Security

Cyber-crime

Intruders at HealthEquity rifled through storage, stole 4.3M people's data

No mention of malware or ransomware – somewhat of a rarity these days


HealthEquity, a US fintech firm for the healthcare sector, admits that a "data security event" it discovered at the end of June hit the data of a substantial 4.3 million individuals. Stolen details include addresses, telephone numbers and payment data.

The incident began in March but was only detected in June. The company said in a letter to those affected that it received an alert on March 25 about a "systems anomaly requiring extensive technical investigation and ultimately resulting in data forensics" and that work continued until June 26 – the point at which it became aware that criminals had stole sensitive data.

In the company's original Form 8-K filed with the Securities and Exchange Commission (SEC) on July 2, it said no malicious code was found in its systems. There was also no mention of extortion, which suggests this was a straightforward data smash-and-grab job rather than ransomware.

"Once we detected the unauthorized activity, we immediately launched an investigation and engaged third-party experts to determine the nature and scope of the incident," the letter reads. "We learned during our investigation that a vendor's user accounts – which had access to an online data storage location – were compromised and that because of this, an unauthorized party was able to access a limited amount of data stored in a storage location outside our core systems.

"As a result of our investigation, we took immediate actions including disabling all potentially compromised vendor accounts and terminating all active sessions; blocking all IP addresses associated with threat actor activity; and implementing a global password reset for the impacted vendor. Additionally, we enhanced our security and monitoring efforts, internal controls, and security posture."

HealthEquity's main offering is health saving accounts (HSAs), which allow individuals to save money and use it tax-free for certain medical expenses. The data compromised includes information collected during the sign-up phase, which was subsequently stolen by the unnamed cybercriminals.

Not all individuals have had the same data types stolen, but they could include any combination of first and last names, home addresses, telephone numbers, employee IDs, employer names, SSNs, general contact information about dependents, and payment card data (does not include card number of HealthEquity debit card information).

HealthEquity said it wasn't aware of any cases where the stolen data has been misused, but has offered everyone affected the usual credit monitoring and identity theft services for two years through Equifax</a.

The incident is one of many targeting the healthcare sector in recent times, but the absence of malware or ransomware is a rare curiosity. 

Healthcare is often seen as a prime target for ransomware given the industry's inherent need to maintain operational uptime, but it's rare to see data theft at a major organization without the miscreants trying to further leverage their access into a larger payout.

Significant cases in recent months include the ALPHV/BlackCat (RIP) attack on Change Healthcare and Qilin's attack on Synnovis, a pathology services provider to major London hospitals.  ®

Send us news
5 Comments

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Enzo Biochem ordered to cough up $4.5 million over lousy security that led to ransomware disaster

Three state attorneys general probed the company and found plenty to chastise

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer

National Public Data tells officials 'only' 1.3M people affected by intrusion

Investigators previously said the number was much, much higher

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

110K domains targeted in 'sophisticated' AWS cloud extortion campaign

If you needed yet another reminder of what happens when security basics go awry

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Plane tracker app FlightAware admits user data exposed for years

Privacy blunder alert omits number of key details