Mālama I Ke Ola Health Center experienced a security incident resulting in unauthorized access.
In May 2024, the Community Clinic of Maui, Inc., known as Mālama I Ke Ola Health Center, suffered a data breach as a result of a ransomware attack. Comapritech, amongst other news outlets, reports that Lockbit has taken responsibility for the attack on the dark web. The incident impacted the clinic's network connectivity, leading to the unauthorized access and potential compromise of thousands of individuals. Following the breach, the clinic was forced to shut down operations for two weeks. Mālama has since released notices of the security incident to affected persons.
LockBit is a notorious ransomware group known for its sophisticated cybercrime operations. In February 2024 global law enforcement agencies from eleven countries united to dismantle the cybercrime organization. With estimated profits exceeding $120 million and over 2,000 victims. LockBit, primarily composed of Russian individuals operates independently of any state backing.
Related: Global law enforcement attempts a takedown of LockBit ransom group
On their website, Mālama I Ke Ola Health Center stated, “After an extensive forensic investigation and comprehensive document review, on August 7, 2024, Mālama determined personal data may have been subject to unauthorized access and acquisition between May 4, 2024, and May 7, 2024.”
In the Comparitech article on the breach, Paul Bischoff states, “Ransomware gang LockBit claimed responsibility for the attack shortly after it occurred and demanded a ransom payment by June 11, 2024.”
As a healthcare organization serving thousands of patients, breaches like the one affecting Mālama I Ke Ola Health Center have the ability to hinder healthcare operations. As ransomware attacks become more sophisticated, the periods of time during which patient care is compromised.
Related: HIPAA Compliant Email: The Definitive Guide
Organized cybercriminal organizations that deploy malicious software to encrypt a victim's data and demand a ransom for its release.
Gaining entry to a system, network, or data without permission.
Phishing emails that trick users into downloading malicious attachments, exploiting software vulnerabilities.