Brookshire Dental Hit by Qilin Ransomware, 96 GB Data Claimed Stolen

Incident Date:

August 26, 2024

World map

Overview

Title

Brookshire Dental Hit by Qilin Ransomware, 96 GB Data Claimed Stolen

Victim

Brookshire Dental - Hospitals & Clinics

Attacker

Qilin

Location

Brookshire, USA

Texas, USA

First Reported

August 26, 2024

Qilin Ransomware Group Claims Attack on Brookshire Dental

Brookshire Dental, a healthcare provider based in Hurst, Texas, has reportedly fallen victim to a ransomware attack orchestrated by the Qilin ransomware group. The incident has not yet been officially acknowledged by Brookshire Dental, nor is it listed on the OCR breach portal or the Texas Attorney General's website. According to a blog post by Qilin dated August 12, the group claims to have exfiltrated 96 GB of data during the attack. Despite these claims, none of the purportedly stolen data has been made available for download as of now.

About Brookshire Dental

Brookshire Dental is a comprehensive dental practice located in Brookshire, Texas, providing a wide range of dental services to patients of all ages. The practice offers general dentistry, cosmetic dentistry, restorative treatments, and preventive care. Key services include routine cleanings and exams, fillings, crowns and bridges, dental implants, teeth whitening, and orthodontic treatments like Invisalign. The practice is led by experienced dentists committed to delivering personalized, patient-focused treatment.

Brookshire Dental is a small practice, employing between 2 to 10 people. This size allows for a more personalized experience for patients, as staff members can develop close relationships with their clientele. The clinic emphasizes the use of advanced techniques and state-of-the-art technology to enhance patient care and treatment outcomes. The practice is also actively involved in the local community, supporting area schools through donations and sponsorships.

Attack Overview

The Qilin ransomware group, also known as Agenda, is a sophisticated Ransomware-as-a-Service (RaaS) operation believed to be of Russian origin. It first appeared in October 2022 and has since targeted various organizations, including healthcare providers, automotive companies, and government agencies. Qilin uses advanced tactics, such as data exfiltration and double extortion, to pressure victims into paying ransoms. The group has been particularly active in the healthcare sector, causing significant disruptions to hospitals and medical services.

In the case of Brookshire Dental, Qilin claims to have exfiltrated 96 GB of data. The exact method of penetration remains unclear, but common vulnerabilities exploited by ransomware groups include outdated security patches, weak passwords, and insufficient network segmentation. Given the healthcare sector's reliance on sensitive patient data, the impact of such an attack can be particularly severe.

About Qilin Ransomware Group

Qilin distinguishes itself through its adaptability and cross-platform capabilities, symbolized by its name derived from a mythical Chinese creature. The group employs a Ransomware-as-a-Service model, allowing affiliates to use its ransomware in exchange for a share of the ransom payments. Qilin has been involved in several high-profile attacks, including a suspected ransomware attack against Synnovis, a pathology services firm in London, which led to a critical incident at several hospitals.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.