By Kim Gale  |  February 12, 2020

Category: Legal News

Four seated doctors and one standing discuss information on a laptop computerHealth care records of more than 107,000 patients of Ferguson Medical Group in Missouri were attacked by ransomware on Sept. 21, 2019.

Hackers encrypted medical records obtained prior to Jan. 1, 2019 that were housed on a computer network used before Ferguson was acquired by Saint Francis Healthcare System, according to HealthITSecurity.com.

As soon as Saint Francis became aware of the issue, the company worked with the FBI and initiated actions to secure its network.

The hackers encrypted the medical records and asked the medical provider to pay a ransom. Once paid, the hackers alleged they would provide a key to break the encryption of the data. The hospital decided the hackers could not be trusted to turn over a decryption key, and decided not to pay the ransom. Most of the data was recovered through the use of backup files, according to HIPAAJournal.com.

Unfortunately, files of patients who received care at Ferguson between Sept. 20, 2018 and Dec. 31, 2018 were unable to be retrieved.

So far, there has been no indication that the hackers downloaded any information from the patient records before encrypting the data. No patients have reported having their personal information misused as a result of the ransomware attack, but affected patients have been offered credit monitoring and identity theft protection services at no charge for an unpublished amount of time.

Of the 107,054 affected patients, the number who had any health data lost because of the incident is unknown.

Ferguson Medical Group Ransomware Attack

The ransomware attack on the small health care center in Sikeston, Mo., where the population is just over 16,100, highlights the vulnerability of older computer systems in small towns.

Even though Ferguson Medical Group was bought out by Saint Francis Medical Center in early 2019, Ferguson’s older computer system was the one that became the target of hackers.

According to CRN.com, ransomware attacks cost more than $7.5 billion in the U.S. in 2019 alone. A report by Emsisoft released in December said nearly 950 healthcare facilities, government agencies and schools were hit by hackers who demanded money for the release of the encrypted or stolen data last year.

According to Fleming Shi, chief technology officer at Barracuda, a cybersecurity firm, “Smaller towns are often more vulnerable because they lack the technology or resources to protect against ransomware attacks.”

Similarly, small businesses, especially health care providers, are targeted by ransomware attacks because the computer system of a small care facility would likely be easier to hack than that of a large business that has the money and equipment to enforce many layers of cyber protection.

In many cases, an unsuspecting employee will open a phishing email, exposing the entire network to a computer virus or ransomware attack.

“Email is the most common threat vector for these types of ransomware attacks, but the blast radius can easily reach networks, applications and a wide variety of sensitive and critical data,” writes Shi.

Medical facilities will likely remain popular targets for ransomware attacks because if the hacker downloads patient information before encrypting it, the hacker could attempt to sell patients’ personal information on the dark web where it can be used in identity theft and other scams.

Join a Free Hospital Ransomware Attack Class Action Lawsuit Investigation

If you were a patient at a hospital or healthcare facility affected by a ransomware attack that impacted your medical care, you may qualify to join a hospital ransomware attack class action lawsuit investigation.

Learn More

This article is not legal advice. It is presented
for informational purposes only.

We tell you about cash you can claim EVERY WEEK! Sign up for our free newsletter.


Leave a Reply

Your email address will not be published. By submitting your comment and contact information, you agree to receive marketing emails from Top Class Actions regarding this and/or similar lawsuits or settlements, and/or to be contacted by an attorney or law firm to discuss the details of your potential case at no charge to you if you qualify. Required fields are marked *

Please note: Top Class Actions is not a settlement administrator or law firm. Top Class Actions is a legal news source that reports on class action lawsuits, class action settlements, drug injury lawsuits and product liability lawsuits. Top Class Actions does not process claims and we cannot advise you on the status of any class action settlement claim. You must contact the settlement administrator or your attorney for any updates regarding your claim status, claim form or questions about when payments are expected to be mailed out.