CorrectCare Integrated Health Data Breach Lawsuit Settled for $6.49 Million
A class action lawsuit against CorrectCare Integrated Health LLC (CorrectCare) over a 2022 data breach that affected around 600,000 individuals has been settled for $6.49 million. The settlement has recently been granted final approval by the court. CorrectCare is a Kentucky-based third-party administrator that facilitates access to medical providers and manages the payment of medical claims for inmates at correctional facilities. In July 2022, CorrectCare identified a misconfiguration on its web server that allowed two file directories to be accessed over the Internet without authentication. The misconfiguration meant sensitive data was exposed over the Internet from January 22, 2022, to July 7, 2022, which included the data of individuals who received treatment between January 1, 2012, and July 7, 2022. The exposed data included names, dates of birth, inmate numbers, and limited health information, including diagnosis codes, CPT codes, treatment providers, dates of treatment, and for some individuals, Social Security numbers. A class action lawsuit was filed by the law firm Shub...
August 2024 Healthcare Data Breach Report
There was a slight increase in large healthcare data breaches in August, reversing a four-month trend of falling data breaches. In August, 49 data breaches of 500 or more healthcare records were reported to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR)., Despite that increase, data breaches were still well below the average monthly breaches in the first half of the year. While there was an 8.9% month-over-month increase in reported breaches, there were 21% fewer breaches than the 12-month average of 62 data breaches a month and 32.9% fewer breaches than in August 2023. There was a sizeable month-over-month increase in the number of compromised healthcare records, which increased by 592.8% from around 1.4 million breached records in July to 9,680,551 breached records in August, reversing a 3-month trend of decreasing breach severity. August was the second-worst month of the year so far for breached healthcare records, but a considerable improvement on the 23 million breached healthcare records in August 2023. Over the past 12 months, an average...
Vanilla Tempest (Vice Society) Threat Group Using INC Ransomware to Attack Healthcare Orgs
Microsoft has issued a warning about a threat group it tracks as Vanilla Tempest, which has been observed using INC ransomware to target the United States healthcare sector for the first time. INC ransomware is a ransomware-as-a-service (RaaS) operation that has proven popular with cybercriminals. In Q2, 2024, INC ransomware was the joint 5th most common ransomware variant, according to Coveware. INC ransomware emerged in July 2023 and primarily attacks the healthcare, education, and government sectors. INC ransomware has been used in recent attacks on National Health Service (NHS) Scotland (May 2024) and McLaren Health Care (Aug 2024). Vanilla Tempest (aka DEV-0832, Vice Society) is a Russian-speaking threat group that has been active since the summer of 2021. Rather than using its own unique encryptor, Vanilla Tempest has deployed versions of other ransomware variants including Hello Kitty/Five Hands and Zeppelin. Latterly, the group has also conducted attacks using the Blackcat and Rhysida ransomware variants. The group engages in double extortion, stealing sensitive data and...
Valid Credentials Most Common Initial Access Vector in Cyberattacks on Critical Infrastructure
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published the results of an analysis of risk and vulnerability assessments (RVAs) at federal civilian executive branch (FCEB) agencies, state, local, tribal, and territorial (SLTT) stakeholders, and high-priority private and public critical infrastructure operators. The report provides insights into the most common vulnerabilities and attack paths cyber threat actors use to access internal networks. Malicious actors use a variety of methods to breach networks; however, the most common attack path involves valid accounts, which were used in 41% of successful attacks. RVA analyses revealed cracking password hashes was common and was successful in 89% of assessments conducted by the U.S. Coast Guard (USCG) to access Domain Administrator accounts. Accounts may be accessed that are internal or external to the network, often by using default credentials, brute forcing weak passwords, or by using stolen administrator accounts, including valid administrative credentials that have been purchased from initial access...
Richland County, WI Notifies 76,000 Individuals About October 2023 Cyberattack
Richland County in Wisconsin has started notifying 76,365 individuals that some of their protected health information was exposed in a September 2023 cyberattack. According to the substitute breach notification, Richland County identified unauthorized access to its network on or around October 4, 2023. After securing its systems to prevent further unauthorized access, an investigation was launched to determine the nature and scope of the unauthorized activity. The forensic investigation confirmed that there had been unauthorized access to its internal systems from September 28, 2024, to October 26, 2023, and during that time, files may have been accessed and/or acquired by an unauthorized individual. Based on the information disclosed in its website notice, it would appear that unauthorized access continued for 22 days after the breach was detected. The review of the affected files has taken around 10 months to complete. On August 1, 2024, Richland County confirmed that the impacted files included personal and protected health information. The types of data involved varied from...



