U.S. nonprofit healthcare giant Maternal & Family Health Services has confirmed hackers accessed sensitive patient, financial and medical information months earlier.
In an advisory published on its website on Thursday, MFHS said a “sophisticated ransomware incident” exposed the sensitive information of current and former patients, employees and vendors. This information included names, addresses, dates of birth, Social Security numbers, driver’s license numbers, financial account data and payment card information, usernames and passwords, and medical and health insurance information.
The organization, which serves more than 90,000 individuals across Pennsylvania, said it was made aware of the incident on April 4, 2022 but may have been initially compromised as far back as August 21, 2021, citing an investigation conducted by an unnamed forensic incident response firm.
It then took MFHS a further nine months to publicly disclose the incident.
When reached for comment, Patrick McGloin, a partner at Gaffney Bennett, a public relations firm representing MFHS, declined to answer our questions beyond providing a boilerplate statement. It’s not yet known why MFHS didn’t publicly disclose the cyberattack sooner, who was behind the attack, or whether MFHS paid a ransom demand.
Healthcare organizations are a frequent target for ransomware attacks, and at least 25 healthcare providers operating 290 hospitals were hit by ransomware in 2022, according to recent data from Emsisoft. This includes Chicago-based medical giant CommonSpirit Health, which confirmed that an October ransomware attack exposed the personal data of more than 620,000 patients.
government watchdog has published a scathing rebuke of the Department of the Interior’s cybersecurity posture, finding it was able to crack thousands of employee user accounts because the department’s security policies allow easily guessable passwords like ‘Password1234’. The report by the Office of the Inspector General for the Department of the Interior, tasked with oversight […]
A bug in a new centralized system that Meta created for users to manage their logins for Facebook and Instagram could have allowed malicious hackers to switch off an account’s two-factor protections just by knowing their phone number. Gtm Mänôz, a security researcher from Nepal, realized that Meta did not set up a limit of attempts when […]
After gaining access via RDP, all three threat actors encrypted files, in an investigation complicated by event log clearing and backups. 3 attackers, 2 weeks – 1 entry point. Written by Linda Smith, Rajat Wason, Syed Zaidi AUGUST 10, 2022 SECURITY OPERATIONS ACTIVE ADVERSARY PLAYBOOK BLACKCAT FEATURED HIVE LOCKBIT RANSOMWARE SOPHOS X-OPS In May 2022, an automotive supplier was hit with three separate ransomware attacks. […]
Leave a Reply