Migliaccio & Rathod LLP is involved in the TriHealth Data Breach Investigation, for a breach that affected 27,426 individuals and their personal information.
On November 11, 2024, TriHealth H, LLC d/b/a TriHealth Physician Partners (“TriHealth”) announced that it was victimized by a targeted ransomware attack. Subsequently, TriHealth conducted an investigation into the data security incident, which uncovered that a cybercriminal accessed its medical records system containing the personally identifiable information of TriHealth patients. The compromised information potentially includes the following sensitive data:
- names
- Social Security numbers
- physical addresses
- dates of birth
- health records
- insurance identification
TriHealth Data Breach
TriHealth recently sent notice of the data breach to impacted parties. The company also posted notice to the HHS portal. All of the information stolen is likely valuable and dangerous to affected victims. As is likely to be the case with the TriHealth data breach, in previous cyberattacks, victims of data theft have noticed identity theft attempts ranging from fraudulent charges on bank accounts or credit cards, to unauthorized credit card applications, to medical services or government services ordered in their name, to their information being posted on the dark web, to a massive uptick in the number of spam text messages, calls and emails received.
Are you a patient of TriHealth concerned that you might be affected by this data breach?
If you have concerns that you have been affected by this data breach, and/or have experienced suspicious activity since October 22, 2024, we would like to hear from you. Please complete the contact form on this page, send us an email at [email protected], or give us a call at (202) 470-3520.
The lawyers at Migliaccio & Rathod LLP have years of experience in class action litigation against large corporations, including in cases involving data breaches such as this. More information about our current cases and investigations is available on our blog.