Saturday, April 5, 2025
HomeCyber Security NewsTexas Tech Systems Breach, Hackers Accessed System Folders & Files

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

Published on

SIEM as a Service

Follow Us on Google News

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences Center El Paso (TTUHSC El Paso), collectively known as the HSCs, have disclosed a significant cybersecurity breach impacting sensitive data.

The breach, which occurred between September 17 and September 29, 2024, allowed unauthorized access to and possible removal of certain folders and files containing personal and medical information.

Texas Tech Systems Breach

 The incident came to light in September 2024 when the HSCs noticed disruptions to their systems and applications.

Immediate steps were taken to secure the network, and an in-depth investigation revealed that a cyberattack was responsible for the disruption.

2024 MITRE ATT&CK Evaluation Results Released for SMEs & MSPs -> Download Free Guide

The compromised data includes personal identifiers such as names, addresses, Social Security numbers, driver’s license numbers, financial details, medical records, health insurance information, and patient diagnoses and treatment histories.

To mitigate the risks, the HSCs are proactively notifying affected individuals and offering complimentary credit monitoring services.

A dedicated assistance line, 1-866-902-1996, is also available for further inquiries. The helpline operates Monday through Friday, 8 a.m. to 8 p.m. Central Time, excluding major U.S. holidays.

In response to the breach, the HSCs are re-evaluating their security protocols, implementing enhanced monitoring, and introducing additional safeguards to prevent future incidents.

Affected individuals are advised to stay vigilant by reviewing account statements, monitoring credit reports, and checking health insurance and billing documents for unusual activities.

Under U.S. law, individuals are entitled to a free annual credit report from the three major credit bureaus: Equifax, Experian, and TransUnion.

The HSCs have also highlighted the option to place fraud alerts or credit freezes on credit files to prevent unauthorized activity. While both measures provide protection, they may also slightly inconvenience financial processes, such as loan approvals.

This breach underscores the increasing vulnerabilities of health organizations to cyberattacks, bringing attention to the importance of robust cybersecurity measures to protect sensitive data.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...