MHF Community Board
Notifications
Clear all

2.9 billion records, including Social Security numbers, stolen in data hack: What to know

3 Posts
1 Users
0 Reactions
695 Views
Abigail Nobel
(@mhf)
Member Admin
Joined: 4 years ago
Posts: 1179
Topic starter  

USA Today's report of the Social Security data breach proves the old saying, "Don't put all your eggs into one basket."

Across multiple industries, market consolidation is exposing consumers to excessive risk.

As we rely more heavily on a reduced number of service providers, individual data breaches produce greater damage. This is especially true in healthcare, including the Social Security system and its numeric system overused as ID. 

Audio clipped here for length is available at the original article.

https://www.usatoday.com/story/tech/2024/08/15/social-security-hack-national-public-data-breach/74807903007/?

2.9 billion records, including Social Security numbers, stolen in data hack: What to know

Emily DeLetter    |      August 16, 2024

The hacking group USDoD claimed it had allegedly stolen personal records of 2.9 billion people from National Public Data, according to a class-action lawsuit filed in U.S. District Court in Fort Lauderdale, Florida, reported by Bloomberg Law. The breach was believed to have happened in or around April, according to the lawsuit.

Here's what to know about the alleged data breach.

What information is included in the data breach?

The class-action law firm Schubert, Jonckheer & Kolbe said in a news release that the stolen file includes 277.1 gigabytes of data, and includes names, address histories, relatives and Social Security numbers dating back at least three decades.

According to a post from a cybersecurity expert on X, formerly Twitter, USDoD claims to be selling the 2.9 billion records for citizens of the U.S., U.K. and Canada on the dark web for $3.5 million.

Since the information was posted for sale in April, others have released different copies of the data, according to the cybersecurity and technology news site Bleeping Computer.

A hacker known as "Fenice" leaked the most complete version of the data for free on a forum in August, Bleeping Computer reported.

What is National Public Data?

National Public Data is a Florida-based background check company operated by Jerico Pictures, Inc. USA TODAY has reached out to National Public Data for comment.

The company has not publicly confirmed a data breach, but The Los Angeles Times reported that it has been telling people who contacted via email that "we are aware of certain third-party claims about consumer data and are investigating these issues."

What to do if you suspect your information has been stolen

If you believe your information has been stolen or has appeared on the dark web, there are a few steps you can take to prevent fraud or identity theft.

Money.com recommends taking the following steps:

  • Make sure your antivirus is up to date and perform security scans on all your devices. If you find malware, most antivirus programs should be able to remove it, but in some cases you may need professional help.
  • Update your passwords for bank accounts, email accounts and other services you use, and make sure they are strong and different for every account. Include uppercase and lowercase letters, numbers and punctuation marks, and never use personal information that a hacker could guess.
  • Use multifactor authentication for any accounts or services that offer it to ensure you are the person logging in.
  • Check your credit report, and report any unauthorized use of of your credit cards. If you notice any suspicious activity, you can ask credit bureaus to freeze your credit.
  • Be careful with your email and social media accounts, and beware of phishing, an attempt to get your personal information by misrepresenting who a message or email is from.



   
ReplyQuote
Abigail Nobel
(@mhf)
Member Admin
Joined: 4 years ago
Posts: 1179
Topic starter  

Healthcare Brew teases out the pain points and market flaws shown in a blood bank cyberattack.

https://www.healthcare-brew.com/stories/2024/08/13/ransomwares-newest-target-blood-banks

Ransomware’s newest target? Blood banks

As cyberattacks on blood banks rise, experts worry the US healthcare system isn’t ready for a future breach.
By Caroline Catherman    |    August 13, 2024

When hackers set their sights on a blood bank, the stakes aren’t just high, they’re life or death.

The nation saw that firsthand after a ransomware attack on July 29 against Florida-based blood bank OneBlood disrupted patient care, delayed elective procedures, and prompted the bank to tell more than 250 southeast hospitals to temporarily activate critical blood shortage protocols.

