Kansas healthcare provider says more than 220,000 impacted by cyberattack

Avatar

A Kansas healthcare provider with multiple urgent care facilities said a cyberattack in December exposed sensitive information from hundreds of thousands of people. 

Sunflower Medical Group said nearly 221,000 of its patients had information accessed by hackers who broke into their systems on December 15. The company notified regulators in Maine, Vermont and California and posted a notice on its website. 

Those affected potentially had their names, addresses, dates of birth, Social Security numbers, driver’s license numbers, medical information, and health insurance information leaked. 

The company said it initially discovered the breach on January 7 and hired a cybersecurity firm to investigate before it was discovered the hackers had been inside their systems since mid-December. The hackers made copies of Sunflower’s files.

Sunflower said it sent letters to all victims that it had valid addresses for and offered one year of credit monitoring services. 

The company did not say whether it was dealing with a ransomware attack and they have not reported any operational issues since December.

Sunflower operates four urgent care locations and multiple facilities that cover primary care, obstetrics and lab tests. 

The Rhysida ransomware gang took credit for the attack in January, threatening to leak the stolen data if a ransom of about $800,000 was not paid.

The group has repeatedly targeted healthcare facilities and nonprofits including Prospect Medical and Lurie Children’s Hospital in Chicago. 

News BriefsNewsPrivacyCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Trump administration ends FTC’s ransomware data breach case against MGM Resorts

Next Post

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

Related Posts

What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey

Access on-demand webinar here Avoid a $100,000/month Compliance Disaster March 31, 2025: The Clock is Ticking. What if a single overlooked script could cost your business $100,000 per month in non-compliance fines? PCI DSS v4 is coming, and businesses handling payment card data must be prepared. Beyond fines, non-compliance exposes businesses to web skimming, third-party script attacks, and
Avatar
Read More