Earlier this week, the Singing River Health System issued a data breach notification stating that it is now estimating that 895,204 people were impacted by an August 2023 ransomware attack.
Singing River Health System is located in Mississippi and operates the 3 hospitals in the state totaling over 700 beds, as well as 2 hospices, 4 pharmacies, 6 imaging centers, 10 specialty centers, and 12 medical clinics all employing over 3,500 people.
The August 2023 ransomware attack resulted in operational disruptions at its hospitals and it was estimated that 501 individuals had personal data stolen. On September 13, the organization confirmed that data had been exfiltrated, and on December 18, it announced that the incident impacted 252,890 people.
According to the latest information in the notification and on the organization’s site, the exposed data includes:
- Full name
- DOBs
- Physical address
- SSNs
- Medical information
- Health information
The attack was claimed by the Rhysida ransomware gang which so far has leaked roughly 80% of the data they claim to hold, allegedly including 420,766 files totaling 754 GB.
BullWall Executive, Carol Volk had this comment:
“The Singing River Health System’s ransomware attack is a stark reminder of the cybersecurity siege that healthcare organizations are under. This breach is not just a statistic but a severe blow to the trust and safety of nearly a million people. These victims had their most sensitive information—names, dates of birth, addresses, Social Security numbers, and medical records—exposed, placing them at significant risk of identity theft and fraud.
“Hospitals and healthcare systems are prime targets for cybercriminals. The Rhysida ransomware gang’s claim to have leaked 80% of the data they stole highlights the immense challenges in protecting health information. Singing River Health System, with its extensive network of hospitals, clinics, and specialty centers, illustrates the vast attack surface and the inherent vulnerabilities within such a complex IT infrastructure.
“The operational disruptions, coupled with the personal data theft of a staggering 252,890, reveal the deep and lasting scars these attacks inflict on healthcare services. The fallout from such breaches is catastrophic, not only in terms of financial loss but also in the erosion of patient trust and the potential delay or cancellation of critical medical treatments.
“Healthcare organizations can assume they will be breached and must go beyond traditional defensive cybersecurity measures. It is imperative to implement robust ransomware containment defenses and maintain off-site backups to ensure continuity of care without succumbing to the demands of cyber extortionists. The Singing River Health System’s ordeal is a call to action for the entire healthcare sector to fortify its defenses and protect the sanctity of patient data and healthcare delivery.”
Once again I find myself in the position of having to say that healthcare needs more funding to protect themselves from attacks like these. The fact that I am constantly talking about this means that there’s a serious problem, which requires a real solution immediately.
Santander Suffers Third-Party Breach Impacting Customers And Employees
Posted in Commentary on May 16, 2024 by itnerdOn Tuesday, Santander bank confirmed in an online statement that customer and employee data was breached following “unauthorized access to a Santander database hosted by a third-party provider.”
Santander, the euro zone’s second-biggest bank by market value, said that “certain information” relating to customers in Chile, Spain and Uruguay, and 200,000 current and former employees had been accessed.
The bank said it immediately took measures to mitigate the incident, including blocking access to the database and reinforcing fraud prevention to protect customers.
Santander hasn’t disclosed how many customers have been affected or the nature of the stolen data.
“In the database there is no transactional information or access credentials or internet banking passwords that would allow transactions with the bank,” Santander said.
Santander added that its operations and systems have not been affected and customers can continue transactions securely.
Dave Ratner, CEO, HYAS had this to say:
“Yet another report of an unfortunate third-party breach. While it’s a good thing that no transaction details, credentials, or passwords were exposed, other third-party breach victims may not be so lucky, and these events will unfortunately continue across the industry until organizations adopt appropriate cyber resiliency approaches.”
Third party breaches are a thing. Companies need to take that into account when choosing their partners and ensure that their partners are as secure as they are at the very least. Otherwise, you will get pwned through no fault of your own.
Leave a comment »