Modern Healthcare

Wake-up call

Fraud may come later in historic Utah hacking case

- Joseph Conn

The exposure to foreign hackers of the records of more than three quarters of a million Utah Medicaid and Children’s Health Insurance Program beneficiar­ies could become a watershed event in the history of healthcare informatio­n technology.

Where the counting left off last week after a series of increasing­ly worsening reports, Utah officials concluded that the records of some 780,000 people had been exposed by a hacker attack on a Utah Department of Technology Services computer system hosting data for the two state health benefits programs.

It was, by far, the largest breach of healthcare records involving hackers since HHS began collecting breach reports in 2009 pursuant to the American Recovery and Reinvestme­nt Act.

As many as 280,000 victims of the breach also had their Social Security numbers included in the compromise­d records and will be offered one year of free credit monitoring, state officials said. Those officials said hackers “believed to be operating out of Eastern Europe” were the chief suspects.

In recent years, federal prosecutor­s have broken up criminal gangs based in Armenia and Ukraine running massive Medicare and insurance-fraud schemes, but thus far, no informatio­n about the intent of the Utah hackers has been released by officials in that state and no fraudulent uses of the data have been reported.

That could come later, predicted Pam Dixon, executive director of the World Privacy Forum, a San Diego based not-forprofit organizati­on that pioneered research into the once obscure field of medical identity theft. Dixon said the records stolen from Utah are likely to be used in medical frauds, and if that happens, fictitious records based on those frauds “are going to proliferat­e through health informatio­n exchanges and public health databases.”

But there is an up side, Dixon said. “I really see this breach as the marking of a new era,” she said. “This is the wake-up call that should and will mark the area in which healthcare providers realize their data is the most criminally desirable available.”

Utah Gov. Gary Herbert pledged last week to do all he could to restore citizens’ trust in government operations, including hiring outside auditors to review all of the state’s data security procedures.

“Our immediate priority is to protect those whose personal informatio­n has been exposed,” Herbert said in a statement. “Therefore, we will continue to work with law enforcemen­t, including the FBI, to find the criminals responsibl­e.”

The hack, which occurred March 30, was publicly disclosed by the Utah Health Department and the technology department on April 4.

A computer server operated by the technology department had been breached, with 24,000 Medicaid recipients affected, the state announced. Two days later, the victim count had jumped to nearly 182,000, and broadened to include an unspecifie­d number of CHIP participan­ts. By April 9, the number of affected individual­s had soared to 780,000.

State officials said a “configurat­ion error occurred at the password authentica­tion level,” allowing hackers to “circumvent” its security system. Also, the hijacked server “was not configured according to normal procedure,” they said.

The Utah breach is larger than all of the previous ones attributed to hackers combined since HHS began requiring healthcare organizati­ons to report breaches in September 2009. The Office for Civil Rights at HHS is required under stimulus law to post details of episodes involving more than 500 records on a public website, which as of last week listed 410 breaches involving 19.2 million records. Only 24, or 6%, involved incidents of hacking, exposing 550,083 records.

Security expert Michael “Mac” Mcmillian said there is no question hackers are interested in profiting from security lapses in the healthcare industry. “It’s the old supply and demand scenario,” said Mcmillan, the founder and CEO of Cynergiste­k, an Austin, Texas,-based security consulting firm serving the healthcare industry. The black market value of an individual’s identity informatio­n including a Social Security number is about $1, he said, compared with $50 for medical identity informatio­n.

Three months ago, Mcmillian said, one of his firm’s healthcare clients called to report some “erratic behavior” on its network.

“We had them close off all of their external connectivi­ty,” Mcmillian said. On close inspection, security experts discovered a highly sophistica­ted hacker had penetrated one portion of the organizati­on’s system not protected by commercial anti-virus software. The malware deposited there establishe­d a beachhead and proceeded to shut off the antivirus software in other parts of the system and close down its internal auditing function. Then, the virus went to work on its real mission, Mcmillan said.

It “began to collect very specific patient informatio­n, identities, Social Security numbers and put that informatio­n into a temp file,” he said. “And the software had this capability of packaging up that temp file and sending it back to China.”

“Fortunatel­y,” Mcmillan said, because the external links were shut down, “we were able to find the temp fields and determine that none of them had been sent yet, so none of the informatio­n got out.”

 ?? ALAMY PHOTO ?? The Utah breach is larger than all of thepreviou­s ones attributed to hackers combined since HHS began requiring healthcare organizati­ons to reportbrea­ches in September 2009.
ALAMY PHOTO The Utah breach is larger than all of thepreviou­s ones attributed to hackers combined since HHS began requiring healthcare organizati­ons to reportbrea­ches in September 2009.

Newspapers in English

Newspapers from United States