Assailants Attack Illinois Medical Center; 147k Patient Records Stolen

  • By Steven
  • Published: Dec 14, 2023
  • Last Updated: Dec 15, 2023

Southern Illinois Healthcare Attack

Southern Illinois Healthcare oversees the operations of Harrisburg Medical Center (HMC), a not-for-profit community hospital with over 70 beds and 140 physicians. They are partnered with other clinics in the area, providing a comprehensive healthcare network for residents in the region. HMC suffered a network data breach nearly a year ago.

How Did the Attack Occur? 

According to the Notice of Data Incident published on HMC’s website, an unauthorized third party accessed the center’s internal network. HMC officials described the event as causing suspicious activity, although there are no other details about the attack’s symptoms. The lack of additional details from the incident is unfortunate; it leaves the public to speculate about how the assailants caused the event. The public’s trust may waiver without information about how the attackers committed the attack. If an injection or malware caused the attack, the event’s fault may fall outside HMC’s responsibilities; however, if the attack came from an employee or system vulnerability, the event may have occurred directly because of HMC. 

What Information Was Viewed or Stolen? 

The majority of compromised data in this event belongs to HMC patients. When the attackers breached their network, they accessed documents listing some personal information belonging to specific individuals. The exposed information includes patient names, birthdays, Social Security Numbers, clinical details like diagnosis/treatments, lab results and prescription information, health insurance information, driver’s license numbers, electronic signatures, and some financial account numbers. 

How Did Harrisburg Medical Center Admit to the Breach? 

HMC’s breach happened nearly a year ago. According to the published notices, the unauthorized actor accessed the healthcare network between December 19th, 2022, and December 23rd, 2022. On or around December 23rd, 2022, officials discovered suspicious activity and immediately moved to secure their network. Their initial review concluded around February 21st, 2023, with further reviews finishing around mid-August. Since then, HMC has worked to notify those with exposed information and the authorities. This week, on December 12th, 2023, physical notices were mailed to those whom HMC had valid addresses. 

What Will Become of the Stolen Information? 

The breach filing published on the Maine Attorney General’s website states an impact figure of 147,826 people. A breach of this size is concerning, not only because of its significant impacts on the victims but also because of the nearly year-long lapse of notification. In the last year, the assailants could have misused or sold the patient information, putting patients at risk. Patients are at risk for financial, identity, and medical fraud. The bad actors could even impersonate them, putting them at risk for criminal charges and physical danger. 

What Should Affected Parties Do in the Aftermath of the Breach? 

The exposed data could have traveled to anyone online in the year since the breach. The assailants could have sold it on a dark forum or used it to gain details about other sensitive systems; it may have ended up in the hands of a cybercriminal gang waiting to launch wire fraud transactions. The only thing victims of this breach can do is take preventative cautions. 

Actions like changing passwords and contact details within applicable accounts, investing in identity monitoring services for suspicious activities, and updating their technology devices with new securities are the minimum actions they should take. Although the event happened a year ago, data owners can still impact how cybercriminals can use their information; they don’t even need to wait for a notice.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close