Missouri's Medicaid Program and Mizzou Impacted By Recent Data Breaches

  • By Steven
  • Published: Aug 23, 2023
  • Last Updated: Aug 24, 2023

Missouri's Medicaid Program Hit by Data Breach

The state of Missouri's low-income Medicaid program through the Department of Social Services is responsible for offering medical insurance to Missourans in need. The program ensures that citizens have access to reliable healthcare with minimal costs to them. The University of Missouri, or Mizzou, is a public research institute that was founded in 1839 and serves as Missouri's largest university. Both of these programs were attacked in the recent MOVE-it data breach. The breach may have resulted in substantial data losses for everyone involved, and there's reason to suspect that information for thousands of people was lost. 

How Did the Attack Occur?

Hackers from the C10p ransomware gang learned of a software bug in the MOVEit secure file transfer service and began exploiting it to harm businesses and organizations using the tool. The bug allowed the hackers to harm more than 600 separate organizations, including Missour's Medicaid program and the University of Missouri. The attacks occurred at the end of May or the beginning of June of 2023, and most organizations are still exploring the overall effects. 

What Information Was Viewed or Stolen?

We don't know all the data taken for sure, but we suspect that Social Security Numbers, full names, dates of birth, and some medical and financial information were taken. The data that was accessed was used for eligibility purposes at the University and for the Medicaid program, which means that some sensitive information was likely involved. 

How Did the Programs Admit to the Breach?

The Department of Social Services and the State University of Missouri made public announcements explaining the data breach and letting people know what information would be at risk. It's likely that anyone marked as being impacted by this breach will receive a letter in the mail explaining things in more detail. Watch for a letter and use that as an indicator that your data was involved in this chain of data breaches. 

What Will Become of the Stolen Information?

The C10p ransomware gang steals information in an attempt to earn money from it. The data stolen will be used to extort officials in an attempt to gather ransoms. If ransoms aren't paid, the information will be resold or used for identity theft attacks, phishing attacks, and in other ways to attempt to collect money.

What Should Affected Parties Do in the Aftermath of the Breach?

If you learn that your information is involved in this data breach, you must protect your data at all costs. That means checking your credit at the bureaus to look for strange changes. You can also put a freeze on your credit as a way to protect it from being misused. If you want to maintain the use of your credit during this time, you can also invest in credit monitoring services to alert you when changes are made to your credit. When you get services to guard your credit, you'll understand when attackers are trying to take advantage of your information.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close