Utah breach may have compromised over 25,000 Social Security numbers
A configuration error at the authentication level allowed the hacker to circumvent the security system
IDG News Service - A data breach on a server of the Utah Department of Technology Services appears to have compromised the Social Security numbers of 25,096 individuals, the department of health of the western U.S. state said.
The breach, believed to be the work of Eastern European hackers, resulted in the removal of personal information of about 181,604 Medicaid and CHIP (Children's Health Insurance Plan) recipients from the server, Utah Department of Health said Friday. Medicaid is a government health care program in the U.S.
The UDOH said on Wednesday that the impact of the breach on the claims data server was limited to about 24,000 claims. The initial breach was likely to have happened on March 30, it said.
However, as the investigation progressed, DTS found the attackers actually removed 24,000 files, with one file potentially containing claims information on hundreds of individuals.
A configuration error occurred at the authentication level of a multilayered security system on DTS servers, allowing the hacker to circumvent the security system, the Utah state officials said.
The UDOH said it will begin reaching out to clients whose personal information was stolen during the attack, with priority placed on those clients whose Social Security numbers were compromised. The clients will receive a letter instructing them on how to take advantage of free credit monitoring services for one year.
Claims stored on servers like the one that experienced the breach typically could include client names, addresses, birth dates, Social Security numbers, physician's names, national provider identifiers, addresses, tax identification numbers, and procedure codes designed for billing purposes, the UDOH said Wednesday.
The affected server has been shut down, and new security measures have since been implemented. DTS had recently moved the claims records to a new server. DTS has processes in place to ensure the state's data is secured, but this particular server was not configured according to normal procedure, UDOH said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts