Weekly Cybersecurity Recap November 17
Table of Contents
- By Steven
- Nov 20, 2023
Breaches were rampant this week, impacting as many as 15 million individuals. The State of Maine announced that it bled 1.3 million resident records due to the global MOVEit vulnerability. Meanwhile, in Ohio, the City of Huber Heights was targeted by a ransomware attack; potentially, 50,000 residents may have their data exposed. In Michigan, the McLaren Health Care network was allegedly attacked by the ransomware gang BlackCat—losing 2.2 million records to exposure. California’s PostMeds was also attacked, with 2.3 million patients having their information stolen. PJ&A also appeared in the news again this week; a few hundred victims have ballooned to nearly 9 million. Read more about each breach below.
The State of Maine
Victims of the global security incident created by the MOVEit zero-day vulnerability continue to appear. The State of Maine recently announced the assailants may have taken information from nearly every state resident. The stolen data varies between individuals but may include names, Social Security Numbers, dates of birth, taxpayer identification numbers, and health details. Residents are encouraged to seek data protective services immediately.
The City of Huber Heights
On Sunday, November 12th, Huber Heights in Ohio experienced widespread network disruptions. The cyberattack was purportedly a ransomware event, where unauthorized actors accessed the system and began encrypting files. The type of information ransomed in this event is still under review; however, if the attack was large enough, the entire 50,000 resident database could be at risk. Those in the area should consider taking preventative measures to protect their data.
McLaren Health Care
A ransomware attack also targeted patients in Michigan. A reported 2.2 million patients had their data leveraged against authorities by the cybercriminal gang BlackCat. The exposed information includes patient names, Social Security Numbers, dates of birth, health insurance data, Medicare/Medicaid details, medical records, diagnostics, and prescription medication details. Subsequently, McLaren Health Care patients, regardless of rendered services, must monitor their accounts if not set up alerts for activity.
PostMeds, operating as TruePill, had their breach back in August. An estimated 2.3 million patients had their data accessed in the event. The information includes names, prescription information, medication types, demographics, and prescribing physicians. Although this patient data may seem mundane, it is also the necessary information needed to commit specialized cybercrimes. Those who have used or held an account with PostMeds must take action to protect themselves. Take an active role in learning about the services you’re entitled to, and ask questions when details are not aligned.
Perry Johnson & Associates
The most significant data breach impact figure comes from PJ&A this week. Although their cyberattack happened around March, the subsequent investigations continue to uncover more damage. Cook County Health initially suggested the impact was about 1.2 million; Northwell Health’s investigation added another 3.8 million to the impact figure. Now, the Department of Health has boosted the number even higher—up to 9 million. Nearly 4 million people have yet to be made aware.
PJ&A’s stolen data includes patient names, birthdays, medical record numbers, Social Security Numbers, insurance information, medical files, medication details, and treatment/healthcare provider names. Additionally, because PJ&A is a third party, it is unclear what other institutions the breach may have impacted. Those aware of their personal information involved in the breach must take immediate action.