Utah breach 10X worse than originally thought
SSNs on 280K exposed; names, birth dates of another 500K compromised
Computerworld - The scope of a data breach involving a Medicaid server at the Utah Department of Health is much worse than originally thought. State officials now say that close to 280,000 Social Security Numbers may have been exposed in the incident instead of 25,000, as originally believed.
Less sensitive personal data such as names, birth dates and addresses of another 500,000 people may have also been compromised in the breach, state officials said today.
Today's announcement marks the second time in three days that Utah state officials have upped their estimates of a March 30 intrusion into a server containing Medicaid claims data on Utah residents.
According to the Utah Department of Technology Services (DTS) and the Utah Department of Health (UDOH), the breach stemmed from a configuration error at the user authentication layer. The error allowed attackers, believed to be operating out of Eastern Europe, to bypass the network, perimeter and application level security controls that were in place to protect the server.
Initially, state officials said the intrusion had allowed improper access to about 24,000 claims records. Each record could include Social Security Numbers, names, birth dates, addresses, tax identification numbers and treatment codes.
On Friday, the two organizations released another statement saying forensics investigations showed the breach to be larger than initially thought. In addition to Medicaid data, the breached information included data about recipients of the state's Children's Health Insurance Plans (CHIP). And rather than 24,000 claims, the hackers had actually accessed 24,000 files, each one of which potentially contained personal data on hundreds of individuals.
Early on Monday, Utah state officials changed their numbers again. In a statement, DTS and UDOH officials said ongoing investigations showed that the compromised data included Social Security Numbers belonging to about 255,000 people whose providers had contacted the UDOH to verify their Medicaid eligibility.
"The victims are likely to be people who have visited a health care provider in the past four months," the statement said. "Some may be Medicaid or CHIP recipients; others are individuals whose health care providers were unsure as to their status as Medicaid recipients."
The state has begun notifying affected individuals about the compromise. Those who had their SSNs stolen will receive one year's worth of free credit monitoring services.
Attacks that take advantage of weak authentication mechanisms continue to be a major problem for enterprises. Though the issue is well understood, many companies with otherwise sound defenses continue to get breached because of their reliance on default or easy-to-guess passwords and knowledge-based authentication (KBA) mechanisms for controlling access to critical network assets and systems.
A recent breach at payment processing firm GlobalPayments Inc. that exposed debit and credit card data belonging to about 1.5 million people is thought to have resulted from an authentication vulnerability.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!