880 Patients Possibly Affected by Baptist Health Louisville Phishing Attack

Baptist Health in Louisville, Kentucky has alerted 880 patients that a few of their PHI have possibly been retrieved and thieved by hackers.

The safety breach was found on October 3, 2017, when unusual activity was noticed on the electronic mail account of a worker. Baptist Health determined that a third-party transmitted a phishing electronic mail to the worker, who replied and revealed login identifications letting the electronic mail account to be retrieved.

Those login identifications were then utilized by an unknown person to gain access the electronic mail account. The electronic mail account had the PHI of 880 patients, though it is not clear whether any of the electronic mails were seen. The purpose of the attack might not have been to gain access to confidential info.

What is understood, is access was utilized to transmit more phishing electronic mails to other electronic mail accounts. After the detection of the breach, Baptist Health reacted swiftly to restrict the possibility of damage and deactivated the affected electronic mail accounts and carried out a password reset to avoid additional illegal access.

Because of the measures taken by the cyberpunk after access to the account was achieved, Baptist Health doesn’t think any information contained in the electronic mails has been utilized wrongly.

An analysis of all electronic mails in the account indicated the kinds of information possibly undermined contained names, dates of birth, clinical information, medical record numbers, and treatment information. Some Social Security numbers were also disclosed.

Since the probability of PHI access and abuse can’t be precluded with a high degree of confidence, all 880 patients affected by the breach have been alerted and patients whose Social Security numbers were revealed have been provided free credit checking and identity thievery safety services for one year free of charge.

Workforce has also received extra training in relation to phishing electronic mails, and the login procedure for distant access has been reinforced to avoid similar breaches from happening in the time to come.