Tuesday, May 13, 2025
HomeComputer Security2.7 Million Sensitive Medical Recorded Calls Audio Exposed on The Internet

2.7 Million Sensitive Medical Recorded Calls Audio Exposed on The Internet

Published on

SIEM as a Service

Follow Us on Google News

An Unprotected server exposed the sensitive Medical related recorded calls
as audio files that make 1177 since 2013 that received by the healthcare representative.

1177 is a Sweden based Healthcare website and telephone service with information, advice, and services within health and care for Swedish peoples.

These recorded calls stored in open server without password protection and none of other security Implementation.

- Advertisement - Google News

The report revealed by a Computer Sweden and they listened to some of the conversations to form an idea of ​​the extent of the leak and the damage to the public.

The recorded calls includes some of the very sensitive conversation about the diseases and ailments about the patients and their symptoms along with previous treatments.

Apart from this, some of the records contains the caller number which contain nearly 57 000 Swedish telephone numbers appear in the database.

The saved audio files about the patients and their conversation should be treated with confidentiality according to the patient data law .

According to Computer Sweden , “when a person wants to receive advice via the 1177 Healthcare Guide by telephone, the calls are linked either to the nursing region’s own employees nurses, which takes place in most care regions, or they are linked to the companies that are entrepreneurs for the healthcare regions that allow contractors to take care of the advice”

Computer Sweden reached to the Inera, a limited company owned by Swedish county councils, regions and municipalities and the Inera said” “takes this very seriously and works with the three affected regions and subcontractors to analyze the problem and ensure that it is rectified.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

APT Group Cyber Attack Against Medical Sectors to Hack X-Ray & MRI Scan Machines

APT Hacking Groups are Targeting Vulnerable Medical Networks for Cyber Attack

Atrium Health Data Breach Affected More than 2 Million Patients


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Apple Releases Security Patches to Fix Critical Data Exposure Flaws

Apple released critical security updates for macOS Sequoia 15.5 on May 12, 2025, addressing...

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cyberattackers Targeting IT Help Desks for Initial Breach

Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into...

Nomad Bridge Hacker Apprehended in Connection with $190 Million Heist

Alexander Gurevich, a 47-year-old dual Russian-Israeli citizen, was arrested last Thursday at Ben-Gurion Airport...

LockBit Ransomware Group Breached: Internal Chats and Data Leaked Online

The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber...