{"id":7480,"date":"2022-09-17T15:54:17","date_gmt":"2022-09-17T06:54:17","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=7480"},"modified":"2022-11-21T15:57:37","modified_gmt":"2022-11-21T06:57:37","slug":"new-york-based-empress-emergency-medical-services-discloses-data-breach-after-ransomware-attack","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/new-york-based-empress-emergency-medical-services-discloses-data-breach-after-ransomware-attack\/","title":{"rendered":"New York-based Empress Emergency Medical Services discloses data breach after ransomware attack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7480\" class=\"elementor elementor-7480\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47da33a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47da33a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-184ed9d\" data-id=\"184ed9d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bae4fea elementor-widget elementor-widget-text-editor\" data-id=\"bae4fea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Thursday 14th of July 2022, Empress Emergency Medical Services (EMS), emergency response and ambulance service provider based in New York suffered a ransomware attack.<\/p><p>An investigation into the incident\u00a0revealed that the threat actor had gained access to Empress EMS\u2019 systems on Thursday 26th of May, 2022. The threat actor stayed in their systems until Wednesday 13th of July 2022, when they\u00a0exfiltrated a small selection of files before deploying ransomware.<\/p><p>\u201cSome of these files contained patient names, dates of service, insurance information, and in some instances, Social Security numbers,\u201d \u2013 Empress EMS disclosure.<\/p><p>Empress EMS has sent letters to affected individuals and has offered eligible individuals credit monitoring services. Empress EMS has also informed the U.S. Department of Health and Human Services that 318,558 individuals have been affected. Although there are concerns that more people might be impacted. Empress EMS has stated it has strengthened the security of its systems and protocols to prevent similar incidents from happening in the future.<\/p><p>Although Empress EMS has not disclosed the group responsible for the attack, it is believed that the Hive ransomware gang is responsible for the incident.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Thursday 14th of July 2022, Empress Emergency Medical Services (EMS), emergency response and ambulance service provider based in New York suffered a ransomware attack. An investigation into the incident&nbsp;revealed that the threat actor had gained access to Empress EMS\u2019 systems on Thursday 26th of May, 2022. The threat actor stayed in their systems until Wednesday 13th of July 2022,<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":7485,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[224,6,10,12,2,1],"tags":[],"class_list":["post-7480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-healthcare","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/11\/Picture1.jpg?fit=1378%2C923&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7480"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=7480"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7480\/revisions"}],"predecessor-version":[{"id":7488,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7480\/revisions\/7488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/7485"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=7480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=7480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=7480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}