Over 480k Patients Lose Medical Information to Hackers in Recent Intellihartx Breach

  • By Steven
  • Published: Jun 14, 2023
  • Last Updated: Jun 14, 2023

Intellihartx Data BreachNearly 500,000 people lost medical and personal data in a recent ransomware attack on Intellihartx. The company is known for handling collections and patient balances for medical companies. The organization suffered a breach that lost a substantial amount of protected information for different people, and that's a serious problem that should be addressed as soon as possible. 

How Did the Attack Occur?

The Intellihartx attack was possible through an exploit to Fortra's GoAnywhere file-transfer software service. The product is designed to send files securely between two parties. The C10P ransomware gang learned how to hack into the service and get access to the secure files being transferred. The gang has used that knowledge to exploit a variety of different companies, including Intellihartx. The attack was noted earlier this year, and it's one of many different breaches that resulted from vulnerability issues in the Go-Anywhere software product. 

What Information Was Viewed or Stolen?

During the breach, the hackers gathered birthdays, home addresses, Social Security numbers, first and last names, medical billing information, diagnoses and medication data, and insurance data. All these different data points can be assembled to hurt the individuals involved in significant ways. This is why it's so important for anyone involved to know their data was leaked and that they could be a risk.

How Did Intellihartx Admit to the Breach?

The company submitted a notice to the Maine Attorney General's office explaining the details of this breach. The notice talks about how more than 489,000 patients are involved in this breach and explains how GoAnywhere was used to obtain the stolen information. This notice is just the first of many notices put out by the company, and the organization is informing the individuals at risk as well.

What Will Become of the Stolen Information?

All of the stolen data from Intellihartx will be used to exhort the company into paying the ransom amount. If the company doesn't agree to pay the attackers, they will sell the information, give it away or trade it for other data they need. The ransomware gang will get as much as they can from the gathered data before moving on to new targets. While it's impossible to say specifically how the gathered data will be used, it's likely it will be leveraged in a harmful manner that earns money for the attackers in some way.

What Should Affected Parties Do in the Aftermath of the Breach?

If your data is exposed due to this Intellihartx attack, you must take immediate action to protect yourself. Begin by investing your time in exploring your credit history at the different bureaus. Use these records to help you determine when your information is being used in harmful ways. Move on to investing in credit monitoring services or putting a freeze on your credit. If you do these things, you will have more control over what happens with your information and how much risk you'll face overall.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close