Wednesday, December 25, 2024
HomeCyber Security NewsQuest Diagnostics Says Nearly 12 Million Patients Records Exposed in Data Breach

Quest Diagnostics Says Nearly 12 Million Patients Records Exposed in Data Breach

Published on

SIEM as a Service

Quest Diagnostics has confirmed a data breach that exposes 11.9 million patients records that includes financial data, Social Security numbers, and medical information.

Quest Diagnostics is lab testing provider of diagnostic testing, information, and services that patients and doctors used to make better healthcare decisions.

The breach happened through a contractor of a contractor, Quest outsource billing services to Optum360, which in turn using American Medical Collection Agency(AMCA) to handle that service.

- Advertisement - SIEM as a Service

“AMCA has informed Quest Diagnostics that an unauthorized user had access to AMCA’s system containing personal information AMCA received from various entities, including from Quest.”

According to Quest, the attackers gained unauthorized access to billing systems from August 1, 2018, to May 31, 2019. Quest said it doesn’t receive any other additional information about the security incident from AMCA.

“AMCA first notified Quest and Optum360 on May 14, 2019, of potential unauthorized activity on AMCA’s web payment page.”

The leaked information includes the medical data and other personal data, Quest confirms the lab results were not exposed as it was not provided to AMCA.

“Quest is taking this matter very seriously and is committed to the privacy and security of our patients’ personal information. Since learning of the AMCA data security incident, we have suspended sending collection requests to AMCA.”

“Quest will be working with Optum360 to ensure that Quest patients are appropriately notified consistent with the law.”

Quest said it was working with AMCA and Optum360, as well as the external forensic investigators to determine the potential impact of the damage.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself updated.

Other Recent Data Breaches

POS Malware Steals Users Payment Card Details from Checkers Drive-In Restaurants

First American Leaked 885 Million Most Sensitive Financial Data Online

Stack Overflow Breached – Hackers Accessed Stack Overflow’s Production Systems

80 Million U.S Households Sensitive Personal Data Exposed Online From Unprotected Mystery Database

Docker Hub Hacked – Hackers Gained Access to 190,000 Users Accounts

Bodybuilding.com Data Breach, Resulting from Phishing Attack Via Email

Wipro Security Breach – Employees’ accounts Hacked Through Advanced Phishing Campaign

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing...

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store,...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing...

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...