Connect with us

News

Sensitive Medical and Personal Information Stolen in December Hack — Details Surface Months Later

Published

on

<p class&equals;"" data-start&equals;"540" data-end&equals;"757">Ascension has disclosed a staggering breach involving more than 430&comma;000 patients&comma; admitting that sensitive health and personal data were compromised after a December security lapse involving a former business partner&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"759" data-end&equals;"944">The healthcare giant&comma; which runs over 140 hospitals and senior care facilities across the U&period;S&period;&comma; began alerting patients in April — months after it first detected signs of the intrusion&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"946" data-end&equals;"992">The Breach That Started Quietly in December<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"994" data-end&equals;"1064">Back on December 5&comma; 2024&comma; Ascension first got wind of something fishy&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1066" data-end&equals;"1345">That’s when internal alerts flagged the possibility that patient data had been exposed&period; But it wasn’t until January 21&comma; 2025&comma; that the company pieced together the full picture&colon; a former third-party partner had been compromised&comma; and so had the data Ascension had shared with them&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1347" data-end&equals;"1596">Only in late April&comma; through regulatory filings and public notices&comma; did the scale come into focus&period; A filing with the U&period;S&period; Department of Health &amp&semi; Human Services&comma; which wasn’t made public until now&comma; revealed the full count&colon; 437&comma;329 people affected&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1598" data-end&equals;"1633">And that’s just from this incident&period;<&sol;p>&NewLine;<p data-start&equals;"1598" data-end&equals;"1633"><a href&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;05&sol;ascension-health-data-breach-patient-information-ransomware-2025&period;jpg"><img class&equals;"aligncenter size-full wp-image-57442" src&equals;"https&colon;&sol;&sol;www&period;theibulletin&period;com&sol;wp-content&sol;uploads&sol;2025&sol;05&sol;ascension-health-data-breach-patient-information-ransomware-2025&period;jpg" alt&equals;"ascension health data breach patient information ransomware 2025" width&equals;"1301" height&equals;"661" &sol;><&sol;a><&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"1635" data-end&equals;"1674">What Was Stolen — And Who&&num;8217&semi;s at Risk&quest;<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"1676" data-end&equals;"1782">The exposed information reads like a cybercriminal’s dream shopping list&period; It wasn’t just names and emails&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"1784" data-end&equals;"1798">We’re talking&colon;<&sol;p>&NewLine;<ul data-start&equals;"1800" data-end&equals;"2044">&NewLine;<li class&equals;"" data-start&equals;"1800" data-end&equals;"1814">&NewLine;<p class&equals;"" data-start&equals;"1802" data-end&equals;"1814">Full names<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1815" data-end&equals;"1851">&NewLine;<p class&equals;"" data-start&equals;"1817" data-end&equals;"1851">Home addresses and phone numbers<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1852" data-end&equals;"1871">&NewLine;<p class&equals;"" data-start&equals;"1854" data-end&equals;"1871">Email addresses<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1872" data-end&equals;"1886">&NewLine;<p class&equals;"" data-start&equals;"1874" data-end&equals;"1886">Birthdates<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1887" data-end&equals;"1914">&NewLine;<p class&equals;"" data-start&equals;"1889" data-end&equals;"1914">Social Security numbers<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1915" data-end&equals;"1941">&NewLine;<p class&equals;"" data-start&equals;"1917" data-end&equals;"1941">Medical record numbers<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1942" data-end&equals;"1960">&NewLine;<p class&equals;"" data-start&equals;"1944" data-end&equals;"1960">Insurance info<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1961" data-end&equals;"1990">&NewLine;<p class&equals;"" data-start&equals;"1963" data-end&equals;"1990">Admission&sol;discharge dates<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"1991" data-end&equals;"2022">&NewLine;<p class&equals;"" data-start&equals;"1993" data-end&equals;"2022">Diagnoses and billing codes<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"2023" data-end&equals;"2044">&NewLine;<p class&equals;"" data-start&equals;"2025" data-end&equals;"2044">Names of physicians<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p