The hack knocked some of OneBlood’s systems offline, forcing staff to manually perform normally automated steps like blood labeling, according to a press release, which significantly slowed down deliveries to hospitals. In response, blood banks nationwide scrambled to send supplemental blood and platelets, an effort that the Association for the Advancement of Blood and Biotherapies (AABB) coordinated.As of August 8, business was back to normal and those supplemental shipments were no longer needed, the press release said. But the industry isn’t out of the woods yet.

Rewinding. The hack is one of three recent major worldwide attacks on life-sustaining supply chains, like blood banks, a joint threat bulletin by the American Hospital Association and the nonprofit Health Information Sharing and Analysis Center stated.

In April, the BlackSuit ransomware gang claimed it had hacked blood plasma provider Octapharma, which took its systems offline and closed 176 US plasma donation centers from April 17 to April 25, the company shared on its website.

“There appears to be a shift in pattern here, or a trend emerging, where Russian ransomware groups may be targeting life-critical and mission-critical supply chain[s], including blood supply,” John Riggi, the American Hospital Association’s national advisor for cybersecurity and risk, told Healthcare Brew.

Third-party supply chains tempt hackers because, instead of impacting one system like might happen in a targeted cyberattack, they can “cause maximum disruption to the healthcare sector,” Riggi said. What’s more, though experts typically “strongly discourage” paying ransoms, companies may pay if patients’ lives are in danger.

“It’s the equivalent of a life-threatening extortion,” he said.

Looking forward. And industry experts are worried the US isn’t doing enough to combat hackers.

“Clearly, the US government, collectively, as a policy, needs to do more to increase risk and consequence,” Riggi said. “Bottom line: These attacks are not only still occurring—they’re occurring at an increased pace.”

Riggi recommends health systems create backup plans that allow them to operate with a lack of access to critical supplies—like blood—from third-party vendors for 30 days or longer.

But Florida Hospital Association President and CEO Mary Mayhew said it’s difficult to have a backup plan in place due to how blood suppliers operate, especially in Florida, which gets over 80% of its blood from OneBlood. During the outage, Florida hospitals postponed transplant surgeries, and some pediatric patients lost access to life support extracorporeal membrane oxygenation (ECMO) machines because platelets weren’t available, Mayhew said.

Though hospitals got supplemental shipments, “they weren’t getting anywhere near enough,” she said—perhaps 20%–30% of their platelet supply, “if any.”

The issue was compounded because Florida hospitals weren’t allowed to have contracts with backup blood vendors; “OneBlood demanded that the contracts be exclusive,” Mayhew added.

“It wasn’t that hospitals wanted the exclusivity; OneBlood required the exclusivity in their contracts with hospitals,” Mayhew said.

This meant the hospitals had to spend extra time during the time-sensitive crisis identifying other blood centers, establishing relationships, and securing the blood.

Forbes told Healthcare Brew that “OneBlood does not have exclusive contracts with hospitals. The contracts state that OneBlood will be the hospital’s blood provider.” Hospitals “may obtain blood products from other suppliers to the extent the products are not available from OneBlood in a timely manner,” she said. “During the ransomware event, at no time did OneBlood request or prohibit any hospital it serves from obtaining blood products from other suppliers.”

Hospitals were also hampered by limited data about the national blood supply, Mayhew said. Leaders were left in the dark about how much blood they were going to get day to day and how much time shipments would have before their expiration dates, which made it difficult to make clinical decisions about what procedures and transfusions could be safely done.

“There is very little data transparency around that blood supply that would have better informed the predictability for hospitals of what they could anticipate receiving,” she said. “For nearly a week, they did not know what they were going to receive from OneBlood, and what they were receiving—if they received any—was substantially less than what they needed.”

Reinforcing the elemental truth that healthcare is first of all local.



   
ReplyQuote
Abigail Nobel
(@mhf)
Member Admin
Joined: 4 years ago
Posts: 1179
Topic starter  

Consolidated Pharma succumbed to data breach early in 2024, as reported by CyberGuy.

