Saturday, June 15, 2024

2.7 Million Sensitive Medical Recorded Calls Audio Exposed on The Internet

An Unprotected server exposed the sensitive Medical related recorded calls
as audio files that make 1177 since 2013 that received by the healthcare representative.

1177 is a Sweden based Healthcare website and telephone service with information, advice, and services within health and care for Swedish peoples.

These recorded calls stored in open server without password protection and none of other security Implementation.

The report revealed by a Computer Sweden and they listened to some of the conversations to form an idea of ​​the extent of the leak and the damage to the public.

The recorded calls includes some of the very sensitive conversation about the diseases and ailments about the patients and their symptoms along with previous treatments.

Apart from this, some of the records contains the caller number which contain nearly 57 000 Swedish telephone numbers appear in the database.

The saved audio files about the patients and their conversation should be treated with confidentiality according to the patient data law .

According to Computer Sweden , “when a person wants to receive advice via the 1177 Healthcare Guide by telephone, the calls are linked either to the nursing region’s own employees nurses, which takes place in most care regions, or they are linked to the companies that are entrepreneurs for the healthcare regions that allow contractors to take care of the advice”

Computer Sweden reached to the Inera, a limited company owned by Swedish county councils, regions and municipalities and the Inera said” “takes this very seriously and works with the three affected regions and subcontractors to analyze the problem and ensure that it is rectified.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

APT Group Cyber Attack Against Medical Sectors to Hack X-Ray & MRI Scan Machines

APT Hacking Groups are Targeting Vulnerable Medical Networks for Cyber Attack

Atrium Health Data Breach Affected More than 2 Million Patients


Website

Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles