Friday, April 11, 2025
HomeCyber Security NewsTexas Tech Systems Breach, Hackers Accessed System Folders & Files

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

Published on

SIEM as a Service

Follow Us on Google News

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences Center El Paso (TTUHSC El Paso), collectively known as the HSCs, have disclosed a significant cybersecurity breach impacting sensitive data.

The breach, which occurred between September 17 and September 29, 2024, allowed unauthorized access to and possible removal of certain folders and files containing personal and medical information.

Texas Tech Systems Breach

 The incident came to light in September 2024 when the HSCs noticed disruptions to their systems and applications.

- Advertisement - Google News

Immediate steps were taken to secure the network, and an in-depth investigation revealed that a cyberattack was responsible for the disruption.

2024 MITRE ATT&CK Evaluation Results Released for SMEs & MSPs -> Download Free Guide

The compromised data includes personal identifiers such as names, addresses, Social Security numbers, driver’s license numbers, financial details, medical records, health insurance information, and patient diagnoses and treatment histories.

To mitigate the risks, the HSCs are proactively notifying affected individuals and offering complimentary credit monitoring services.

A dedicated assistance line, 1-866-902-1996, is also available for further inquiries. The helpline operates Monday through Friday, 8 a.m. to 8 p.m. Central Time, excluding major U.S. holidays.

In response to the breach, the HSCs are re-evaluating their security protocols, implementing enhanced monitoring, and introducing additional safeguards to prevent future incidents.

Affected individuals are advised to stay vigilant by reviewing account statements, monitoring credit reports, and checking health insurance and billing documents for unusual activities.

Under U.S. law, individuals are entitled to a free annual credit report from the three major credit bureaus: Equifax, Experian, and TransUnion.

The HSCs have also highlighted the option to place fraud alerts or credit freezes on credit files to prevent unauthorized activity. While both measures provide protection, they may also slightly inconvenience financial processes, such as loan approvals.

This breach underscores the increasing vulnerabilities of health organizations to cyberattacks, bringing attention to the importance of robust cybersecurity measures to protect sensitive data.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...