Microsoft Releases Patch to Correct Critical Wormable Windows DNS Server Vulnerability

Microsoft has introduced a patch to resolve a 17-year old wormable remote code execution vulnerability identified in Windows DNS Server. The vulnerability can be exploited remotely, demand a low-level skill to exploit, and could permit an attacker to seize full control of the entire IT infrastructure of a company. Security researchers at Check Point discovered vulnerability CVE-2020-1350 and named it SIGRed. The vulnerability can be found on all Windows Server versions starting from 2003 until 2019 and was designated the maximum CVSS v3 score of 10 out of 10. The flaw is wormable, thus an attacker could exploit the vulnerability…

Data Breach Incidents at Health Plan Member Websites, Zipari and Central California Alliance for Health

Health plan Independence Blue Cross in Philadelphia, AmeriHealth Insurance Company and AmeriHealth HMO, Inc of New Jersey learned that unauthorized persons acquired access to web pages on their member sites from March 17, 2020 to April 30, 2020 and possibly saw the private and protected health information (PHI) of a number of plan members. The types of data exposed comprise names, health plan type, member ID numbers, payment account balances, claims details and user reward summaries. According to the breach investigation, the unauthorized person utilized legit credentials to log in to the website. On all occasions, the passwords employed to…

The California Consumer Privacy Act Takes Effect Now

On July 1, 2020, observance of the California Consumer Privacy Act (CCPA) of 2018 commenced. The CCPA effectivity was on January 1, 2020, nonetheless, all firms placed under the Act were provided a 6 month grace period to abide by the terms of the CCPA. Considering that the grace period has already lapsed. California Attorney General Xavier Bercerra affirmed that enforcement won’t be postponed, though businesses and trade associations have asked to extend the grace period for an additional 6 months as a result of the 2019 Novel Coronavirus crisis. The requests had been accepted nevertheless there’s no extension granted….

NY District Court Kicks Back Data Breach Lawsuit Against Episcopal Health Services to State Court

Patients of Episcopal Health Services Inc. based in Uniondale, N.Y. filed a lawsuit over the compromise of their personal and protected health information in a phishing attack in 2018. The New York State Supreme Court has kicked back the lawsuit for further proceedings. The lawsuit asserts Episcopal Health Services did not safeguard the private data of its patients from unauthorized exposures. Due to those downfalls, some employee email accounts of Episcopal Health Services experienced a breach between August 28, 2018 and October 5, 2018. The types of information contained in the email accounts included the patients’ names, birth dates, addresses,…

Telehealth Likely to Remain So Better Obtain the Appropriate Technology

This 2020, because of the COVID-19 public health crisis, the HHS’ Centers for Medicare and Medicaid Services (CMS) widened the coverage of telehealth service by incorporating all Medicare beneficiaries, irrespective of area. Telehealth services do away with the limitations to in-person treatment that the COVID-19 pandemic brought about and make it possible for healthcare providers to offer treatment to patients within their own residences and, in that way, make patient security and regulation of the spread of COVID-19 achievable. The extension of coverage is only implemented during the COVID-19 public health crisis, despite increasing requests that for the extended CMS…

Misconfigured Exposed Cloud Databases are Attacked In Just Hours

Security researchers often discover misconfigured public cloud databases. Wrong configurations that cause cloud data exposure may be because of insufficient knowledge of cloud security or guidelines, inadequate oversight to track down errors, or negligent conduct by insiders. The latest Trend Micro report pointed out that the top cause of cloud security issues is cloud misconfigurations. Security researchers at Comparitech frequently find unsecured cloud assets, typically Elasticsearch cases and unprotected AWS S3 buckets. Whenever the unprotected cloud databases are identified, security researchers identify the owners and notify them to make sure to secure data quickly. Upon identifying the owners, it usually…

COVID-19 Research Organizations Targeted by Chinese Hacking Groups

Organizations participating in the research studies of SARS-CoV-2 and COVID-19 were warned that hackers linked with the People’s Republic of China (PRC) are focusing attacks on their organizations, for that reason, they have to do something to keep their systems safe from any attack. The Federal Bureau of Investigation (FBI) together with the Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security have issued an alert that healthcare, pharmaceutical and research organizations working on SARS-CoV-2 vaccines, COVID-19 remedies and testing procedures are the targets of hackers wanting to get research data to move ahead with PRC’s research…

H-ISAC Issues Second Framework for Managing Identity in Healthcare

The Health Information Sharing and Analysis Center (H-ISAC) released a framework for CISOs to manage identity and secure their firm against identity-focused cyberattacks. This new white paper released by H-ISAC comprises the identity-focused plan to security. The former white paper details why an identity-focused solution to cybersecurity is necessary at this time, with the most recent white paper outlining how to execute that strategy. By using the framework, CISOs could handle the complete identity lifecycle of practitioners, patients, business partners, and employees in a manner that protects against identity cyberattacks, brings down risk and boosts operational efficiencies. The framework was…

Ransomware Attack at Magellan Health and PHI Theft at Houston Methodist Hospital

Magellan Health, a Fortune 500 company, encountered a ransomware attack last April that resulted in the encryption of its files and theft of some employee information. Magellan Health noticed the attack on April 11, 2020 after files on its systems were encrypted. According to the breach investigation results, the attacker accessed its systems because an employee received a spear-phishing email on April 6 and responded to it. The attacker misled the employee by means of impersonating a Magellan Health customer. Magellan Health employed the cybersecurity firm Mandiant to investigate the breach and it confirmed that the attacker accessed a company…

Zoom Gets into Settlement with NY Attorney General Over Privacy and Security Concerns

Zoom got to a deal with the New York Attorney General’s office and has made a commitment to employ better privacy and security measures for its teleconferencing program. New York Attorney General Letitia James investigated Zoom after analysts found a variety of privacy and security problems with the program sometime this year. Zoom has shown to be one of the most widely used teleconferencing systems throughout the COVID-19 outbreak. In March, around 200 million persons were joining Zoom meetings with usership rising by 2,000% in the period of merely 3 months. As more people use Zoom more regularly, flaws in…

OCR Publishes Guidance on Media and Film Crew Members Access to Healthcare Amenities

The HHS’ Office for Civil Rights (OCR) published guidance to point out to healthcare organizations that with the HIPAA Privacy Rule, the media and film staff aren’t permitted access to healthcare amenities where the protected health information (PHI) of patients is accessible except if the involved patients have given written permission beforehand. A public health emergency doesn’t adjust the demands of the HIPAA Privacy Rule, which stays in force in emergency scenarios. In 2018, Brigham and Women’s Hospital, Boston Medical Center, and Massachusetts General Hospital were subjected to enforcement actions by OCR after learning they had granted film staff access…

EFF Alerts of Privacy and Security Pitfalls with Apple and Google’s COVID-19 Contact Tracing Solutions

The contact tracing technology that Google and Apple are creating may be helpful in tracking persons who have gotten into close contact with persons verified to be COVID-19 positive; nevertheless, the Electronic Frontier Foundation (EFF) is cautioning against the probability that hackers would exploit the system in its present form. The technology is set to be available soon. The system will enable app developers to make contact tracing applications to help track down persons who might have been exposed to COVID-19. When a person installs a contact tracing application, every time he/she comes into contact with a man or woman…

HHS’ Office of Inspector General Suggests Regulation for Civil Monetary Penalties for Data Blocking

The HHS’ Office of Inspector General (OIG) proposed a rule on Tuesday that corrects civil monetary penalty regulations to additionally include data blocking. Once enforced, the new CMPs for data blocking is going to be a crucial instrument to guarantee program integrity as well as the stated advantages of technology and data. OIG knows that all through the COVID-19 public health crisis, medical companies are concentrated on delivering treatment and follow-up patient care. OIG is accomplishing its responsibilities by posting the new guideline however is likewise attempting to be as versatile as can be to lessen the load on healthcare…

Healthcare Shoppers Looking to Buy PPE and Medical Supplies Targeted by Fraudsters

The Federal Bureau of Investigation (FBI) has published an advisory that cybercriminals are attempting to rob from state organizations and healthcare market consumers that are purchasing medical products and personal protective equipment (PPE). Healthcare market consumers were cautioned after having records of increasing instances of scams connected to the order of PPE and important medical equipment including ventilators, that have limited supply as a result of greater demand. The FBI has received information on many reports of advance fee frauds. Government organizations and healthcare market consumers have sent funds to vendors and brokers of PPE and medical products and learned…

FBI Alerts of Growing COVID-19 Associated Business Email Compromise Scams

The Federal Bureau of Investigation released an alert subsequent to an increase in Business Email Compromise (BEC) attacks that are capitalizing on the anxiety related to the COVID-19 outbreak. BEC is the word used to pertain to the effort to deceive people in control of doing legit cash transfers into a bank account managed by the attacker. This is attained by impersonating somebody within the firm that the victim typically performs business with. A normal attack case entails mailing an email to somebody in the finance team asking to alter a bank account detail for an impending payment. A few…

Threat Actors and Cybersecurity Companies to Show Support to Healthcare Providers Throughout the Coronavirus Pandemic

Cyberattacks on healthcare organizations were reported despite the fact that these organizations are working day and night to give COVID-19 patients their needed healthcare. These attacks not only cause serious disruption, but also possibly more damage and threat to patient safety considering the COVID-19 outbreak. Plenty of phishing campaigns were found using the fear of COVID-19 as a lure to install malware. More than 2,000 coronavirus-themed domains had been registered. Most of these domain names were probably bought for executing malicious intentions. For sure the cyberattacks will not stop. However, it would appear that some threat actors have chosen not…

Cybersecurity Guidelines for Securing Remote Employees During the COVID-19 Outbreak

With attacks rising it is essential to undertake cybersecurity guidelines for keeping remote employees safe against malware and phishing attacks. Institutions should make certain to use the most recent versions of VPNs and employ patches promptly. The DHS Cybersecurity and Infrastructure Security Agency (CISA) released another alert on March 13 concerning patching and upgrading VPNs for remote personnel to correct vulnerabilities. Institutions were likewise told to use multifactor authentication with all VPNs to boost security. VPNs should additionally be configured to start off automatically if devices are powered up and not just counting on personnel to manually connect. It is…

Enhanced Telehealth Services and Laid-Back HIPAA Enforcement Throughout the Coronavirus Public Health Emergency

In seeking to avoid the spreading of the 2019 novel coronavirus, patients alleged of having been exposed to the virus and persons with indications of COVID-19 were instructed to self-quarantine by staying at home. It is necessary for contact to be avoided with persons at an increased risk, especially aged people and persons with health issues. Telehealth services, which include video calls, are handy tools for medical specialists when evaluating and treating patients at a distance to lower the possibility of getting infected by the coronavirus. Telehealth services could also be employed to keep contact with patients who opt not…

Google Charged with About $8 Million GDPR Fine

The Swedish Data Protection Authority (DPA) issued Google a 75 million kroner ($7.8 million) GDPR penalty for failing to comply with the right-to-be-forgotten’ requests coming from European Union residents to take out webpages from its search result pages. The right to be forgotten in the European Union exists prior to GDPR. It was initially included in EU laws in 2014 after a judgment by the European Court of Justice concerning the lawsuit, Google Spain SL, Google Inc vs Agencia Española de Protección de Datos, Mario Costeja González. The rules require search engines to take out hyperlinks to freely accessible websites…

Quest Diagnostics Settlement of 2016 Data Breach Finally Approved

A federal judge has finally approved the settlement concerning Quest Diagnostics Inc. to take care of a class-action lawsuit connected with its 2016 data breach. The medical lab company in New Jersey is going to pay a $195,000 settlement, which allocates to each breach victim about $325 compensation. On November 26, 2016, the attackers accessed the Care360 MyQuest mobile application that patients use to save and share their digital test results and schedule visits. The health application saved names, phone numbers, birth dates, and laboratory test findings which, for certain patients, listed their HIV test findings. The breach impacted 34,000…

Ransomware Attack on Crossroads Technologies Impacts 156,400 Personal Touch Home Care Patients

Personal Touch Home Care (PTHC), a home health company based in Lake Success, NY, began informing patients about the latest ransomware attack on Crossroads Technologies Inc., its IT vendor based in Wyomissing, PA, that potentially compromised their protected health information (PHI). On December 1, 2019, Crossroads advised PTHC that its Pennsylvania data center was attacked by ransomware. That data center hosted PTHC’s electronic medical records. Because of the ransomware attack, patient records were inaccessible for a couple of days. Although the EHR system was not accessible, PTHC employees followed emergency protocols and recorded patient data using pen and paper. The…

Over 110,000 Patients’ PHI Compromised Because of Phishing Attacks on Overlake Medical Center & Clinics and VibrantCare Rehabilitation

A phishing attack on Overlake Medical Center & Clinics located in Bellevue, WA in December 2019 caused the potential exposure to personal and protected health information (PHI) of 109,000 patients. Overlake Medical Center & Clinics discovered the phishing attack on December 9, 2019 and did a password reset to prohibit unauthorized access. Overlake affirmed the unauthorized access of one email account beginning December 6, 2019 up to December 9 which was the time the Overlake secured the account. There were other email accounts compromised on December 9, however, the attacker only had access for a couple of hours. An examination…

$1.77 Billion in Losses Due to Business Email Compromise Attacks

The 2019 Internet Crime Report of the Federal Bureau of Investigation’s (FBI) Internet Crime Complaint Center (IC3) was just released. It reveals that cybercrime losses in 2019 maxed $3.5 billion. IC3 got nearly 1,300 per day or 467,361 online and cybercrime complaints. Above 50% of the losses were caused by business email compromise (BEC) attacks, otherwise called email account compromise (EAC). These attacks entail the impersonation of an authorized person or business to acquire finances by means of email. These complex tricks usually start off with a phishing attack on a manager to acquire email login credentials. The hacker then…

PHI Potentially Exposed at Iowa Department of Human Services and Cedarbrook Nursing Home

The Iowa Department of Human Services informed 4,784 people concerning the potential exposure of their protected health information (PHI) because of improper disposal of documents. On November 25, 2019, a member of the DHS staff put documents containing the Dallas County clients’ PHI together within the regular garbage dumpster. The staff should have shredded the documents before disposal. DHS was late in discovering the improper disposal as the dumpster had been emptied already. The incident investigators learned that the custodial employee who disposed of the records wasn’t aware that the documents contained confidential information. It was not possible to determine…

Breach of LabCorp Patients’ Personal and Health Data Due to Website Error

TechCrunch researchers found a security error on a website that LabCorp is using for hosting its internal customer relationship management system. Though the system comes with password protection, the researchers discovered an error in the back-end system and exposing patient records. The error made possible patient data access even with no security password and search engines have indexed the web URL. Google had cached just one document that contains a patient’s health data. However, the researchers were able to see other patient records with health data just by modifying the document number in the web URL. The researchers examined sample…

PHI Exposed at Alomere Health and Mercy Health Lorain Hospital Laboratory Data Breaches

Alomere Health in Alexandria, MN encountered a phishing attack that allowed unauthorized persons potential access to the protected health information (PHI) of more or less 50,000 patients. After becoming aware of the phishing attack on November 6, 2019, the healthcare provider conducted an internal investigation that revealed the account was accessed by unauthorized persons from October 31 until November 1, 2019. The computer forensics company that investigated the breach revealed on November 10, 2019 that a second email account compromise occurred on November 6. After a detailed examination of the compromised accounts, it was confirmed by the investigators that selected…

Ransomware Attack on Enloe Medical Center Caused EMR Downtime

Enloe Medical Center in Chico, CA had a ransomware attack two weeks ago and until now the electronic medical record (EMR) system of this California healthcare provider is offline. Enloe knew about the ransomware attack on January 2, 2020, which encrypted the files of its entire network, which include the EMR system consequently the center staff are unable to access patient data. The provider promptly enforced emergency protocols to keep on delivering health care to patients and had to reschedule just a number of elective medical procedures. The telephone system became non-operational as well because of the attack, but it…

Malware Attack Impacts 25K Patients of Native American Rehabilitation Association of the Northwest

A malware attack on the Native American Rehabilitation Association of the Northwest, Inc. (NARA) in Portland, OR resulted in the potential unauthorized access of the protected health information (PHI) of native American patients who are receiving mental and physical health services, education and substance abuse treatment. NARA mentioned that the malware attack came about on November 4, 2019. Security controls failed to identify the malware at the beginning but eventually identified it in the afternoon. By November 5, the security team already had the threat under control and by November 6, it had changed all email account passwords. The attackers…

Conway Medical Center and Equinox Inc. Email Security Breaches

A phishing attack on Conway Medical Center in South Carolina resulted in the access of the email accounts of several employees by unauthorized people. Conway Medical Center became aware of the phishing attack on October 7, 2019 and immediately secured the employee’s email accounts to block the further access of unauthorized individuals. Third party cybersecurity specialists looked into the breach to confirm patient data access or theft. According to the investigators, the email accounts were first compromised on or before July 2019. It was only on November 20, 2019 that the investigators confirmed the exposure of the protected health information…

Malware on New Mexico Hospital Imaging Server Potentially Impacts Patients PHI

The radiology department of Roosevelt General Hospital located in Portales, New Mexico found malware in one digital imaging server, which possibly resulted in enabling the hackers to gain access to the radiological photos of approximately 500 patients. The malware installation was found on November 14, 2019 and immediate action was done to separate the server and stop even more unauthorized access and obstruct contact with the command and control server of the hackers. The IT unit was successful in taking away the malware, repairing the server and retrieving all patient information. A scan was done to search for any flaws….

Microsoft’s Recommendations on Protecting Against Spear Phishing Attacks

Many cybercriminals still send phishing emails at random hoping to solicit some responses. However, it is more lucrative to conduct targeted attacks, which are also called spear phishing. Microsoft claims that spear phishing attacks increased twofold last year. From September 2018 to September 2019, spear phishing attacks have gone up from 0.31% to 0.62% of email volume. The number might be low, however, these spear phishing campaigns are very effective because they are laser-focused on distinct employees. Security-conscious employees find it hard to recognize emails. A lot of executives, IT and cybersecurity personnel become victims of these campaigns. The emails…

Ransomware Attack on The Cancer Center of Hawaii and Improper Disposal Incident at Zuckerberg San Francisco General Hospital

The Cancer Center of Hawaii in Oahu encountered a ransomware attack on November 5, 2019. The Cancer Center was compelled to power down its network servers because of the attack. That meant temporarily not providing radiation treatment to patients at St. Francis’ hospital in Liliha and Pali Momi Medical Center. Although patient services suffered some interruption, the center believes that the attackers did not access any patient information. The breach investigation is still in progress, but all information saved on the radiology machines were recovered. The network is likewise completely operational now. It is not known how long the network…

9,800 Aegis Medical Group Patients Affected by Inappropriate PHI Access by a Former Employee

Aegis Medical Group, a Florida-based physician group, started notifying 9,800 patients that a former employee potentially accessed their protected health information (PHI). Purportedly, that individual offered the patient data for sale to third parties that were supposedly involved in identity theft and fraud. The law enforcement told about the employee’s action to Aegis Medical Group on September 11, 2019. The investigators confirmed the employee’s attempt to sell off two patients’ data. The physician network together with law enforcement discovered that the employee probably accessed approximately 9,800 patients’ information from July 24, 2019 up to September 9, 2019. The patient records…

Dealing with the Communication Challenges in Healthcare

Based on the latest TigerConnect research, 52% of healthcare companies encounter communication problems that badly affect patients day by day or a number of times each week. These communication issues are a reason for annoyance for healthcare personnel. They make it harder to organize patient care, hence resulting in mistakes with patient care. Actually, the consequence of awful communication is substantial and has an effect on the whole institution. At best, ineffectiveness in communication leads to slowdowns that boost the expenditure of giving healthcare. At worst, awful communication increases avoidable medical flaws, doctor burnout and, in the most severe instances,…

HHS HIPAA Security Risk Assessment Tool Version 3.1 Now Available

The HHS released an updated HIPAA Security Risk Assessment Tool offering a couple of new features that users request to optimize usability. The HHS Office of the National Coordinator for Health Information Technology (ONC) together with the HHS’ Office for Civil Rights (OCR) designed the HIPAA Security Risk Assessment Tool. The Security Risk Assessment Tool is intended to help small to medium-sized healthcare organizations when performing thorough, company-wide risk analysis to identify the risks to protected health information (PHI) integrity, availability, and confidentiality. Healthcare organizations can use the tool to identify and assess risks and vulnerabilities. After which, they could…

Warning on Medtronic Valleylab Energy Platform and Electrosurgery Products Vulnerabilities

Medtronic identified six vulnerabilities in the Medtronic Valleylab energy platform and electrosurgery products that include one critical vulnerability that an attacker can exploit to access the Valleylab Energy platform and view/overwrite data files and remotely implement arbitrary code. Medtronic already sent notifications about the identified vulnerabilities to the Department of Homeland Security Cybersecurity and Infrastructure Security Agency considering its responsible vulnerability disclosure policy. The following Medtronic Valleylab products have been found to have four vulnerabilities: Valleylab Exchange Client, Version 3.4 and earlier versions Valleylab FX8 Energy Platform (VLFX8GEN) software Version 1.1.0 and earlier versions Valleylab FT10 Energy Platform (VLFT10GEN) software…

