Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

One Brooklyn Reaches $1.5 Million Settlement in 2022 Hacking Lawsuit

  • adminadmin
  • November 16, 2024
  • data-breaches

Healthcare,
Industry Specific,
Legislation & Litigation

Cyberattack on Health System Compromises Data of Over 235,000 Individuals

Marianne Kolbasuk McGee (HealthInfoSec) •
November 15, 2024

One Brooklyn Agrees to $1.5M Settlement in 2022 Hack Lawsuit

A New York state court has granted preliminary approval for a $1.5 million settlement related to a class-action lawsuit against One Brooklyn Health System. This legal action arose following a cyberattack in November 2022, which exposed sensitive health information of over 235,000 individuals, affecting patients, employees, and their families.

The incident involved multiple One Brooklyn facilities, including the Brookdale Hospital Medical Center, Interfaith Medical Center, and Kingsbrook Jewish Medical Center, alongside various nursing homes and health clinics. Legal representations accused One Brooklyn of negligence regarding the safeguarding of personally identifiable information (PII) and protected health information (PHI), thus increasing the risk of identity theft and fraud.

Furthermore, the lawsuit asserted violations of New York state consumer protection laws, as the organization allegedly failed to promptly notify affected individuals about the breach. One Brooklyn has unequivocally denied these allegations.

The proposed settlement allows eligible class members to claim up to $2,500 for documented out-of-pocket expenses and time spent addressing the breach’s ramifications, capped at four hours at $25 per hour. Additionally, claimants are entitled to two years of credit monitoring from all three major credit bureaus.

An alternative cash payment option will also be available, determined after deducting claims and expenses from the settlement fund. In addition to these compensations, the agreement includes $1,000 service awards to the eight plaintiffs involved. Legal representatives for the plaintiffs are seeking up to one-third of the settlement fund, estimated at $500,000, alongside reimbursement for litigation-related expenses.

Moreover, the settlement mandates that One Brooklyn enhance its data security measures, funding these enhancements separately from the settlement fund. The specific improvements to data security are not detailed in court documents.

A final approval hearing for the settlement is scheduled for February 26, 2025, in the Kings County Supreme Court of New York.

Breach Overview

The class-action lawsuit centers on a breach detected as suspicious activity on One Brooklyn’s network in November 2022, which disrupted access to various IT systems, including electronic health records and patient portals, for more than a month. According to a breach notification released by One Brooklyn in 2023, the investigation revealed that a limited amount of data was accessed between July 9, 2022, and November 19, 2022.

Cybercriminals managed to gain unauthorized access and exfiltrate PII from more than 235,000 individuals, revealing names, Social Security numbers, driver’s license numbers, dates of birth, financial details, medical histories, and health insurance information.

While One Brooklyn has not disclosed whether ransomware was implicated in this incident, the report to the U.S. Department of Health and Human Services characterized it as a hacking incident involving 500 individuals, which appears to be a placeholder estimate; further reports indicated it affected 235,251 people.

Despite requests for comment, One Brooklyn’s legal representatives did not respond immediately. Benjamin Johns of Shub & Johns LLC, representing the plaintiffs, expressed satisfaction with the court’s preliminary approval of the settlement and anticipated presenting it for final approval.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Android Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T AWS CISA Cisco Cloudflare cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management GitHub Google healthcare HIPAA Kaspersky machine learning Malware Mandiant Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salesforce Telegram Trend Micro Windows

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

🔍 Weekly Roundup: iPhone Spyware, Microsoft 0-Day Vulnerability, TokenBreak Breach, AI Data Leaks, and More!

  • April 30, 2026

⚡ Weekly Cybersecurity Update: BadCam Attack, WinRAR Exploits, EDR Threats, NVIDIA Vulnerabilities, Ransomware Incidents & More

Published: Aug 11, 2025

This week has highlighted the rapid pace of cyber threats, urging businesses to remain vigilant. Attackers are uncovering vulnerabilities in widely-used software and utilizing innovative tactics to bypass security measures. Even a single unpatched vulnerability can create pathways for data breaches or unauthorized system access. Time is of the essence—failure to regularly update defenses can result in severe consequences. The imperative is clear: proactive measures are essential to safeguard your business.

Here’s a summary of the most significant cybersecurity developments this week, including recent flaws in WinRAR and NVIDIA Triton, along with essential advanced attack strategies to be aware of. Let’s dive into the details.

⚡ Threat of the Week
Trend Micro Issues Warning on Actively Exploited 0-Day — Trend Micro has provided temporary mitigations to tackle serious security vulnerabilities in on-premise versions of Apex One Management Console, which are reportedly being exploited in the wild. The flaws include CVE-2025-54948 and CVE-2025-54987.

  • April 30, 2026

Cybercrime Groups ShinyHunters and Scattered Spider Unite for Targeted Extortion Campaign Against Businesses

August 12, 2025
Cybercrime / Financial Security

A continuing data extortion initiative targeting Salesforce clients may soon expand its focus to encompass financial services and tech providers, as recent findings suggest collaboration between ShinyHunters and Scattered Spider. “This latest series of attacks attributed to ShinyHunters indicates a significant tactical shift, moving past their prior methods of credential theft and database exploitation,” reports ReliaQuest to The Hacker News. Their new approach incorporates strategies akin to those used by Scattered Spider, including highly-targeted vishing (voice phishing) and social engineering tactics, the use of applications that pose as legitimate tools, and Okta-themed phishing pages to deceive victims into revealing credentials during vishing attempts, alongside VPN obfuscation for data exfiltration. ShinyHunters, which first emerged in 2020, is a financially motivated group that has executed numerous data breaches targeting major corporations.

  • April 30, 2026

Charon Ransomware Targets Middle East Industries with Advanced Evasion Techniques

Aug 13, 2025
Endpoint Security / Cybercrime

Cybersecurity researchers have unveiled a new campaign featuring an undocumented ransomware variant named Charon, targeting the public sector and aviation industry in the Middle East. According to Trend Micro, the attackers employed tactics reminiscent of advanced persistent threat (APT) groups, including DLL side-loading and process injection, successfully evading endpoint detection and response (EDR) systems. The use of DLL side-loading parallels techniques associated with the China-linked hacking group Earth Baxia, which has previously targeted government entities in Taiwan and the Asia-Pacific region to deploy a backdoor known as EAGLEDOOR, following the exploitation of a now-patched vulnerability in OSGeo GeoServer GeoTools. “The attack chain utilized a legitimate browser-related file, Edge.exe (originally cookie_exporter.exe), to sideload a…”

  • April 29, 2026

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: info@breachspot.com
Phone: +1 (914) 2943243

Copyright © 2026 - Breachspot, Security Breaches Spotted