U.S. nonprofit healthcare giant Maternal & Family Health Services has confirmed hackers accessed sensitive patient, financial and medical information months earlier.
In an advisory published on its website on Thursday, MFHS said a “sophisticated ransomware incident” exposed the sensitive information of current and former patients, employees and vendors. This information included names, addresses, dates of birth, Social Security numbers, driver’s license numbers, financial account data and payment card information, usernames and passwords, and medical and health insurance information.
The organization, which serves more than 90,000 individuals across Pennsylvania, said it was made aware of the incident on April 4, 2022 but may have been initially compromised as far back as August 21, 2021, citing an investigation conducted by an unnamed forensic incident response firm.
It then took MFHS a further nine months to publicly disclose the incident.
When reached for comment, Patrick McGloin, a partner at Gaffney Bennett, a public relations firm representing MFHS, declined to answer our questions beyond providing a boilerplate statement. It’s not yet known why MFHS didn’t publicly disclose the cyberattack sooner, who was behind the attack, or whether MFHS paid a ransom demand.
Healthcare organizations are a frequent target for ransomware attacks, and at least 25 healthcare providers operating 290 hospitals were hit by ransomware in 2022, according to recent data from Emsisoft. This includes Chicago-based medical giant CommonSpirit Health, which confirmed that an October ransomware attack exposed the personal data of more than 620,000 patients.
EVERY DAY, BILLIONS of people use the GPS satellite system to find their way around the world—but GPS signals are vulnerable. Jamming and spoofing attacks can cripple GPS connections entirely or make something appear in the wrong location, causing disruption and safety issues. Just ask Russia. New data analysis reveals that multiple major Russian cities […]
ata breaches can be extremely harmful to organizations of all shapes and sizes — but it’s how these companies react to the incident that can deal their final blow. While we’ve seen some excellent examples of how companies should respond to data breaches over the past year — kudos to Red Cross and Amnesty for their transparency — 2022 has been a […]
as we all know, humans are often the weakest part of the security chain.” Those are the words of Reddit CTO Christopher Slowe, who was quick to play the blame game in a post announcing that Reddit experienced a breach of internal data last week. He explained that the platform was compromised after an attacker sent “plausible-sounding prompts” to employees […]
Leave a Reply