The Lake Charles Memorial Health System (LCMHS) has been affected by a data breach affecting 270,000 people.
LCHMS is the major medical facility in Lake Charles, Louisiana, a primary unity for uninsured citizens with 54 bed women’s division and 42 bed behavioral unit.
As per Louisiana hospital, the cybersecurity event occurred on Oct 21, 2022 when the security team identified malicious activity on their network.
After a detailed investigation, it is found that the hackers had gained access to Louisiana hospital network and have stolen sensitive data from the healthcare entity.
The stolen data includes patient name, address, date of birth, medical records, patient identification numbers, payment details, insurance data, and social security numbers.
Louisiana hospital has been emailing the affected patients about the incident since December 23, 2022.
“We are offering individuals whose Social Security number may have been included with complimentary credit monitoring and identity theft protection services. Patients are encouraged to review statements from their health insurer and healthcare providers, and to contact them immediately if they see any services they did not receive.” – Louisiana hospital
The cybersecurity incident has been reported to U.S.Department of Health and Human Services (HHS), and as per healthcare related breached it is now reported that 269,752 patients have been affected by the LCMHS data breach.
The Hive ransomware group has listed LCMHS on its data leak, which is done when the ransom isn’t received for the stolen data.
As per Hive ransomware operators claim the encryption happened on Oct 25, 2022. The stolen files are published on their site, including cards, contracts, medical info, papers, scans, residents, and medical info.
If you are among those affected individuals that had received care from the LCMHS in the past, it is best to stay vigilant for anonymous communication with respect to your personal data.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.
You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…