$41,198 Average Ransomware Payment in Q3 of 2019

Ransomware continues to be one of the greatest cybersecurity threats confronted by healthcare institutions. Attacks have increased as well as ransom demands. A recent analysis by Coveware, a company providing ransomware remediation and incident response, revealed that there is a 13% increase in the average ransom payment, which stands at $41,198 in Q3 of 2019. This amount is six times the average in December 2018. A lot of companies are paying substantially more. The ransom demand of threat actors that use the Ryuk ransomware in their attacks is usually hundreds of thousands of dollars. From Q2 to Q3 of 2019,…

Fetal Remains Discoverd at Home of Deceased Doctor

Family members of the late Dr Ulrich Klopfer have discovered fetal remains at his home in Illinois.  Dr Klopfer operated three abortion clinics in Indiana until 2015 when his license was suspended due to failure to comply with state laws. The violations included failure to report cases of the rape of a minor following an abortion procedure, violations of state waiting periods, and improper record keeping. Indiana Attorney General Hill described Dr Klopfer as “one of the most notorious abortionists in the history of Indiana” with “a record of deplorable conditions and violations of regulatory controls.” Dr Klopfer had his…

733 Million Medical Records Freely Available Through Unsecured PACs

Cybersecurity researchers have revealed that approximately 733 million medical images stored on picture archiving and communication systems (PACs) are freely accessible on the Internet.  The investigation, a joint venture by ProPublica, German public broadcaster Bayerischer Rundfunk, and vulnerability and analysis firm, Greenbone Networks, found images including X-rays, MRI, and CT scans stored in these PACs.  Greenbone analyzed 2,300 PACs and found that 590 were accessible from the Internet without requiring any user authentication. These 590 servers stored 24 million medical records from 52 countries.  Greenbone Networks audited the servers between July and September 2019 and set up a RadiAnt DICOM…

Kaspersky Labs Find a Third of All Healthcare Workers Lack Cybersecurity Training

A Kaspersky Lab survey has revealed that nearly a third of all healthcare workers do not receive any cybersecurity training from their employers. The results are part of a survey the cybersecurity research group completed in response to the enormous spike in large data breaches seen since January 2019. Kaspersky Lab researchers surveyed 1,758 healthcare workers in the United States and Canada to ascertain how the looming threat of a cyber attack is being dealt with by healthcare organizations. The researchers discovered that 32% of those surveyed stated that their employer failed to offer any cybersecurity training while at work….

Public Health Emergency Declared in Response to Hurricane Dorian

The Secretary of the Department of Health and Human Services (HHS), has declared a public health emergency in Puerto Rico and the states of Florida, Georgia, and South Carolina due to Hurricane Dorian. On September 4, the Secretary, Alex Azar, also declared in North Carolina, retroactive to September 1, 2019. Secretary Azar’s announcement comes as the US mainland prepares for Hurricane Dorian to make landfall. The declaration was accompanied by the announcement of a limited waiver of HIPAA sanctions and penalties for specific provisions of the HIPAA Privacy Rule, as mandated by the Project Bioshield Act of 2004 of the…

Massachusetts General Hospital Data Breach Affects 10,000

Around 10,000 patients are being notified that their data may have been accessed by an unauthorized individual following a data security incident at Massachusetts General Hospital (MGH).  On June 24, 2019, MGH discovered that unauthorized individuals had accessed computer applications used by researchers in its Department of Neurology. Upon discovery of the breach, MGH immediately took steps to revoke the unauthorized access and secure the applications and associated databases.  An investigation was immediately launched to determine the scope of the breach. MGH hired a third-party cybersecurity organization to facilitate the breach investigation. The investigators concluded that the unauthorized individual could…

California Hospice Experiences Ransomware Attack

The Hospice of San Joaquin in Stockton, California, is in the process of notifying patients that their protected health information may have been compromised in a recent security incident. On July 2, 2019, at 12:50 pm, hackers installed malware on the hospice’s network. The network included servers used to store the protected health information of 13,000 patients.  In the breach notification posted on their website, the hospice stated: ‘we do not believe, or have any indication patient or staff information has been utilized, disseminated or disclosed to unauthorized parties.’ The server contained patient information such as their full name, home…

Data Breach Following Ransomware Attack on Washington Hospital

Grays Harbor Community Hospital in Washington has experienced a data breach after patient health information may have been compromised in a ransomware attack. The hospital and its associated clinics, based in Aberdeen, WA, is still dealing with the consequences of the attack months after the fact. The attackers have demanded $1 million for the keys to unlock the encryption. On June 15, 2019, Grays Harbor Community Hospital noticed some suspicious activity on its network and started experiencing IT problems. The attack occurred on a Saturday when staffing was limited so initially the problem was attributed to an IT issue. On Monday…

August 2019 Patch Tuesday

Microsoft has issued patches for 93 vulnerabilities across Windows, Microsoft Browsers, Microsoft Office, and Outlook this Patch Tuesday, 26 of which achieved a ‘critical’ rating. Somewhat unusually, there are no patches to address currently exploited zero-day vulnerabilities in this month’s updates; however, it is still important to apply the updates as soon as possible as it is unlikely to be long before exploits are developed for the remote code execution vulnerabilities. Four of the critical vulnerabilities corrected in this month’s round of updates are wormable flaws in Remote Desktop Protocol (RDP), two of which – CVE-2019-1181 and CVE-2019-1182 – affect…

Wise Health Phishing Attack Compromises 36,000 Records

Wise Health has revealed that a phishing attack on their system has compromised the protected health information (PHI) of 36,000 patients. Wise Health System is a health care system with over 1,900 employees based in Decatur, Texas. The breach occurred on March 14, 2019, when a hacker sent phishing emails to employees of the organization. Several employees were fooled by the spoof emails and responded, allowing the hacker to harvest their login credentials. The hacker then used the credentials to log in to the Employee Kiosk and attempted to redirect over 100 payroll direct deposits. Wise Health had anti-fraud policies…

Waiver of HIPAA Sanctions and Penalties in Louisiana Following Tropical Storm Barry

The US Department of Health and Human Services has issued a limited waiver of HIPAA sanctions and penalties in Louisiana following Tropical Storm Barry making landfall on July 13. The HHS announced a public health emergencies in the areas affected by the storm on July 12, 2019. The waiver only applies to covered entities in areas where a public health emergency has been declared. Furthermore, the waiver only covers the 72 hours immediately following the implementation of the hospital’s disaster protocol. The waiver is only effective for specific provisions of the HIPAA Privacy Rule. These include: The requirements to obtain…

Premera Blue Cross Settles for $10 Million for 2014 Data Breach

Premera Blue Cross has agreed to a $10 million settlement to resolve lawsuit involving 30 state attorneys general for a 2014 data breach which compromised 10.4 million records. A hacker compromised Premera Health’s network on May 5, 2014, and had access until March 6, 2015. During this time, the hacker could access highly sensitive plan member information such as names, contact information, dates of birth, member ID numbers, and Social Security numbers. Premera Health record’s included information on individuals from Alabama, Alaska, Arizona, Arkansas, California, Connecticut, Florida, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Massachusetts, Minnesota, Mississippi, Montana, Nebraska, Nevada,…

Marshall University Hospital Faces Lawsuit for Sharing Student’s PHI

A medical student has filed a lawsuit against Marshall University and Cabell Huntington Hospital claiming that his x-rays were shared with fellow students in a class without his consent. The lawsuit, filed by the student who identifies as J.M.A., claims that a professor at the Joan C. Edwards School of Medicine showed his x-rays to fellow students during a class. J.M.A. claims that the professor failed to remove the information that identified the x-rays as his. As such, the images were identifiable as his. As J.M.A’s consent was not obtained before the x-rays were shared, this incident potentially constitutes a…

