BreachExchange mailing list archives

Lutheran Social Services discovers possible security breach on computer system


From: Erica Absetz <erica () riskbasedsecurity com>
Date: Thu, 9 May 2013 10:23:50 -0400

http://www.ydr.com/crime/ci_23198082/lutheran-social-services-discovers-possible-security-breach-computer

Hackers targeted Lutheran Social Services of South Central
Pennsylvania on Wednesday, remotely planting disruptive software on
its computer system, according to a news release.

That means that potentially, residents' personal information,
including names, date-of-birth, social security number, Medicare
numbers could have been accessed, the release states.

The agency quickly dispatched computer experts to investigate the
extent and possible source of the malware.

"We shut the spigot off right away," Lutheran Social Services
spokeswoman Crystal Hull said Thursday.

Hull said that the agency is required by U.S. Department of Health &
Human Services to notify those who may have been affected by the
security breach.

"We don't see evidence that they did (access the information), but we
can't definitively prove that they didn't," Hull said.

Established in 1951, Lutheran Social Services of South Central
Pennsylvania provides residential living, personal care and nursing
and rehabilitation services in six senior living communities; home
care and hospice services; and a range of community outreach services,
the release states.
_______________________________________________
Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.


Current thread: