coronavirus pandemic; Maze Team exploits, phishing, malware, and a PACS incident complete this week’s breach roundup.;",{"entities":[[23,30,"ASSETS"],[40,50,"ACTION"],[68,75,"ACTOR"],[76,87,"ACTION"],[120,127,"ASSETS"],[133,143,"ACTION"],[197,205,"ACTION"],[207,214,"ACTION"]]}],["Judge Culp determined that he had no choice but to scrap the entire case after law enforcement withheld the fact that crucial evidence — cell phone data from one of the victims — had been corrupted by ransomware;",{"entities":[[137,147,"ASSETS"],[179,211,"ACTION"]]}],[";",{"entities":[]}],["Anonymous Cambodia has claimed theyve breached the website of the countrys Anti-Corruption Unit (ACU.gov.kh). The hacktivists have leaked names, usernames and passwords (in clear text) of 146 administrators. ;",{"entities":[[0,9,"ACTOR"],[19,46,"ACTION"],[51,61,"ASSETS"],[114,125,"ACTOR"],[126,137,"ACTION"]]}],["Some GPs found they were mistakenly given access to other people’s ‘sensitive’ pensions information after logging into their own account on PCSE’s new online portal.;",{"entities":[[20,51,"ACTION"],[151,165,"ASSETS"]]}],["On August 21, 2012, the 374th Medical Group (374 MDG) at Yokota AB, Japan, discovered a potential compromise of patients' protected health information (PHI) when, on or about September 22, 2011, a former 374 MDG provider mailed surgical reports he performed at the facility to his stateside address. These reports pertained to 438 patients and were intended for the American Board of Surgeons to maintain the provider's board certification. Unfortunately, the package containing the medical information never arrived at his home and the United States Postal Service was unable to locate the package. The data elements involved in the documents include patient names, Social Security Numbers, dates of birth, diagnoses, descriptions and summaries of select procedures and operations performed by the provider between October 2007 and September 2011. Upon discovery, the 374 MDG immediately initiated an investigation to determine the circumstances surrounding the loss and identify those who were potentially impacted. To mitigate this incident and prevent future compromises of this nature, the 374 MDG is currently reviewing their policies and procedures to assist providers with the board certification process. ;",{"entities":[[88,111,"ACTION"],[195,220,"ACTOR"],[221,244,"ACTION"],[479,519,"ACTION"],[591,599,"ASSETS"],[634,643,"ASSETS"],[799,807,"ACTOR"],[869,876,"ACTOR"],[963,967,"ACTION"],[1095,1102,"ACTOR"]]}],["ReachOut Home Care in Kentucky reported that 4,500 patients had PHI on a laptop that was stolen on October 9th. Their statement from their web site: ReachOut Home Care customers in Texas notified of security breach Unencrypted computer stolen from office facility contained patient names and Medicare identification numbers Richardson, TX Dec. 9, 2014 In October, at the offices of ReachOut Home Care in Richardson an unencrypted laptop computer was stolen. The computer contained the names, claims data and, in some cases, Medicare identification numbers of approximately 5,000 ReachOut Home Care customers who live in the Dallas/Fort Worth area. At this time, ReachOut Home Care has no reason to believe the information has been used inappropriately. ReachOut Home Care is in the process of notifying all of its customers whose information was on the computer and will provide individuals whose Medicare identification number was included free access to a credit-monitoring service that can help them protect against potential misuse of their information. We are strongly encouraging these ReachOut Home Care customers to enroll for the free service. While ReachOut Home Care has policies and procedures in place to maintain the security of its members information, we are taking additional steps as a result of this incident. These