Former Aegis Medical Group Employee Potentially Accessed 9,800 Records Without Authorization
The Florida physician network, Aegis Medical Group, has started notifying 9,800 patients that their protected health information may have been accessed by a former employee. That individual is understood to have attempted to sell patient records to third parties suspected of being involved in identity theft and fraud. Aegis Medical Group was informed by law enforcement on September 11, 2019 about the employee. The law enforcement investigation determined that the employee attempted to sell the data of just two patients. Working with law enforcement, the physician network determined that the records of up to 9,800 patients were potentially accessed by the employee between July 24, 2019 and September 9, 2019. The information contained in the records was limited to first and last names, dates of birth, account numbers, postal addresses, diagnosis information, and Social Security numbers. Approximately 75% of the records that may have been accessed were physical records rather than electronic copies. Following notification by law enforcement, Aegis Medical Group immediately terminated...
House Committee Leaders Request Answers from Google and Ascension on Project Nightingale Partnership
Leaders of the House Committee on Energy and Commerce are seeking answers from Google and Ascension on Project Nightingale. The Department of Health and Human Services’ Office for Civil Rights has also confirmed that an investigation has been launched to determine if HIPAA Rules have been followed. The collaboration between Google and Ascension was revealed to the public last week. The Wall Street Journal reported that Ascension was transferring millions of patient health records to Google as part of an initiative called Project Nightingale. A whistleblower at Google had contacted the WSJ to raise concerns about patient privacy. A variety of internal documents were shared with reporters on the extent of the partnership and the number of Google employees who had access to Ascension patients’ data. Under the partnership, the records of approximately 50 million patients will be provided to Google, 10 million of which have already been transferred. According to the WSJ report, 150 Google employees are involved with the project and have access to patient data. The whistleblower stated...
Solara Medical Supplies and Select Health Network Report Phishing Attacks
Solara Medical Supplies, LLC, a Chula Vista, CA-based provider of medical devices and disposable medical products, has announced that the protected health information of many of its customers has potentially been compromised as a result of a phishing attack. On June 28, 2019, Solara Medical identified suspicious activity in the email account of an employee and an investigation was launched to determine the nature and scope of the breach. Assisted by third party computer forensics experts, Solara Medical learned that the breach was far more extensive, and several Office 365 email accounts had been compromised between April 2, 2019 and June 20, 2019. A programmatic and manual review of all compromised accounts was conducted to determine which patients’ protected health information had potentially been accessed. The information in the email accounts varied from patient to patient and included patients’ first and last names in combination with one or more of the following data elements: Address, birth date, employee ID number, Social Security number, health insurance information,...
Update Issued on Unsecured PACS as Exposed Medical Image Total Rises to 1.19 Billion
It has been 60 days since Greenbone Networks reported on the mass exposure of medical images on unsecured Picture Archiving and Communication Systems (PACS). In an updated report, the German vulnerability analysis and management platform provider has revealed the problem is getting worse, not better. Picture Archiving and Communication Systems (PACS) servers are extensively used by healthcare providers for archiving medical images and sharing those images with physicians for review, yet many healthcare providers are not ensuring their PACS servers have appropriate security. Consequently, medical images (X-Ray, MRI, CT Scans), along with personally identifiable patient information, is being exposed over the Internet. Anyone who knows where to look and how to search for the files can find them, view them and, in many cases, download the images without any authentication required. The images are not accessible due to software vulnerabilities. Data access is possible because of the misconfiguration of infrastructure and PACS servers. Between July and September 2019, Greenbone Networks...
Vulnerability Identified in Philips IntelliBridge EC40/80 Hubs
A vulnerability has been identified in the Philips IntelliBridge EC40/80 hub which could allow an attacker to gain access to the hub and execute software, modify files, change the system configuration, and gain access to identifiable patient information. Philips IntelliBridge EC40/80 hubs are used to transfer medical device data from one format to another, based on set specifications. The hub does not alter the settings or parameters of any of the medical devices to which it connects. The vulnerability could be exploited by an attacker to capture and replay a session and gain access to the hub. The flaw is due to the SSH server running on the affected products being configured to allow weak ciphers. The vulnerability would only require a low level of skill to exploit, but in order to exploit the flaw an attacker would need to have network access. The flaw – CVE-2019-18241 – has a CVSS v3 base score of 6.3 out of 10 – Medium severity. The flaw was reported to Philips by New York-Presbyterian Hospital’s Medical Technology Solutions team, and under its responsible vulnerability...