class&equals;"" data-start&equals;"2046" data-end&equals;"2097">In short&comma; everything you wouldn&&num;8217&semi;t want leaked… was&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2099" data-end&equals;"2327">The breach hit patients who visited Ascension facilities and had their data stored or processed by this unnamed partner&period; And depending on the person&comma; the details ranged from standard contact info to full-blown medical histories&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"2373" data-end&equals;"2406">A Pattern of Security Failures<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"2408" data-end&equals;"2490">Unfortunately&comma; this isn’t Ascension’s first rodeo with a major cybersecurity mess&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2492" data-end&equals;"2749">Just last year&comma; in May 2024&comma; the health system disclosed that a ransomware group — Black Basta — had stolen data from 5&period;6 million patients and employees&period; That time&comma; the attack began when an employee clicked on a malicious file&period; The fallout was enormous&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2751" data-end&equals;"2859">Doctors had to resort to paper charts&period; Elective surgeries were canceled&period; Even ambulances had to be rerouted&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"2861" data-end&equals;"3070">The financial and operational disruption lasted weeks&period; It raised eyebrows in D&period;C&period; and sent shockwaves through the healthcare industry&comma; which has increasingly found itself a favorite target of ransomware gangs&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3072" data-end&equals;"3150">And now&comma; less than a year later&comma; another breach&period; Different cause&period; Same result&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"3152" data-end&equals;"3179">Was This Linked to Clop&quest;<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"3181" data-end&equals;"3255">The timeline and method of attack point toward a familiar adversary&colon; Clop&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3257" data-end&equals;"3422">The Russian-speaking ransomware crew made headlines last year for exploiting a zero-day flaw in Cleo&comma; a secure file transfer software widely used by enterprises&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3424" data-end&equals;"3627">Ascension didn’t name the software or the attackers&period; But cybersecurity experts believe the method matches other Clop campaigns&comma; which were known for infiltrating via third-party tools — not direct hacks&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3629" data-end&equals;"3710">It’s like breaking into a bank by sneaking through a vendor’s unlocked back door&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3712" data-end&equals;"3872">Clop’s modus operandi is to exfiltrate the data&comma; publish proof&comma; and demand money — without necessarily encrypting systems&period; That subtlety often delays detection&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"3874" data-end&equals;"3912">And once that data is gone&comma; it’s gone&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"3914" data-end&equals;"3948">State-by-State Fallout Revealed<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"3950" data-end&equals;"4162">As filings trickled in&comma; the full scope became clearer&period; In Texas alone&comma; 114&comma;692 individuals were confirmed affected&period; In Massachusetts&comma; it was 96&period; Not huge there — but every number is a name&comma; a person&comma; a story&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"4164" data-end&equals;"4237">And more states are likely to report exposure as investigations continue&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"4239" data-end&equals;"4300">Here’s a quick look at some reported numbers by jurisdiction&colon;<&sol;p>&NewLine;<div class&equals;"&lowbar;tableContainer&lowbar;16hzy&lowbar;1">&NewLine;<div class&equals;"&lowbar;tableWrapper&lowbar;16hzy&lowbar;14 group flex w-fit flex-col-reverse" tabindex&equals;"-1">&NewLine;<table class&equals;"w-fit min-w-&lpar;--thread-content-width&rpar;" data-start&equals;"4302" data-end&equals;"4626">&NewLine;<thead data-start&equals;"4302" data-end&equals;"4354">&NewLine;<tr data-start&equals;"4302" data-end&equals;"4354">&NewLine;<th data-start&equals;"4302" data-end&equals;"4320" data-col-size&equals;"sm">State<&sol;th>&NewLine;<th data-start&equals;"4320" data-end&equals;"4354" data-col-size&equals;"sm">Confirmed Affected Individuals<&sol;th>&NewLine;<&sol;tr>&NewLine;<&sol;thead>&NewLine;<tbody data-start&equals;"4406" data-end&equals;"4626">&NewLine;<tr data-start&equals;"4406" data-end&equals;"4458">&NewLine;<td