A US lab testing provider, Laboratory Services Cooperative, yesterday confirmed the exposure of 1.6 million people from its systems in an October 2024 attack. Data exposed in this breach includes names, SSNs, license numbers, diagnoses, lab results, treatments, insurance details, billing details and more.
Oops.
Ensar Seker, CISO at SOCRadar had this to say:
“The data breach at Laboratory Services Cooperative (LSC), affecting 1.6 million individuals, is one of the most significant healthcare sector incidents we’ve seen this year. Not just in terms of scale, but in terms of sensitivity and impact. LSC’s role as a centralized lab service provider to organizations like Planned Parenthood and others across more than 35 states makes this not just a health data incident, but a targeted attack on reproductive healthcare infrastructure.”
“What makes this breach especially damaging is the breadth of data exposed. We’re talking about a full-spectrum compromise. Personally identifiable information (PII), medical diagnoses and treatments, lab results, financial data, and even government-issued IDs like passports and Social Security numbers. This creates a perfect storm for identity theft, medical fraud, and social engineering attacks.”
“Unfortunately, the healthcare sector continues to be a prime target for threat actors because the data is both extremely valuable on the black market and difficult to change. You can cancel a credit card but you can’t cancel your diagnosis, your birth date, or your lab history.”
“From a threat intelligence perspective, we’re already seeing evidence that threat actors are prioritizing healthcare organizations not just for financial gain, but to cause disruption, especially in politically sensitive areas like reproductive health. This makes it even more urgent for medical organizations and their partners to move beyond basic compliance and adopt a threat-informed, zero-trust security model.”
“This breach is a painful reminder that cybersecurity is patient safety, especially in sectors handling deeply personal and politically sensitive information.”
Paul Bischoff, Consumer Privacy Advocate at Comparitech adds this:
“Cyber attacks against healthcare providers like this are very common and very costly. They are usually ransomware attacks. Hospitals and other providers can’t afford downtime, which makes them more likely to pay a ransom to quickly restore operations. Downtime is often more costly than paying a ransom, and ransomware gangs know this.”
“If an organization refuses to pay the ransom, it could face extended downtime, data loss, and putting data subjects at increased risk of fraud. From 2018 to 2024, we tracked 654 confirmed ransomware attacks on US healthcare organizations. The resulting downtime costs an estimated $1.9 million per day per organization on average, with an average downtime of 17 days.”
Chris Hauk, Consumer Privacy Champion at Pixel Privacy follows with this:
“Customers who may have had their data exposed in the LSC breach will need to stay alert for phishing attempts, new accounts being opened under their name, calls claiming to be bill collectors, and more. Affected parties should take advantage of any credit monitoring services that may be offered by LSC.”
This is normally the part where I would say that this situation is unacceptable and that they need to be hauled in front the relevant authorities to face the music. But unfortunately, given what is going on in the US at the moment, the latter half of that is likely not going to happen no matter how unacceptable this is. Which is going to be a huge problem as companies won’t be “incentivized” to do better to avoid any sort of meaningful punishment.
UPDATE: Erich Kron, security awareness advocate at KnowBe4, commented:
“While the focus on breaches such as this are often around the personal information that was stolen and could be used to steal an identity, the other data often included can be used to create social engineering attacks that could be very damaging.
If an attacker knows a specific time and place where an individual was, or has information about a specific procedure that was performed, it can be easy for them to pretend that they are associated with the hospital, insurance company, or other organization related to the procedure and demand payment for services. For example, a bad actor could contact a victim, referencing the procedure, and saying that part of that procedure was not covered, and that the person needed to pay them now or be turned over to collections. The complex and expensive process of modern healthcare procedures can make an approach such as this very believable.
It is critical that people impacted by a breach, such as this, are quickly informed of the data loss and are aware of the threats they now face. Victims of the breach should be very cautious of any organization that contacts them and references information that could have been included in this breach.”
Price Drop Alert: Galaxy S25 Ultra Now Available at a Reduced Price
Posted in Commentary with tags Samsung on April 11, 2025 by itnerdSamsung has just announced a limited-time price drop on its flagship Galaxy S25 Ultra, known for its 200MP industry-leading camera system, all-day battery life, and sleek design. For a limited time, the device will be available for 35% off, making it more accessible than ever for users looking to upgrade.
With consumer interest in affordable premium devices on the rise, this move is part of Samsung’s broader push to make cutting-edge technology more accessible.
The Galaxy S25 Ultra also pairs nicely with the Galaxy Tab S10 FE and Galaxy Book5 Pro in case someone wants to be “matchy matchy.”
1 Comment »