Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Healthcare Cybercriminal Receives 10-Year Prison Sentence

  • adminadmin
  • November 16, 2024
  • data-breaches

A hacker linked to 19 network breaches across the United States, including a notable incident involving a medical facility, has received a prison sentence of 10 years, as confirmed by the U.S. Department of Justice (DOJ) on Wednesday. Robert Purbeck, 45, originally from Idaho but residing in Georgia, was found to have employed stolen login credentials acquired from the dark web to infiltrate the servers of a medical clinic located in Griffin, Georgia. During this breach, he accessed and pilfered personal information from over 43,000 patients, compromising sensitive data such as full names, addresses, dates of birth, and Social Security numbers.

Purbeck’s tactics extended beyond the medical clinic; he also exploited similar vulnerabilities to breach the network of the City of Newnan, Georgia. This breach included the city’s police department systems, where he accessed and extracted various incident reports and official documents. The targeting of multiple municipal agencies and their associated individuals highlights a broader spectrum of vulnerability within local government networks, an area of increasing concern for cybersecurity professionals.

In yet another instance, Purbeck redirected his attention towards a Florida orthodontist, where he engaged in harassment of the business owner and attempted to extort a ransom in Bitcoin by holding sensitive data hostage. His strategy involved reaching out to the clinic’s customers through email and text as part of his ransomware scheme, showcasing an alarming trend of putting personal data at risk for financial gain.

From a cybersecurity perspective, Purbeck’s activities may demonstrate methods described in the MITRE ATT&CK framework, particularly in tactics and techniques used for cyber intrusions. Initial access seems to have been achieved through phishing or credential dumping, enabling him to establish a foothold in the target systems. Once inside, he likely employed techniques associated with privilege escalation to navigate through different systems, ultimately causing significant data breaches.

This case underscores the ongoing risks faced by organizations in various sectors, from healthcare to local government. The use of stolen credentials not only jeopardizes individual privacy but also raises alarms regarding the resilience of cybersecurity measures in place. Business owners, particularly those handling sensitive information, are urged to bolster their defenses against similar attack vectors that can result in severe reputational and financial repercussions.

The repercussions of such breaches extend beyond immediate damages, as both public and private entities increasingly face scrutiny from regulators and stakeholders regarding their data protection practices. As cyber threats evolve, the need for comprehensive cybersecurity strategies becomes paramount, reinforcing the importance of constant vigilance and proactive measures to safeguard critical information.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T Change Healthcare CISA Cisco cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management Generative AI GitHub Google healthcare HIPAA identity theft LockBit machine learning Malware Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salt Typhoon Signal T-Mobile Telegram Verizon

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

Another Billing Software Provider Victimized by Ransomware Attack

  • June 30, 2025

Reevaluating IT Risk Assessments in Operational Technology Environments

  • June 30, 2025

Ahold Delhaize Reports Data Breach Affecting 2.2 Million Customers

  • June 30, 2025

AI Boss Falters Dramatically in Month-Long Business Challenge

  • June 30, 2025

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: [email protected]
Phone: +1 (914) 2943243

Copyright © 2025 - Breachspot, Security Breaches Spotted