Cybersecurity3 hrs ago

Albany ENT Data Breach Settlement Offers Up to $7,500 Per Victim

Learn about the $550,000 settlement for the 2023 Albany ENT ransomware breach, claim deadlines, payout details, and defensive steps for organizations.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Albany ENT Data Breach Settlement Offers Up to $7,500 Per Victim
Source: ClaimdepotOriginal source

A $550,000 class‑action settlement compensates victims of a 2023 ransomware breach at Albany ENT & Allergy Services, offering up to $7,500 for proven losses and free credit monitoring. Claim forms are due October 23, 2024.

The breach occurred in March or April 2023 when ransomware actors infiltrated the clinic’s networks, exploiting weak authentication controls. Attackers exfiltrated patient and employee data, including Social Security numbers, birth dates, and medical records. The incident was discovered after unusual file encryption alerts triggered the clinic’s internal monitoring.

Under the settlement, Albany ENT & Allergy Services agrees to pay a total of $550,000 without admitting wrongdoing. Eligible class members may receive up to $7,500 for documented expenses such as bank fees, credit‑report costs, or identity‑theft mitigation. Those without documentation can elect a flat $50 payment. All claimants also receive two years of free three‑bureau credit monitoring and identity‑theft protection.

The settlement highlights how inadequate multi‑factor authentication and limited detection capabilities allowed ransomware to spread. Post‑breach, the clinic has deployed enhanced MFA, managed detection and response, stronger encryption, extended log retention, and a formal incident‑response plan.

What Defenders Should Do - Enforce phishing‑resistant MFA on all remote access points (MITRE ATT&CK T1078). - Deploy endpoint detection and response (EDR) with rules for known ransomware behaviors such as T1486 (Data Encrypted for Impact). - Segment critical systems and enforce least‑privilege access to limit lateral movement (T1021). - Maintain offline, encrypted backups and test restoration quarterly. - Apply patches for VPN and RDP services promptly; monitor for CVE‑2023‑XXXX disclosures related to remote‑access flaws. - Implement centralized logging with alerts for abnormal file‑encryption processes and unusual outbound traffic.

Watch for the final approval hearing on October 16, 2024, and any further regulatory actions that may arise from the breach.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...