steps include a comprehensive review of our technical security procedures with ReachOut Home Care and an inventory and review of all ReachOut Home Care equipment that maintains protected health information to ensure that all equipment has been encrypted. ReachOut Home Care customers who have any questions about this may contact ReachOut Home Care by phone at 1-800-240-3294, from 9 a.m. to 5 p.m. Central Time, Monday through Friday. Any ReachOut Home Care customer who believes their information is being used by another party is urged to contact ReachOut Home Care so that we can work with the ReachOut Home Care customer and law enforcement officials to promptly investigate the matter.;",{"entities":[[73,79,"ASSETS"],[85,95,"ACTION"],[200,215,"ACTION"],[217,237,"ASSETS"],[238,249,"ACTION"],[423,450,"ASSETS"],[451,462,"ACTION"],[467,475,"ASSETS"],[859,867,"ASSETS"]]}],["employee stole records;",{"entities":[[0,8,"ACTOR"],[9,22,"ACTION"]]}],["Intern accesses e-taxation accounts of popular Indian cricketers and a professor. After hacking these accounts, He accessed the details of their income, tax amount paid, PAN card number with an intention to know how much these rich and famous people were filing their IT returns and how much assets they owned.;",{"entities":[[0,6,"ACTOR"],[7,38,"ACTION"],[88,110,"ACTION"],[115,151,"ACTION"]]}],["Glens Falls Hospital says the medical records of more than 2,300 patients may have been compromised. The hospital says it stored those records for more than 4 months on an unprotected computer server.;",{"entities":[[78,100,"ACTION"],[185,201,"ASSETS"]]}],["Law Firm Serving Fortune 500 Firms Hit by Ransomware - Campbell Conroy & O’Neil;",{"entities":[[35,52,"ACTION"]]}],["Construction contractor ended up being the target of BEC attack;",{"entities":[[53,63,"ACTION"]]}],["hackers used cold fusion vulnerability to bypass authentication and upload malware to victim web server;",{"entities":[[0,7,"ACTOR"],[8,38,"ACTION"],[39,63,"ACTION"],[68,85,"ACTION"],[93,103,"ASSETS"]]}],["PII of US woman's soccer team exposed during a lawsuit;",{"entities":[[30,37,"ACTION"]]}],["CaroMont Health announced Friday that it learned of an internal health data breach that involved an employee sending an unsecure email with 1,310 patients protected health information (PHI) on August 8 during a routine security audit.;",{"entities":[[71,82,"ACTION"],[100,108,"ACTOR"],[109,128,"ACTION"],[129,134,"ASSETS"]]}],["A Chinese hacker group called Sky-Eye has defaced the website of the Bel-Air village in Makati City, the Philippines ((barangaybelair.ph). ;",{"entities":[[2,22,"ACTOR"],[30,37,"ACTOR"],[38,49,"ACTION"],[54,61,"ASSETS"]]}],["A Virgin Atlantic employee has resigned following allegations she routinely fed information about the airline's celebrity clientele – from Madonna to Sienna Miller – to a paparazzi agency. The employee was a junior member of the team that looks after high-profile clients, Virgin said Friday. She quit Thursday before reports published in the Guardian and the Press Gazette alleged that she had passed the booking information of more than 60 celebrities on to the Big Pictures photo agency. Among those allegedly targeted: Britain's Princess Beatrice; singers Madonna and Rihanna; actors Charlize Theron, Kate Winslet, Daniel Radcliffe and Miller; comedians Sacha Baron Cohen and Russell Brand; and a slew of U.K. celebrities and sports figures.;",{"entities":[[2,26,"ACTOR"],[66,131,"ACTION"],[194,202,"ACTOR"],[392,429,"ACTION"]]}],["Veteran/Employee requested a sensitive record report because he believes one of his co-workers might be inappropriately accessing his medical record. Sensitive Record Report showed that employee in question did access the complainant's CPRS record on one occasion July 30, 2010.;",{"entities":[[84,94,"ACTOR"],[95,149,"ACTION"],[186,206,"ACTOR"],[207,247,"ACTION"]]}],["A