Johns Hopkins Suffers a Breach Losing Patient, Student, and Faculty Data

  • By Steven
  • Published: Jun 19, 2023
  • Last Updated: Nov 23, 2023

Johns Hopkins Hospital Data Breach

Johns Hopkins is one of the leading teaching hospitals that serve approximately 500 medical students annually while caring for tens of thousands of patients. The facility has a total of 1091 beds and serves patients in primary care and trauma care, along with several specialties. The facility is located in Baltimore, Maryland, and because it serves so many students and patients, it stores a huge amount of personal and medical data. Some of that data was just released because of a breach. 

How Did the Attack Occur?

The data breach occurred in May when the MOVEit secure file transfer service was breached by the C10p ransomware gang. During the attack, many major companies lost data, including Putnam Investments, the Shell Corporation, the University of Georgia, and Johns Hopkins Hospital. The attack impacted hundreds of companies, and Johns Hopkins lost personal data related to students, faculty, and patients. 

What Information Was Viewed or Stolen?

Only personally identifying information was lost in the Johns Hopkins data breach, including things like email addresses, phone numbers, home addresses, Social Security Numbers, and full names. This data doesn't include medical details but is enough to begin several types of identity theft attacks on anyone involved.

How Did Johns Hopkins Admit to the Breach?

Investigations are still ongoing, but on June 15, the university released a letter to the community explaining how the breach occurred and what sort of risks are possible for the individuals involved. Once the impact of this data breach is fully understood, individual notices will go out to every individual known to have been exposed by the breach. 

What Will Become of the Stolen Information?

The original purpose of the stolen information from Johns Hopkins was to force the school and hospital to pay a ransom to protect any data from ever being released or used in a harmful way. If a ransom isn't collected for the stolen data, it's likely it will be passed off to hackers or others that want to misuse it, and it could be used for identity theft attacks. The hackers themselves may use the data for attacks as well, and even if they don't, they will probably sell the information to others that will. 

What Should Affected Parties Do in the Aftermath of the Breach?

If your data may have been taken from the hospital, you should take immediate steps to protect yourself. You can put a freeze on your credit at each of the bureaus to protect against attacks, or you could invest in credit monitoring services to keep watch over your credit for any strange changes. Take action now, and you can protect yourself from most attacks before they have a chance to do serious harm to your credit. You should also avoid giving out any information over text message or through email, even if it seems like an official company asking for the data. Phishing attacks are commonly used to steal information, and hackers will go to great lengths to make their emails and phone numbers look official when attempting to steal your data.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close