655K Health Files from Unreported Data Breaks Purchasable on Darknet
Throughout the last few weeks, huge data dumps occurred from extraordinary cyberattacks on MySpace, LinkedIn, and Tumblr. More lately, in excess of 33 million mutilated Twitter accounts were registered online for sale. These accounts are thought to have been mutilated making use of the records gotten in the LinkedIn break.
Provided the quantity of healthcare data breaks that have happened during the last few years, it’s to be projected that a few of these files will be registered for sale on subversive media because cyberpunks consider converting data into money. Nevertheless, 3 big healthcare databanks have just been registered for sale online which don’t seem to have come from past healthcare data breaks.
655,000 Healthcare Files Registered for Sale from Latest Unreported Data Breaks
The data seem to have originated from 3 separate breaks. The cyberpunk who registered the files for sale has signaled there will be more coming up. The lots of files presently being presented for sale aggregate 655,000 patient files.
The files have been registered for sale by the cyberpunk “TheDarkOverlord” who declares the files have been thieved in cyberattacks on 3 healthcare companies, one in Atlanta, Georgia, one in the Central/Midwest United States, and one from Farmington, Missouri. The advertising is along with screenshots to confirm the data and intrusions are authentic.
As with the MySpace and LinkedIn breaks, the data have been registered for trade on the darknet market TheRealDeal.
The 3 files have been registered individually and the cyberpunk has declared he will offer one copy of each only. The total cost of all 3 files is 1063.72 Bitcoin. Nevertheless, he also declares that he has already vended a bunch of members’ data of Blue Cross Blue Shield from the Atlanta databank for $100,000. The cyberpunk is also attempting to receive the sum from the healthcare companies which were hacked. The identities of those businesses haven’t been revealed.
The thieved files include plan members’ and patients’ names, dates of birth, addresses, Social Security numbers and email addresses – all the files required by cybercriminals to carry out identity thievery.
The Farminton, MO., databank has 47,864 patient files and was thieved from a Microsoft Access databank kept by a healthcare supplier. The cyberpunk hacker asserts to have gotten the files using “freely obtainable plaintext passwords as well as usernames.”
The databank from the Midwest/central area contains 207,572 patient files. The cyberpunk declares to have accessed the network by making use of plaintext passwords and usernames as well as informs that the company had a rigorously misconfigured system.
The Georgia data contains 396,458 patient files and was similarly gotten using freely obtainable plaintext passwords and usernames. This databank has many files of United Healthcare and Blue Cross Blue Shield members and was thieved from a friendly internal network.
Distant Desktop Protocol Abused
The cyberpunk states he got all of the files by misusing Distant Desktop Protocol. Distant Desktop Protocol is employed by tech support organizations to distantly get into computers to carry out maintenance and solve computer problems. The cyberpunk declares to have access to the computer systems as well as gone through the system till he “moved to the juicy devices operating their electrical health systems.”
He also released a declaration stating, “Next time an enemy arrives to you and presents you a chance to hide this as well as make it go missing for a small payment to avoid the leak, accept the proposal. There is a great deal more to come.”