data-start&equals;"4406" data-end&equals;"4424" data-col-size&equals;"sm">Texas<&sol;td>&NewLine;<td data-start&equals;"4424" data-end&equals;"4458" data-col-size&equals;"sm">114&comma;692<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4459" data-end&equals;"4511">&NewLine;<td data-start&equals;"4459" data-end&equals;"4477" data-col-size&equals;"sm">Massachusetts<&sol;td>&NewLine;<td data-col-size&equals;"sm" data-start&equals;"4477" data-end&equals;"4511">96<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4512" data-end&equals;"4569">&NewLine;<td data-start&equals;"4512" data-end&equals;"4535" data-col-size&equals;"sm">Others &lpar;undisclosed&rpar;<&sol;td>&NewLine;<td data-col-size&equals;"sm" data-start&equals;"4535" data-end&equals;"4569">Estimated 322&comma;541<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr data-start&equals;"4570" data-end&equals;"4626">&NewLine;<td data-start&equals;"4570" data-end&equals;"4590" data-col-size&equals;"sm">Total<&sol;td>&NewLine;<td data-col-size&equals;"sm" data-start&equals;"4590" data-end&equals;"4626">437&comma;329<&sol;td>&NewLine;<&sol;tr>&NewLine;<&sol;tbody>&NewLine;<&sol;table>&NewLine;<div class&equals;"sticky end-&lpar;--thread-content-margin&rpar; h-0 self-end select-none">&NewLine;<div class&equals;"absolute end-0 flex items-end"><&sol;div>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;<p class&equals;"" data-start&equals;"4628" data-end&equals;"4732">The full list hasn&&num;8217&semi;t been disclosed publicly&comma; but regulators have been looped in across multiple states&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"4734" data-end&equals;"4771">Free Monitoring&comma; But Is It Enough&quest;<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"4773" data-end&equals;"4863">To its credit&comma; Ascension is offering two years of free identity monitoring&comma; including&colon;<&sol;p>&NewLine;<ul data-start&equals;"4865" data-end&equals;"4952">&NewLine;<li class&equals;"" data-start&equals;"4865" data-end&equals;"4889">&NewLine;<p class&equals;"" data-start&equals;"4867" data-end&equals;"4889">Credit report access<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"4890" data-end&equals;"4912">&NewLine;<p class&equals;"" data-start&equals;"4892" data-end&equals;"4912">Fraud consultation<&sol;p>&NewLine;<&sol;li>&NewLine;<li class&equals;"" data-start&equals;"4913" data-end&equals;"4952">&NewLine;<p class&equals;"" data-start&equals;"4915" data-end&equals;"4952">Identity theft restoration services<&sol;p>&NewLine;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p class&equals;"" data-start&equals;"4954" data-end&equals;"5004">It’s the usual playbook — and better than nothing&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5006" data-end&equals;"5194">But critics say it’s reactive&comma; not proactive&period; Once your SSN is out&comma; it’s out&period; Same for diagnosis codes and billing details&period; You can’t change your past medical history&period; It sticks like glue&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5196" data-end&equals;"5302">For elderly patients or those with chronic illnesses&comma; this kind of exposure feels personal&period; And permanent&period;<&sol;p>&NewLine;<h2 class&equals;"" data-start&equals;"5304" data-end&equals;"5354">The Bigger Picture for U&period;S&period; Healthcare Security<&sol;h2>&NewLine;<p class&equals;"" data-start&equals;"5356" data-end&equals;"5429">Let’s not sugarcoat it&period; Healthcare IT systems in the U&period;S&period; are vulnerable&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5431" data-end&equals;"5592">Hospitals run on legacy tech&period; Vendors come and go&period; Third-party software is everywhere&period; And most orgs just aren’t prepared for the scale of today’s cyber threats&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5594" data-end&equals;"5778">Ascension employs over 142&comma;000 people and had &dollar;28&period;3 billion in revenue last year&period; It’s not some mom-and-pop clinic&period; If they can be hit — twice — what does that say about everyone else&quest;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5780" data-end&equals;"5951">The government has taken notice&period; There’s been increasing pressure from federal agencies like HHS and CISA to improve security standards&period; But the pace of adoption&quest; Glacial&period;<&sol;p>&NewLine;<p class&equals;"" data-start&equals;"5953" data-end&equals;"5989">For now&comma; hackers seem to be winning&period;<&sol;p>&NewLine;

An engineering graduate, Harry turned to writing after a couple of years of experience in core technology field. At The iBulletin, Harry covers latest updates related to trending apps & games on the app store.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

TRENDING