BA Depicted by OCR as Example of Ransomware Dangers Recovered Quickly, Didn’t Expect Fine

Health Care Compliance Association (HCCA)
Contact

Health Care Compliance Association (HCCA)

Report on Patient Privacy 23, no. 11 (November, 2023)

Tim DiBona clearly remembers Christmas Eve 2018 when the staff of his small firm—Doctors’ Management Service (DMS)—arrived at their West Bridgewater, Mass., office to find their computer system down. “We realized right away what was happening—that it was a ransomware attack,” he recalled. The demand for $20,000 was uncovered, but with backup records, no payment was necessary.

“We kicked the perpetrator out, we restored our backups,” said DiBona, CEO of the business his mother, Barbara, founded in their garage 35 years ago. “The following day was Christmas. The day after that, we were back in the office. Everything was fine.” DMS, a business associate (BA), hired forensic experts to investigate the attack, later learning it had been infiltrated in 2017, apparently one of the first U.S. victims of “GandCrab” ransomware.

DMS, whose CFO is Tim’s brother, Rich, notified some 290,000 patients whose records it held as part of its billing, practice management, provider credentialing and related services firm. It set up a call center, offering patients credit monitoring services. In April 2019, DMS also filed a breach report with the HHS Office for Civil Rights (OCR). Thus began a saga that became public when OCR announced on Oct. 31 that DMS had agreed to pay $100,000 and implement a three-year corrective action plan (CAP) to resolve alleged HIPAA violations.[1]

OCR portrayed DMS as the poster child for the dangers of ransomware, noting it is a “type of malware (malicious software) designed to deny access to a user’s data, usually by encrypting the data with a key known only to the hacker who deployed the malware, until a ransom is paid.” OCR noted the settlement “marks the first ransomware agreement OCR has reached.”

But, in an extensive interview with RPP, Tim DiBona disputed OCR’s depiction of DMS and expressed shock, as well as disappointment, that OCR took formal enforcement action against DMS. He described the nearly five-year process of getting to the resolution as “frustrating” and, at times, “terrifying.” OCR did not respond to RPP’s questions about the investigation and settlement.

DiBona felt so strongly that DMS—which has eight employees—had acted appropriately in response to the breach and its prior compliance efforts that he asked OCR not to mention the company name in the settlement announcement—something the agency obviously did not agree to.

The $100,000 penalty was also significantly higher than DMS felt it should pay. OCR, however, wanted to impose a higher fine—DiBona said he couldn’t recall the exact amount. He counteroffered $30,000, but $100,000 was the lowest the agency would go, DiBona said.

According to OCR, the “unauthorized party” entered DMS’ network on April 1, 2017, and “deployed ransomware” a year later on Christmas Eve, when the staff discovered it, as DiBona also described to RPP.[2]

DiBona said the hacker got in through a “remote desktop connection,” which was an area where DMS actually tightened up access, coincidentally, in 2018, before it knew the perpetrator was already inside.

“We had already cancelled the VPN [virtual private network], but they had already started jumping from computer to computer. It took them [time], but once they got to our server, that’s when they shut everything down,” DiBona said, relaying what forensic investigators told him.

Announced Oct. 31, OCR Director Melanie Fontes Rainer said the agreement “highlights how ransomware attacks are increasingly common and targeting the health care system. This leaves hospitals and their patients vulnerable to data and security breaches. In this ever-evolving space, it is critical that our health care system take steps to identify and address cybersecurity vulnerabilities, along with proactively and regularly review risks, records, and update policies. These practices should happen regularly across an enterprise to prevent future attacks.”

In the announcement, OCR shared data about ransomware, stating that “in the past four years, there has been a 239% increase in large breaches reported to OCR involving hacking and a 278% increase in ransomware. This trend continues in 2023, where hacking accounts for 77% of the large breaches reported to OCR. Additionally, the large breaches reported this year have affected over 88 million individuals, a 60% increase from last year.”

OCR didn’t discuss how DMS handled the attack—such as the fact that no ransom was paid and disruption to the business was minimal. DiBona also told RPP there have been no reports of fraud, identity theft or other misuse of DMS’s records.

“We were very happy about that because there was certainly…the potential, but I don’t think this perpetrator really knew what they had in their possession at the time.” DiBona added that he’s always been a “big hawk” about medical privacy, even making YouTube videos for organizations like his because “HIPAA education typically is much more focused on hospitals and medical practices.”

[View source.]

Written by:

Health Care Compliance Association (HCCA)
Contact
more
less

Health Care Compliance Association (HCCA) on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide