Friday, March 29, 2024

2.7 Million Sensitive Medical Recorded Calls Audio Exposed on The Internet

An Unprotected server exposed the sensitive Medical related recorded calls
as audio files that make 1177 since 2013 that received by the healthcare representative.

1177 is a Sweden based Healthcare website and telephone service with information, advice, and services within health and care for Swedish peoples.

These recorded calls stored in open server without password protection and none of other security Implementation.

The report revealed by a Computer Sweden and they listened to some of the conversations to form an idea of ​​the extent of the leak and the damage to the public.

The recorded calls includes some of the very sensitive conversation about the diseases and ailments about the patients and their symptoms along with previous treatments.

Apart from this, some of the records contains the caller number which contain nearly 57 000 Swedish telephone numbers appear in the database.

The saved audio files about the patients and their conversation should be treated with confidentiality according to the patient data law .

According to Computer Sweden , “when a person wants to receive advice via the 1177 Healthcare Guide by telephone, the calls are linked either to the nursing region’s own employees nurses, which takes place in most care regions, or they are linked to the companies that are entrepreneurs for the healthcare regions that allow contractors to take care of the advice”

Computer Sweden reached to the Inera, a limited company owned by Swedish county councils, regions and municipalities and the Inera said” “takes this very seriously and works with the three affected regions and subcontractors to analyze the problem and ensure that it is rectified.”

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

APT Group Cyber Attack Against Medical Sectors to Hack X-Ray & MRI Scan Machines

APT Hacking Groups are Targeting Vulnerable Medical Networks for Cyber Attack

Atrium Health Data Breach Affected More than 2 Million Patients


Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles