Phishing Incident Exposes Medical, Personal Info of 60K Patients

Community-based healthcare system Methodist Hospitals from Gary, Indiana, disclosed that sensitive personal and medical information for 68,039 individuals may have been exposed following a successful phishing attack against two of its employees.

Methodist provides surgical and medical hospital services, it employs 2,576 individuals, and it reported a total number of 195,055 patient encounters during 2018 according to last year's annual report.

"In June 2019, Methodist learned of unusual activity in an employee’s email account. We immediately commenced an investigation, working with third-party forensic investigators, to assess the nature and scope of the email account activity," says the notice of data incident.

"On August 7, 2019, the forensic investigation determined that two (2) Methodist employees fell victim to an email phishing scheme that allowed an unauthorized actor to gain access to their email accounts."

SSNs and payment card data potentially exposed

The following investigation led to the discovery that the first employee's account was accessed on June 12 and from July 1 to July 8, 2019, while the data included within the second one was exposed between March 13 to June 12, 2019.

"While Methodist has no evidence of actual or attempted misuse of any information present in the email accounts, the investigation could not rule out the possibility of access to data present in the accounts," adds the healthcare system.

Methodist also discovered as part of the same investigation that, while the personal and medical information exposed for each individual varies, the two email accounts included the following patient info:

Name, address, health insurance subscriber, group, and/or plan number, group identification number, Social Security number, driver's license/state identification number, passport number, financial account number, payment card information, electronic signature, username and password, date of birth, medical record number, CSN number, HAR number, Medicare/Medicaid number, and medical treatment/diagnosis information.

Methodist began sending notifications to all the individuals that might have had their information exposed following this security incident and also reported the incident to state and federal regulators such as the U.S. Department of Health and Human Services.

Individuals who have received a data incident alert from Methodist are also urged to "to remain vigilant against incidents of identity theft and fraud, to review account statements, and to monitor credit reports and explanation of benefits forms for suspicious activity."

Failed BEC scam leads to data exposure

In related news, UAB Medicine also reported a data exposure incident following another phishing attack that targeted the medical center's payroll department and allowed the attackers to gain access to employee emails containing health information for 19,557 patients. 

According to UAB Medicine, the crooks tried to redirect some of its employees' payments to bank accounts under the attacker's control.

However, although that attempt failed, they were still able to gain access to patient info including names, birth dates, diagnosis and treatment information, and, in some cases, to social security numbers.

UAB Medicine also notified the impacted individuals and advised them to monitor their insurance statements and credit reports for fraudulent or suspicious activity.

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

Related Articles:

Fake VS Code alerts on GitHub spread malware to developers

Dutch Police discloses security breach after phishing attack

TikTok for Business accounts targeted in new phishing campaign

Bubble AI app builder abused to steal Microsoft account credentials

Manager of botnet used in ransomware attacks gets 2 years in prison