Health

Third-party data breach aggregation: mscripts, Diligent, Mailchimp



This month, more than 114,000 individuals may have had their personally identifiable and protected health information exposed to these incidents, while an email marketing hack is a new source of calls. phishing attack.

Mscript drug compliance platform violated

On January 17, mscripts, a cloud-based mobile pharmacy platform focused on patient engagement and medication compliance solutions, reported to the US Department of Health and Human Services. about the unauthorized access/disclosure regarding protected health information of 66,372 individuals, according to the Office for Civil Rights cases on the investigation list.

The San Francisco-based platform, owned by Cardinal Health based in Dublin, Ohio, uses interactive SMS messaging and branded mobile apps to provide dose and refill reminders medication as well as other prescription management functions.

It has partnerships in the healthcare sector and customers include retailers like Kmart and Wegmans as well as vendors like Intermountain Healthcare, Banner Health and Henry Ford Health System.

Mscripts and Cardinal Health have not yet posted data breach notices on their websites.

The mscripts privacy policy on Henry Ford’s website indicates that PII, as well as PHI, may be collected by mscripts from users and their pharmacies.

Diligent Corporation announces PII breach, exposing UCHealth data

According to a UCHealth announcement posted on their website on January 17, “Diligent provides hosting services to UCHealth and reports to UCHealth that Diligent’s software was accessed and attachments were downloaded. down to include UCHealth files.”

The Colorado-based healthcare provider noted that electronic medical records and email systems were not part of the breach, but that “some patient, provider or UCHealth staff may have been included in this incident.”

UCHealth reported to OCR that 48,879 individuals were affected by the hack incident, according to the agency.

The healthcare provider said stolen data could include:

  • Name.
  • Address.
  • Date of birth.
  • Information related to treatment.
  • Social security number.
  • other financial information.

Mailchimp’s second social engineering attack, CloudSEK reports leaked API keys

Mailchimp announced on its website that on January 11, it identified an unauthorized actor that had compromised administrative tools and accessed 133 accounts, exposing customer data, via a second social engineering attack on the company in six months.

The email marketing service provider has suspended those accounts to protect users’ data.

Mailchimp was first compromised in April 2022, and threat actors were able to view around 300 user accounts and obtain object data from 102 of them, as reported by the chief information security officer. information for the HHS cybersecurity program.

As a result, HC3 has warned healthcare organizations about phishing campaigns used by the email marketing platform.

Although it is not a HIPAA-protected entity with a business association agreement, some medical practice management applications integrate with Mailchimp and some medical mail-marketing providers and vendors that work with Malchimp, Constant Contact, and other email marketing platforms.

During the previous social engineering attack in August, Mailchimp determined that the 214 affected accounts were mostly financial institutions and cryptocurrencies.

However, DigitalOcean, a major cloud provider across industries, including healthcare, has confirmed its customers have been affected by the malicious password reset and the provider has moved the service. email service from the platform.

Additionally, CloudSEK’s BeVigil research team released a report in December that the API keys for Mailchimp, along with Mailgun and Sendgrid, had been leaked, potentially allowing threat actors access email conversations and potentially sensitive information.

Leaking API key in Mailchimp will allow threat actors to read conversations, get customer information, expose email lists of many campaigns containing [PII]authorized third-party apps connected to MailChimp accounts, manipulated promo codes and started a fake campaign and sent emails on behalf of the company,” Business Standard reports.

Andrea Fox is the senior editor of Healthcare IT News.
Email: [email protected]

Healthcare IT News is a publication of HIMSS.

news7g

News7g: Update the world's latest breaking news online of the day, breaking news, politics, society today, international mainstream news .Updated news 24/7: Entertainment, Sports...at the World everyday world. Hot news, images, video clips that are updated quickly and reliably

Related Articles

Back to top button