Uniontown Hospital among cyberattack targets
The hacking group Anonymous says it accessed computers at Uniontown Hospital and posted online information that includes names, phone numbers, street addresses and email addresses for doctors and people who signed up for a hospital newsletter.
With big name companies such as Burger King, Jeep, Apple and Twitter coming forward in recent days to say they've been hacked, it's easy to forget that smaller targets are at risk.
The 224-bed Uniontown Hospital is Fayette County's top private employer, with a medical staff of about 200 and an annual budget of about $140 million.
The breach occurred two years ago, James Proud, the hospital's vice president of human resources and marketing, told the Tribune-Review on Tuesday. He said the information posted did not include medical records or more personal information such as Social Security numbers or credit card numbers. The hospital fixed the problem but cannot stop hackers from sharing the information.
“We're aware of it,” Proud said. “We fixed it. ... There is no penetration now.”
But a data breach blogger who volunteers for the Open Security Foundation, a Virginia nonprofit that looks for hacks and alerts those affected by breaches, said the Uniontown Hospital data was posted in December.
Soon after, links to the data appeared on social media sites and websites used by hackers and computer security experts who try to identify breaches. When the hospital did not respond to warnings, the blogger — who asked not to be identified to be protected from attack — reached out to the Trib out of concern for the affected people.
The information that was taken is “not benign” because it could be used for spear-phishing attacks in which criminals use a few details to trick victims into divulging more, said Eric Chapman, deputy director of the Maryland Cybersecurity Center at the University of Maryland. But the theft is not as serious as if the hackers had accessed bank information or more personal data, he said.
The bigger concern is that these sorts of attacks happen regularly at organizations big and small, he said.
“It seems like that's becoming a mainstream sport,” Chapman said. “That's troubling. It's certainly up for debate whether they're doing something for the public good.”
As soon as databases of any kind go online, attackers start looking for targets of opportunity, said Kevin Kjosa, assistant director of the Center for Infrastructure Assurance and Security at the University of Texas at San Antonio.
“I am not surprised at all,” he said. “The idea of a small hospital being attacked is unfortunately going to become more common.”
Several people whose data was posted online said they had not been contacted by the hospital.
Notification wouldn't have made any difference, said Mary Ann Ealy, 51, of Waynesburg. She keeps close track of her bills and the email address that was posted has been out of use since 2011. Still, she remains suspicious about the Web.
“The Internet is the failure of our country, I believe,” she said. “There's too much information out there for people.”
Andrew Conte is a staff writer for Trib Total Media. He can be reached at 412-320-7835 or firstname.lastname@example.org.
Add Andrew Conte to your Google+ circles.
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
- Demand for surveillance systems boosts sales for Vector Security
- Cyber Monday increasingly a ‘blah-iday’ as deals rolled out earlier, longer
- Fed slashes its emergency power options in crisis
- Pennsylvania Game Commission reaps revenue from shale gas under game lands
- Distractions can help keep riders alert in self-driving cars, study finds
- Stocks dip on lower holiday spending fears
- University of Pittsburgh researchers revisit war of electric currents
- IMF adds China’s yuan to basket of top currencies
- Energy Spotlight: Minking Chyu
- As historic breakup nears, Alcoa works to redefine its ‘advantage’
- Yahoo investors losing patience with ‘star’ CEO Marissa Mayer