Cybersecurity Incident at Rosenbaum Dental Affects 1,200 Patients

A cybersecurity incident at Rosenbaum Dental Group has resulted in the protected health information (PHI) of 1,200 individuals being compromised. Rosenbaum Dental Group, an independently owned facility in Florida, is in the process of notifying affected patients of the data breach. The breach is thought to have been caused by a malware infection of a desktop computer on which patient data was stored. The malware may have allowed unauthorized individuals access to patient data. It is as of yet unknown how the malware was installed on the laptop, but it is likely that a hacker launched a phishing attack on…

Mercy Health Data Breach Affects 1,000 Patients

Mercy Health is notifying almost 1,000 patients that their data may have been accessed by an unauthorized individual. In March, Mercy Health, a non-profit healthcare system in west Michigan, discovered that some protected health information (PHI) may have been exposed after realising patient data was stored on a private server that was used for other purposes, such as online scheduling and check-ins. As the information was saved on this private server, it was possible for individuals to access the data without having their identity authenticated. An investigation was launched into the incident. Mercy Health discovered that patient data may have…

Error at Business Associate Exposes Turlock Irrigation District Employee Data

Turlock Irrigation District in California are notifying members of their employer-sponsored health plan that an error at a business associate has resulted in some of their protected health information (PHI) being exposed. The business associate, Delta Health Systems (DHS), provides administrative services related to Turlock Irrigation District’s health plan. As such, it requires access to employee protected health information and is required by HIPAA to protect the integrity and confidentiality of this information.  However, due to an error made by a third-party website developer, some employee information was made accessible through a link on DHS’s website. While the website had…

Siemens Identifies Vulnerabilities in Scalance Direct Access Points and Sinamics Perfect Harmony Drives

Siemens has discovered several vulnerabilities in the Scalance W1750D direct access point. Several of the vulnerabilities are of high-severity, and one is rated as ‘critical’. The vulnerabilities can be exploited remotely and hackers can exploit them with even low skill levels. A hacker could utilise the flaws to gain access to the W1750D device and execute arbitrary code within its underlying operating system. As a result, the hacker could gain access to sensitive information, perform administrative actions on the device, and expose session cookies for an administrative session. The vulnerabilities are present in all versions prior to 8.4.0.1 CVE-2018-7084 is a…

Medical Informatics Engineering Fined $900,000 for 2015 Data Breach Following Multi-State Lawsuit

Only a few days after it agreed to a settlement with OCR, Medical Informatics Engineering (MIE) has been instructed to pay a $900,000 financial penalty to resolve a multi-state lawsuit over a 2015 data breach that saw 3.9 million patient records compromised. MIE, an Indiana-based provider of electronic medical record software and services, experienced the data breach when hackers compromised the server of its NoMoreClipboard (NMC) subsidiary. Through providing these services, MIE acts as a business associate (BA) to several healthcare organizations covered by HIPAA’s rules, and are therefore themselves required to be compliant with the legislation. The hackers had…

TriHealth Notifies 2,433 Patients of Impermissible PHI Disclosure

TriHealth is in the process of notifying 2,433 patients that their protected health information (PHI) has been impermissibly disclosed to a student mentee in June 2018. TriHealth, a unified health system based in Cincinnati, Ohio, revealed that a student was provided with sensitive information of nearly 2,500 patients. The data was provided on June 8 and June 9 2018, during which time the student was under the direct supervision of a TriHealth physician who is no longer in employment at the organization. The physician had been using the information for a research project. The patient information provided included first and…

Centura Health Email Security Incident Compromises PHI of 7,515 Patients

Centura Health has revealed that an email security incident has resulted in the protected health information (PHI) of 7,515 patients being compromised. Centura Health, based in Centennial, Colorado, discovered the breach on April 16, 2019. IT security staff immediately took steps to secure the account and revoke unauthorised access. An investigation was launched into the incident to determine the extent of the breach and how the hacker gained access to the account. The investigation concluded that the hacker may have been able to access emails and email attachments during the window in which they had access to the account. However,…

Phishing Incident Compromises Columbus Community Hospital Patient PHI

A phishing attack at a business associate of Columbus Community Hospital in Columbus, Wisconsin, has compromised the PHI of an unknown number of patients.  Columbus Community Hospital was notified of the breach on April 8, 2019, by OS, Inc., a claims management service provider and business associate (BA) to the hospital. According to the BA, the unauthorised individual gained access to the email account of one of its employees through a successful phishing attack. The hacker may have viewed patient information during the period in which they had access to the account. The information in the compromised account includes names,…

DHS and FBI Release Advisory on New Lazarus Trojan Attacks

The U.S Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have issued a joint advisory warning that Lazarus APT has launched attacks using a new Trojan called HOPLIGHT. Lazarus, North Korea-backed hacking group, utilises spear phishing attacks to install malware on targets of high value. The group appears to be primarily motivated by financial gain, rather than intellectual property theft or espionage. The group is known by other aliases such as Hidden Cobra, Zinc, and Nickel Academy. Lazarus is the group that is generally considered responsible for the WannaCry attacks and several other high-profile cybersecurity incidents….

Malware Attack Compromises Centrelake Medical Group Patient Data

A malware attack on Centrelake Medical Group has resulted in sensitive patient information being compromised. Centrelake Medical Group is a network of 8 medical imaging and oncology centres in California. They discovered a malicious virus on their system in February 2019 which blocked access to all of their files. Although the virus appears to perform the function of malware, Centrelake Medical Group did not mention receiving a ransom demand from a threat actor in their media notice about the attack. Subsequent reports indicated that the malware was not ransomware, therefore leaving some uncertainty as to the motivation behind the attack….

Blue Cross of Idaho Data Breach Affects 5,600 Patients

Blue Cross of Idaho is notifying 5,600 individuals that a data breach at their facility has compromised their protected health information (PHI). Blue Cross of Idaho is a not-for-profit health insurer, with around 560,000 customers, making it one of the largest health insurance organisations in the state of Idaho. Paul Zurlo, the Executive Vice President, has said that the breach only affects 1% of its members. The breach was discovered on March 22, 2019. Blue Cross immediately launched an investigation to assess the scope of the breach and determine how it first occurred. Investigators discovered that an unauthorised individual hacked…

Study Shows Quarter of Phishing Emails Bypass Office 365’s Default Defences

Avanan has released a study indicating that a quarter of all phishing emails bypass Microsoft Office 365’s default anti-phishing protections. Avanan, a cloud security platform provider, conducted a study of 52 million emails which had been assessed by Office 365 Exchange Online Protection (EOP). They discovered that the software categorised a quarter of phishing emails sent as ‘non-malicious’, and allowed them to arrive in user inboxes. A  further 5.3% of emails were delivered as they had been whitelisted, meaning the phishing emails couldn’t be blocked. EOP works by scanning emails for malware, signatures of spam, and checking if the sender…

Proofpoint Discovers Attackers Bypassing Multi-Factor Authentication on Office 365 and G Suite Accounts