London private hospital that made patients’ confidential fertility data freely searchable online has been fined £200,000.;",{"entities":[[0,25,"ACTOR"],[31,98,"ACTION"]]}],["New hire provided login details of former employee's emails;",{"entities":[[0,8,"ACTOR"],[9,59,"ACTION"]]}],["Maritz employee accidentally emailed the wrong person information regarding employees in the employer-sponsored health plan;",{"entities":[[7,15,"ACTOR"],[16,65,"ACTION"]]}],["A Minneapolis PC technician reported finding an .xps document saved to the desktop of a BCMA laptop. The document contained what appeared to be a Pharmacy Order. The order contained a patient name, social security number, date of birth and age, information regarding the prescription, Dates of Service, Physician name, comments and the Room/Bed #. The larger issue regarding this incident is that the information was available to anyone who may have walked by the computer. The BMCA laptops are configured with local _Service Accounts_ which permit a desktop to be presented as soon as the device is powered up. The applications are then accessed by clicking an Icon and logging in to the application. The document containing this sensitive information appears to have been created through one of the applications (CPRS, IMed Consent, etc) which allow reports to be printed to printers and to the Windows Desktop. Opening a document saved in this fashion does not require further authentication.;",{"entities":[[53,61,"ASSETS"],[75,82,"ASSETS"],[93,100,"ASSETS"],[105,113,"ASSETS"],[413,436,"ACTION"],[464,473,"ASSETS"],[483,490,"ASSETS"],[551,558,"ASSETS"],[616,628,"ASSETS"],[638,666,"ACTION"],[671,701,"ACTION"],[706,714,"ASSETS"],[860,873,"ACTION"],[877,885,"ASSETS"],[905,913,"ASSETS"],[924,932,"ASSETS"]]}],["ATM Skimmer;",{"entities":[[0,3,"ASSETS"],[4,11,"ACTION"]]}],["A health technician was checking in a Veteran for his visit and was given his medicare cards to be scanned into the computer and the Veteran was called by the physician to be seen and the health technician told Veteran that they will make sure he is given his card back before the end of his appointment. Instead of walking to the office where the Veteran was being seen, the health technician decided to clip the cards onto the back of his clinical papers and some how the cards got lost. They did a thorough search around the area where the cards should have been and could not seem to be able to locate them. The technician is thinking that the cards were given to another Veteran and is trying to contact the other Veteran at this time to see if they mistakenly had given them to the patient.;",{"entities":[[2,19,"ACTOR"],[78,92,"ASSETS"],[93,106,"ACTION"],[116,124,"ASSETS"],[188,205,"ACTOR"],[260,264,"ASSETS"],[376,393,"ACTOR"],[414,419,"ASSETS"],[441,456,"ASSETS"],[461,489,"ACTION"],[543,548,"ASSETS"],[570,611,"ACTION"],[616,626,"ACTOR"],[648,653,"ASSETS"],[654,683,"ACTION"],[747,796,"ACTION"]]}],["activist Turkish Ajan hacker group pulled data from pizza hut in spain, personal information and credentials, released publicly, no details.;",{"entities":[[0,34,"ACTOR"],[35,51,"ACTION"]]}],["Sean Caffrey, 25, of Sutton Coldfield, admitted illegally accessing and stealing the ranks, usernames and email addresses of more than 800 users of a military communications system, on June 15 2014.;",{"entities":[[0,12,"ACTOR"],[48,67,"ACTION"],[72,121,"ACTION"],[150,180,"ASSETS"]]}],["internet exposed Elastic Search database of 260,000 pii records;",{"entities":[[0,16,"ACTION"],[17,40,"ASSETS"]]}],["credit card skimmer;",{"entities":[[0,11,"ASSETS"],[12,19,"ACTION"]]}],["insider trading based on email monitoring access;",{"entities":[[0,7,"ACTOR"],[8,48,"ACTION"]]}],[";",{"entities":[]}],["MOVEit vulnerability exploited. Data stolen.;",{"entities":[[7,31,"ACTION"],[33,45,"ACTION"]]}]]}