Clipped for length; the final segment includes pro tips to shield your sensitive information.

https://cyberguy.com/news/pharma-giants-data-breach-exposes-patients-sensitive-information/

Pharma giant’s data breach exposes patients’ sensitive information

Protect your sensitive information from bad actors with these 7 steps

June 16, 2024

US pharmaceutical giant Cencora has been affected by a data breach. The company is notifying affected individuals that their personal and highly sensitive medical information was stolen during a cyberattack and data breach earlier this year. This includes patient names, postal addresses, dates of birth, as well as information about their health diagnoses and medications.

What happened: A breakdown of events

Cencora has not yet described the nature of the cyberattack. However, a report claims the attack began on February 21 and was not publicly disclosed until the company filed notice with government regulators a week later on February 27.

The pharmaceutical company, known as AmerisourceBergen until 2023, handles around 20% of the pharmaceuticals sold and distributed throughout the US. It’s unclear if Cencora has determined how many individuals are affected by the breach. The company says it has identified and notified roughly half a million individuals impacted by the data breach so far. However, Cencora acknowledged that it lacks complete address information for some affected people, so it published a notice on its website to reach them.

The cyberattack on pharmaceutical giant Cencora came to light shortly after another attack that disrupted Ascension’s hospital network. However, a Cencora spokesperson says that there’s “no connection” between the unauthorized activity at Cencora and the incidents at Change Healthcare or Ascension. 

Why should you care about the Cencora data breach?

Cencora is a major player in the US healthcare industry. The $250-billion firm partners with some of the largest pharmaceutical companies, including GlaxoSmithKline, Novartis, Genentech, Bayer, Regeneron, and Bristol Myers Squibb. The breach has affected at least 23 pharmaceutical and biotechnology companies, suggesting a broader impact than initially reported.

If you provided any of these companies with your data, it’s possible that the breach has exposed it to the web. The number of individuals affected by the Cencora data breach is expected to be very high. Cencora states on its website that it has served at least 18 million patients to date. It’s quite possible that the breach might have exposed the data of all these patients.

There may not be immediate harm from the data breach, but chances are your data is already in the hands of scammers on the dark web. They can use this data to scam, blackmail, and harass you. Since the data breach also leaks your address, scammers may try to scam you through the mail by asking for personal information or pretending to be a government authority.

The aftermath and response

Cencora completed its investigation into the breach on April 10, 2024. As part of its response, Cencora is offering 24 months of credit monitoring and remediation services to individuals whose information was involved in the incident. There is also an indication that a ransom may have been paid to prevent the leaked patient data from being released to the public.

Also, a class-action lawsuit has been filed against Cencora, alleging the company failed to properly safeguard patient data and delayed notifying affected individuals for nearly three months after discovering the breach.

We reached out to Cencora for a comment on this article, and a rep provided this statement:

Cencora previously disclosed that data from its information systems had been exfiltrated. Upon initial detection of the unauthorized activity, we immediately took containment steps and commenced an investigation with the assistance of law enforcement, cybersecurity experts and external counsel.   

 

Through our investigation, we have identified certain individuals whose personal information was involved in the incident. While there is no evidence that any of the information has been publicly disclosed or misused for fraudulent purposes, we are issuing notification to impacted individuals and working to ensure they have access to resources to help them protect their information.   

 

The incident is fully contained and did not impact our operations. We take the security of information entrusted to us very seriously and continue to work with cybersecurity experts to reinforce our systems and information security protocols.

<clip>



   
ReplyQuote
Q

Get MHF Insights

News and tips for your healthcare freedom.

We never spam you. One-step unsubscribe.

 

Name(Required)
Zip Code(Required)
This field is hidden when viewing the form

Sponsors

Friends of MHF

MHF Community Forum thumbnail

Kirsten DeVries

Tom & Karen Nunheimer

Steve Ahonen

Ron & Faith Bosserman

Marlin & Kathy Klumpp

Sign Up for MHF Insights to keep up on the latest in Michigan Health Policy

Name(Required)
Zip Code(Required)
This field is hidden when viewing the form

5 great non profit logos 2021 - 2025
Michigan Healthcare Freedom Candid

Click here to join the MHF Community Forum!

Grow the community on our social media pages.

Social media & sharing icons powered by UltimatelySocial