Multifactor Authentication Could Have Prevented 9.7 Million-Record Medibank Data Breach
In 2022, a hacker breached the network of the Australian health insurance provider Medibank, obtained the personal and medical information of 9.7 million individuals, and released the stolen data on the dark web. It has now been confirmed that, like the ransomware attack on Change Healthcare, the attack could have been prevented if multifactor authentication had been implemented. Medibank had previously stated that the breach was due to an error by a contractor and a misconfigured firewall; however, the Australian Information Commissioner (AIC) disclosed details of the security failures that led to the breach in a recent Australian Federal Court filing. According to the filing, the cyberattack started with the theft of the credentials of an IT service desk contractor, who had saved Medibank usernames and passwords for multiple accounts in his internet browser profile on his work computer, which he used to provide IT services to Medibank. The contractor subsequently used his personal computer to sign into his internet browser profile on his personal computer, and the credentials...
Cyber Insurance Claims Reached Record High in 2023
Record numbers of cyber claims were filed against insurance policies in North America in 2023, according to a recent analysis by the insurance broker Marsh. Last year, more than 1,800 claims were filed with the company from clients in the United States and Canada, more than any other year to date. There was a small increase in clients reporting at least one cyber incident, up from 18% in 2022 to 21% in 2023; however, the percentage has remained fairly consistent over the past 5 years, ranging between 16% and 21%. Clients in the healthcare industry were the most likely to submit claims, followed by communications, retail/wholesale, finance, and education. In 2023, 17% of all cyber claims were made by clients in the healthcare sector. The data show a significant increase in cyber extortion events, which include ransomware attacks. These events rose to the highest annual level in 2023, although they accounted for fewer than 20% of all claims. While there was an increase in extortion events in 2023, these events occurred at an abnormally low level in 2022. The decline in these events...
Blackbaud Agrees to $6.75 Million Data Breach Settlement with California
Blackbaud has agreed to pay $6.75 million to settle alleged violations of the Health Insurance Portability and Accountability Act (HIPAA) and California’s data privacy laws that resulted in a massive data breach in 2020. Blackbaud provides data management software to nonprofit organizations that they use for their fundraising activities. The software stores sensitive information including names, Social Security numbers, bank account information, and medical information. In May 2020, Blackbaud announced that hackers had gained access to internal systems. Initially, Blackbaud issued a statement claiming that consumers’ personal data was not accessed, only to later confirm that was not the case, and that consumer information had been compromised. The company then failed to issue timely notifications to the affected individuals. The data breach was investigated by the California Department of Justice which confirmed that hackers had accessed internal systems and remained undetected for three months. The attack was possible due to Blackbaud’s failure to implement appropriate...
Hackers Accessed 53 Los Angeles County Department of Public Health Email Accounts
Hackers conducted a phishing campaign on Los Angeles County Department of Public Health employees, accessed 53 email accounts, and potentially stole the data of more than 200,000 clients, employees, and other individuals. The massive email breach was announced by the Department of Public Health on Friday, which confirmed that the email accounts were compromised between February 19 and February 20, 2024. The emails were crafted to appear that they had been sent by a legitimate and trustworthy sender and contained a hyperlink in the message body to a malicious website. The website appeared to be legitimate and asked the employees to log in, which allowed the attackers to steal their credentials and use them to access their email accounts. The review of the affected email accounts confirmed that they contained the personally identifiable and protected health information of clients who received services from the Department of Public Health, employees, and other individuals. The information exposed varied from individual to individual and may have included first and last names, dates of...
Ransomware Attacks in Healthcare
Ransomware attacks in healthcare are now a fact of life. Ransomware is one of the most serious threats facing the healthcare industry and electronic Protected Health Information (ePHI) is highly sought after by cybercriminals. Not only is ransomware being used to extort money from healthcare organizations, prior to encryption ePHI is often stolen. Healthcare organizations have the difficult task of processing huge amounts of sensitive data and ensuring data is stored and transmitted securely, while also satisfying user demands for rapid access in a secure, flexible, and efficient way. Protecting against ransomware attacks in healthcare can therefore be a major challenge. The healthcare industry has been extensively targeted by ransomware gangs over past years, but the COVID-19 pandemic has triggered a major increase in attacks. While some threat actors have said they will not attack healthcare organizations on the frontline in the fight against COVID-19, they number in the few. Many other gangs have increased their attacks, and are hitting healthcare providers, testing facilities,...