Proofpoint, a software security company, has discovered that threat actors are using legacy IMAP protocols to bypass multi-factor authentication on Office 365 and G Suite accounts. Multi-factor authentication (MFA) systems check the identity of a user before allowing them to access the account. Many experts consider them more a far more robust security measure than passwords. These identification steps may include sending an email to their account, or a text to their phone, which contains a unique code which then must be submitted online to proceed. Usually, if an attacker attempts to access an account but fail on several attempts,…

Employees at Risk During Modern Emergencies, Says Rave Mobile Security Report

Rave Mobile Security has released a report showing that while businesses are improving their preparedness for ‘modern emergencies’, employees safety is still at risk. Overall, Rave Mobile Security’s 2019 Workplace Safety and Preparedness Survey indicated that businesses in the United States were improving their emergency response strategies. The report assessed how prepared organisations were for modern emergencies, including active shooter emergencies, cyber attacks, system outages, and workplace violence incidents. The report discovered that while organisations may have strategies and plans in place for these events, senior management may fail to explain these plans to employees adequately. In some circumstances, the businesses may not…

Mimecast Report Shows Huge Increase in Emails Containing Malicious URLs

Mimecast has released a report showing that there has been a 126% increase in the number of emails containing malicious URLs between August 2018 and February 2019. Mimecast, a company specialising in cloud-based email management, surveyed to ascertain workplace awareness of cybersecurity issues. The report was based on an analysis of 28.4 million emails that had been marked as ‘safe’ by security filters on email inboxes. These filters failed in nearly 17% of cases, as the researchers discovered 460,000 emails that contained malicious links but had made it past the email security solutions.  Previous reports suggest that the average office…

Covenant Care Data Breach Affects 7,858 Patients

Covenant Care has announced that a data breach at their facility has affected 7,858 patients. Covenant Care is a residential care provider and skilled nursing facilities based in Aliso Viejo, California. The organisation discovered the breach when suspicious activity was detected on an employee’s email account on January 29, 2019. Covenant Care immediately launched an investigation into the breach and contracted a third-party cyber forensics firm to assist with assessing the cause and scope of the breach. The investigation revealed that the email account was compromised on January 22, 2019. The hacker was able to access the accounts until Covenant…

FINRA Warns Brokerage Firms of Phishing Threat

The United States Financial Industry Regulatory Authority (FINRA) has warned brokerage firms of a phishing campaign used by hackers to install malware on employee devices. The cybercriminal designed the emails to appear as if they were sent by a staff member of a credit union. As with many phishing campaigns, the emails contained a fake “urgent” message, this time pretending to alert the brokerage firm to potential money laundering by one of their clients. FINRA is a private not-for-profit organisation that is authorised by Congress to protect and regulate the broker-dealer industry. Several brokerage firms notified the organisation of suspicious…

New GandCrab Ransomware Decryptor Available Online

A free GandCrab ransomware decryptor has been made available on the No More Ransom depository. The decrypt works for files encrypted by versions 1, 4, early versions of 5, and versions 5.0.4 to 5.1 can now be decrypted without paying the ransom. Ransomware is malware variant which denies the user access to their device, or specific files on the device until a ransom has been paid to the scammer. Ransomware attacks are becoming increasingly common, particularly against organisations in the healthcare industry due to the high black-market of healthcare data. The malware is readily available on the dark web. If a campaign…

New Module for Trickbot Trojan Malware Discovered

Hackers are distributing a new module for the Trickbot malware through a phishing campaign. The update renders the Trojan variant capable of obtaining VNC, PuTTY, and remote desktop credentials. Hackers are spreading the latest updates through a phishing campaign in which spam emails purporting to offer help with recent changes to the U.S. tax code to reduce tax bills are used to trick recipients into downloading the malware. Trojans are malware variants that are disguised as benign or useful pieces of software. They are installed under false pretences, as the user is often tricked into believing that they serve a…

GandCrab Ransomware Campaign Targets MSPs

Hackers have launched a new GandCrab ransomware campaign targeting managed service providers (MSPs) and IT support companies. GandCrab ransomware is a popular variant of ransomware. It became popular for hackers to utilise as Ransomware-as-a-Service (Raas). RaaS allows even novice cybercriminals to launch ransomware campaigns and earn commission for the use of this ransomware. MSPs are often used by small and medium businesses (SMBs) that have insufficient resources to create and manage their cybersecurity frameworks. MSPs perform a range of functions such as patching, performing software updates, proactively finding security issues, and correcting problems in networks. As MSPs work remotely, SMBs…

Individuals Could Authorise the Sale of their Healthcare Data Under New Senate Bill

New a Senate bill has proposed that individuals should be allowed to permit their healthcare providers to sell their health data and receive financial compensation if their health information is sold to a third party.  Senate Bill 703, more commonly known as the Oregon Health Information Property Act, is sponsored by Senator Floyd Prozanski (D-Eugene) and has more than 40 co-sponsors. Should it be passed, the bill would see consumers health information treated in a similar way to an individual’s property. Patients would allow them to profit from its sale, much as they would their regular physical possessions. This bill…

ICS-CERT Issues Medical Advisory for Vulnerabilities Found in Stryker Equipment

The Industrial Control Systems Cyber Emergency Response Team (ICS-Cert) has issued a medical advisory about vulnerabilities found in Stryker equipment. Nine vulnerabilities were identified, affecting Secure II MedSurg Beds, S3 MedSurg Beds, and InTouch ICU Beds. The vulnerabilities could be potentially exploited to allow “data traffic manipulation, resulting in partial disclosure of encrypted communication or injection data”. The attacker need only be in radio range of the devices to perform a successful attack. The vulnerabilities are present in the four-way handshake used by WPA and WPA2 wireless security protocols which allow nonce reuse in Key Reinstallation (KRACK) attacks. Similar vulnerabilities…

DoD Report Reveals Defense Health Agency Failures

The Department of Defence (DoD) Office of Inspector General (OIG) has released a report revealing that the Defense Health Agency (DHA) failed to implement security protocols consistently. This failing resulted in failings to protect against the unauthorised accessing of systems that stored, processed, and transmitted electronic health records and other sensitive patient information. The DoD OIG Report – DoDIG-2017-085, “Protection of Electronic Patient Health Information at Army Military Treatment Facilities” details the failings and includes suggestions made by OIG to improve the system. The DoD OIG found that Common Access Cards (CACs) were not used to access three DoD EHR…

OCR Looking for New Deputy Director for Health Information Policy

The U.S. Department of Health and Human Services’ Office for Civil Rights has is looking to appoint a permanent Deputy Director for Health Information Privacy. There has been no permanent Deputy Director for Health Information Privacy since October 2017, when Deven McGraw left the office to take a position in the private sector. OCR’s Senior Advisor for Compliance and Enforcement, Iliana Peters, stepped in temporary before also moving to the private sector in February 2018. Timothy Noonan, the former regional manager for the HHS Office for Civil Rights in Atlanta, replaced Peters in February 2018 and is still acting in…

McLean Hospital Issued $75,000 Fine by Attorney General for 2015 Data Breach

Massachusetts Attorney General issued a $75,000 fine to McLean Hospital over a 2015 HIPAA violation. McLean Hospital, a psychiatric hospital and affiliate of Harvard Medical School, was issued the fine by Massachusetts Attorney General Maura Healey for a violation of the Health Insurance Portability and Accountability Act (HIPAA) in 2015. The violation pertained to a data breach experienced by the hospital that compromised the integrity of the protected health information (PHI) of approximately 1,500 patients. The breach occurred through a former employee of the facility taking 8 backup tapes containing sensitive patient data back to their home. The employee had…

Survey Finds Irish Workers Lack Security Training to Deal with Phishing Threat

The results of a recent survey conducted by Censuswide has revealed the huge threat that phishing attacks pose to Irish workers due to lack of security training. The study was conducted on 500 Irish workers by Censuswide, a survey consultancy. The survey was commissioned by Datapac, an Irish IT service management company, in conjunction with Sophos, an IT security organisation. Phishing attacks are campaigns made by cybercriminals to obtain sensitive information such as passwords or credit card details from a victim by pretending to be a reputable organisation via electronic communication channels. The attacks are often conducted through emails. The…

New Microsoft Office 365 Phishing Attack Discovered

A cybersecurity consultant has identified a new Microsoft Office 365 phishing attack that fools unsuspecting users into entering their Office 365 account details into a fake website. Phishing attacks are attempts made by cybercriminals to obtain sensitive information such as passwords or credit card details from a victim by pretending to be a reputable organisation via electronic communication channels. Often conducted through emails, the messages look surprisingly legitimate, and often direct the victim to a website which is a convincing copy of the genuine site. The only noticeable difference between the two web pages may be the URL, which ignorant…

Kaspersky Labs Releases Report on 2018 Malware Attacks

Kaspersky Labs, a multinational cybersecurity and anti-virus organisation, has published its 2018 report on malware attacks detected on its network between November 2017 and October 2018. The report highlights the growing threat that malware attacks pose to data security worldwide. The report uses information obtained using data collected from Kaspersky Security Networks (KSN) users, of which there are millions worldwide. The report shows that there has been a 43% increase in ransomware detections experienced by KSN users during the period between November 2017 to October 2018 in comparison to the same period the previous year. The data also showed a…

Former Employee of Upstate University Hospital Involved in Security Breach

Upstate University Hospital in Syracuse, NY, has announced that over a thousand patients have been affected by a security breach involving a former employee of the facility.  The breach was discovered at Upstate University Hospital on September 12, 2018. An investigation was launched to determine the cause of the breach and assess the scope of the damage. The investigation revealed that the former employee first accessed patient health records without any legitimate work reason for doing so on November 3, 2016. Patient records continued to be accessed until October 23, 2017. Employees accessing the protected health information (PHI) of individuals…

RSA Q3 2018 Analysis Shows Huge Increase in Phishing Attacks

RSA, a computer and network security organisation based in the USA, has released its security analysis for Q3 2018. The analysis shows that the number of phishing attacks has increased by 70% between Q3 and Q2 2018. The report also stated that 50% of all fraud incidents experience by organisations come in the form of phishing attacks.  Phishing is a form of fraud in which the criminal attempts to obtain sensitive information by pretending to be a trustworthy entity. These types of attacks are most commonly made over email. The emails are often easy to mistake for legitimate emails; they…

Microsoft’s November Patch Tuesday Addresses 64 Vulnerabilities

November 13 2018 marked Microsoft’s November Patch Tuesday. The day saw the release of patches and security updates for Windows, Internet Explorer, Edge, and other Microsoft products. In total, 64 vulnerabilities were addressed across the range of Microsoft products. There were 12 vulnerabilities which were considered “critical” by developers. The updates are hoped to protect Microsoft devices against malware attacks, which are becoming increasingly prevalent.   The 12 critical vulnerabilities could allow hackers to execute malicious code and take full control of a vulnerable device. The majority of the critical vulnerabilities are in the Chakra Scripting Engine, which account for…

WordPress GDPR Compliance Plugin Flaw Exploited by Hackers

Defiant, a security research organisation which specialises in WordPress website security, has identified a flaw in a plugin that has allowed unauthorised individuals access and alter websites.  The flaw was identified in a GDPR Compliance plugin, which was created in response to the introduction of the EU privacy laws in May 2018. The plugin allowed website owners to add a checkbox to their website for users to consent to the use of their data for specific uses, as now required by GDPR legislation. Due to the importance of GDPR, and the hefty financial penalties that organisations faced for non-compliance, it…

Medical Attendant Fired for HIPAA Breach

In January this year, a medical attendant assistant was let go from Wayne Memorial Hospital for a HIPAA infringement after the improper obtaining of 390 patients’ documents was found. A famous event in 2011 observed medical caretakers and other medicinal services staff snoop on patient records. All things considered, there hosted been a gathering in a neighboring town where there were numerous medication overdoses. Allina Hospitals and Clinics let go 24 individuals from staff for the unseemly getting to of PHI. Attendant Fired for HIPAA Breach at Glendale Adventist Medical Center Every year, many attendants are found to have disregarded…

The Florida Blue Information Reveal Affected 939 Patients

Blue Shield and the Blue Cross of Florida stated that personal information of a few insurance candidates has been revealed via online means. In last August, the Florida Blue was warned for the patient’s data exposure so it launched the investigation right away.  According to the investigation report of Florida Blue, the information of 475 candidates was shifted to clouds by an illegal insurance agent RTHQ (Real Time Health Quotes). The stolen data includes the files related to the agency, copies of life insurance, dental and health applications ranging 2009-2014. All those files were stored in the cloud without any…

9500 Patients of Medical College Got Affected by Wisconsin Phishing Attack

9500 patient’s information has been exposed in a phishing attack to a Medical College of Wisconsin. The attackers got access to the email account of employees working in the college that contained PHI of patients and other sensitive information of faculty members. The type of information available was names, medical record no., DOB, details of health insurances, the names, surgical information, service date, information about treatment and medical diagnosis. A few patients also have their financial information and Social Security nos. This instance happened during a week between 21st July and 28th July when the employees of the Medical College…

Doubtful Phishing Violence on UPMC Susquehanna Revealed PHI of 1200 Patients

UPMC Susquehanna is a linkage of medical centers and the hospitals in Muncy, Pennsylvania and Williamsport Wellsboro. UPMC declared that 200 patients PHI has been checked and accessed by illegal individuals. It is believed that the access to PHI is gained when an employee of the organization answered phishing email. Although the date of the incident has not been highlighted yet. According to UPMC Susquehanna the breach was discovered on 21ts September when the worker of the organization highlighted doubtful activities on the device. According to the investigation process, the illegal individual got access to the information using the employee’s…

TJ Samson Community Hospital Found 683 patients’ PHI retrieved by Unauthorized People

The PHI of 683 patients belonging to TJ Health Columbia Clinic and TJ Samson Community Hospital in Glasgow was accessed inappropriately. This incident was highlighted by one of the autonomous care provider who worked for TJ Samson Community. This theft was checked and unrelieved in the repetitive review of PHI logs on 25th August, 2017. The continuous investigation showed that there were two people in the healthcare provider’s office who stole the PHI of patients without undergoing the policies and rules. It is a fact that autonomous health care provider have access to PHI of patient to perform daily routine…

PHI Of 932 Members Of Texas Children’s Health Plan Emailed To Private Account By An Employee

The PHI (Protected health information) of members (932) of Children Health Plan has been emailed to the personal account of prior employee. This instance happened on 21, Sep 2017, although, the employee sent the data in November or December 2016. These emails were found during a daily review analysis. The Texas Children’s Health Plan immediately took action to the attack and responded to minimize the risk too.  In order to prevent such problems in future, the Health Plan also implemented the Insurance plan. Additionally, all the workers have been retrained for the HIPAA rules and the hospital policies. Although, the…

Alaska DHSS Revealed PHI Breach and Malware Infection

A virus named Trojan horse virus has been discovered on two devices that have been used by the Health and Social Services department. This virus access and steals the information stored on laptops. “HIPAA revealed of 500 plus individuals”, the statement was highlighted by Katie Marquette who is the communication director is Alaska DHSS. Currently, the right number of the people affected has not be discovered. Complete analysis of the affected devices has been conducted that disclosed the attackers. According to the analysis, the trackers are present in Western area, may access the important and sensitive information like reports and…

Phishing Attacks Due to Malicious URLs Increased 600% in 3rd Quarter of 2017

Among all the identified healthcare breaches, the phishing attack is one of the major threats to the privacy of PHI. A few weeks ago, different healthcare companies announced email accounts with the PHI of 1000s of patients has been stolen by different people. On the basis of which, the healthcare employees are answering the phishing emails. The reports highlighted the increase in Phishing attacks with Malicious URLs This week a new report has been released and this report shows that there is a major increase in the malicious emails in past few months. A Quarterly threat article from Proofpoint highlighted…

PHI Of 3,725 Experts Was Uncovered: A Report Of Lost Laptop

A nearly expired laptop with very sensitive information has been missing. This laptop was belonged to the Mann-Grandstaff who worked as the VA in Spokane, WA. The laptop contained all the information about hematology tests as it was combined with the hematology analyzer. Previously the laptop was in use from April 2013 to the May 2016, but later on, when the device was not usable, it was decommissioned. A vender who supplied the device replaced the device, however the missing device was revealed by the equipment inventory. Vender of the device has no record, but the device should be returned…

1081 Patients Of St. Louis Were Informed About The PHI Disclosure

The number of patients in MS center of st Louis and the MC Neurology County and town. All these patients were informed that the marketing teams of pharmaceutical companies may contact them for the research purpose. The teams may belong to the third parties. According to the authorized party, they are not permitted to contact them, but still there are some chances that the marketing teams may contact them. According to the HIPAA rules, no marketing or the research team are permitted to contact the patients for research purpose, until or unless they got permission from the authorized party. However,…

FHKC (Florida Healthy Kids Corporation) Stated 2,000 Patients Got Affected Due to Phishing Scam

The Phishing attack has been becoming a viral issue for the healthcare companies. The latest news to HIPAA is that phishing attack has also affected the Florida Healthy Kids Corporation. On 25th July, 2017 the staff members started getting phishing emails. Some of the staff members also responded to those emails and ultimately gave access to the attacker to get the private information. When the management realized about the phishing attack, they immediately blocked the access to the email accounts. The situation was clearly handled on time. The hacker had access the accounts containing data for about 24 hours. At…

28,000 Patient’s PHI Got Exposed as a Result of MJHS Phishing Attack

In a few weeks before, it has been a wave of phishing attacks on the information of healthcare companies. Due to the enhances threats, the Department of Health and Human Services’ Office for Civil Rights issued notice to the healthcare companies, empathizing them to increase their security checks using regular training sessions of the workers and implementation of new rules. Phishing attack is one of the attack in which malware is successfully transferred to the devices and this results in the stealing of sensitive information. The email accounts hold a huge information about the patients, it is the information that…

10,000 Patients Of Plastic Surgery Were Notified Of Ransomware-Related Protected Health Information Breach

About 10,200 Plastic Surgery patients from South Dakota have been informed that a part of their PHI has been breached due to the Ransomware attack in Feb. According to the Associates of Plastic Surgery belonging to South Dakota found that virus got connected to the systems on 12th Feb 2017. In order to remove the ransomware from the systems, the authority took immediate steps and they also called the experts to determine and analyze the severity of the breach and to what extent the patients got affected. Luckily, the health information of the patients was coded properly so most of…

Aetna Issues Stated 5000 Patients PHI Revealed Online

A health insurer Aetna located in Harford, CT found that the PHI of 5000 members was exposed via online means and the information was also accessible via the search engines.  Aetna conducted an investigation on 27 April, 2017 for the security problem that affected 2 computer services. Those computer services were responsible to expose the documents showing Information of authorized people and other member plans. During the investigation Aetna found, that these documents were also submitted to search engines and unauthorized people can easily access those. On 10th May, the investigation report highlighted the fact that the data has been…

Texas Health and Human Services Commission Reports 600 of PHI Disclosure

A storehouse constructor has notified the Texas Health and Human Services Commission (HHSC) that 15 stockpiling cases have been found to miss. The cases were stocked at three Iron Mountain offices in Irving, Fort Worth, and Dallas. The cases contained records identifying with people who had connected to HHSC for restorative help between January 1, 2008, and August 31, 2009. The documents included addresses, names, Social Security numbers, and dates of birth, financial balance numbers, Medicaid numbers, and restorative record numbers. The rupture report submitted to the Department of Health and Human Services’ Office for Civil Rights show 600 people…

A Hacker Got Access To Billing Records Of 3,365 Patients

One of the skin care experts in Atlanta stated that an information security instance has been notifies that caused the breach of billing records of approx. 3,365 patients. According to an estimation, an illegal and unauthorized person accessed the system of healthcare provider on 15th Oct 2016 while it was discovered on 2nd Feb 2017.  There was the information about the billing records of the patients and it further contained, the names, phone numbers, the addresses, medical record numbers, the date of birth, health insurance and the physician’s information. Although the hacker was unable to obtain the SSN and the…

Report Highlighted 8000+ Security Issues In Pacemakers By 4 Major Manufacturers

Last year, the security issues in the implantable devices has been so popular only because of the threats to patient’s health and safety.  In 2016, the MedSec directed an investigation for the pacemaker system that highlighted there were some security issues in the cardiac products from St. Jude Medical. These issues may damage the battery of the devices or the devices too. The working or the functionality of the devices may suffer from this. Jonathan Butts and Billy Rios belonged to the WhiteScope security research organization. They printed a white paper enlisting the findings of the research. Both of them…

Configuration Error From Supplier Caused The Breach Of Ephi Of 14,000 Individuals

Universal care found a serious breach of PHI. On 28 Dec, 2016, Brand New Day found that an unauthorized individual got access to the PHI that was send to one of the business associated. The information was obtained by a third party supplier system that was used by the company’s contract provider. This incident happened 6 days ago on 22nd Dec 2016. The incident notification that was differed to attorney general of California does not contain any information about the affected members of the incident. Although, the information was breaches and the criminal investigation was immediately started by law. The…

Inappropriate Faxing Issues Shown That Patients PHI Has Been Sent To The Media Outlet

Some PHI of the patients were mistakenly faxed from Fort Worth’s Seven Doctor’s office. They faxed the documents to the wrong number. The information in the faxed documents was very important as it included the names, SS numbers, and the date of births, medical histories and much more.  Such mistakes can send the information of the patients in the wrong hands to commit frauds. In this case, the error was the wrongly sent emails to WFAA. The information received by WFAA was about 28 patients that should be sent to Baylor Surgicare. The main reason was that, the fax number…