Sunday, November 24, 2024
HomeCyber Security NewsAtrium Health Data Breach Affected More than 2 Million Patients

Atrium Health Data Breach Affected More than 2 Million Patients

Published on

Atrium Health hit with a major data breach which impacted 2.65 million patients, attackers accessed the patient’s personal information. The intrusion occurred between Sept. 22-29.

Hackers gained access to the data stored in a third-party system owned by AccuDoc Solutions Inc., which provides billing services to Atrium and other 50 medical centers.

The personal information including names, addresses, dates of birth, invoice numbers, account balances, dates of service, insurance policy information and Social Security numbers are compromised, Atrium says in a report to Bizjournals.

- Advertisement - SIEM as a Service

Atrium confirms no medical records nor financial information was impacted with the data breach as they stored in their core system and not associated with AccuDoc.

The breach was reported by AccuDoc to Atrium on Oct. 1, according to the forensic investigations, the hackers only able to obtain the read-only permission for the data and they were not able to remove or download data.

Affected locations include Atrium Health facilities and partner sites at Blue Ridge Healthcare System, Columbus Regional Health Network, New Regional Medical Center Physician Group, Scotland Physicians Network, and St. Luke’s Physician Network.

“Atrium notifying the patients about the breach and guarantors who may have been impacted by this incident. We take cybersecurity very seriously, and we’ve worked very hard to determine exactly what happened and how to prevent,” reads Atrium statement.

Related Read

These are the Top 5 Publicly Available Hacking Tools Mostly used By Hackers

Hackers Breach HealthCare.gov System and Steal Sensitive Personal Data of 75,000 Customers

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...