Two separate data breaches in the U.S. have exposed sensitive information of more than 236,000 people. These incidents involve two organizations: Endue Software in New York and Medical Express Ambulance (MedEx) in Illinois.
Endue Software creates software used by infusion centers, which help treat patients with medication delivered directly into their bloodstream. In February this year, the company found that hackers had broken into its system. This breach led to the exposure of personal details of around 118,000 individuals. The leaked information included full names, birth dates, Social Security numbers, and unique medical record identifiers. While there is currently no proof that the stolen data has been used illegally, the company isn’t taking any chances. It has added more safety tools and measures to its systems. It is also offering one year of free credit monitoring and identity protection to help affected people stay safe from fraud.
In a different case, MedEx, a private ambulance service provider based in Illinois, reported that it was also hit by a cyberattack. This breach happened last year, but the details have recently come to light. Information belonging to more than 118,000 people was accessed by attackers. The data included health records, insurance information, and even passport numbers in some cases.
These events are part of a larger pattern of cyberattacks targeting the healthcare industry in the U.S. In recent months, major organizations like UnitedHealth Group and Ascension Health have also suffered large-scale data breaches. Cybercriminals often go after hospitals and medical companies because the data they store is very valuable and can be used for scams or identity theft.
Both Endue and MedEx are working with cybersecurity experts to investigate the breaches and improve their systems. People affected by these incidents are being advised to be extra cautious. They should use the free protection services, monitor their bank and credit accounts, and immediately report anything unusual.
Landmark Admin, a company based in Texas that works with insurance firms across the country, has shared new details about a cyberattack it suffered last year. According to the latest update, the number of people whose personal data may have been accessed has now reached more than 1.6 million.
How It Started
In May 2024, Landmark noticed something suspicious on its computer network. After looking into the issue, it found out that hackers had broken in and accessed files containing sensitive details of many individuals.
At first, the company believed the attack had affected around 806,000 people. However, in a recent filing with the Maine Attorney General’s Office, Landmark revealed that the total number of impacted people is now estimated at 1,613,773. They also said that this number might change again as the investigation continues.
What Information Was Stolen?
The hackers were able to get their hands on private data. This could include a person’s name, home address, Social Security number, or details from their passport or driver’s license. Some people’s financial information, health records, and insurance policy numbers may also have been exposed.
Not everyone had the same information stolen. The company has promised to send each affected person a letter that clearly mentions which of their details were accessed in the attack.
What Is Being Done to Help?
Landmark is still reviewing the situation with cybersecurity experts. They are in the process of informing everyone who may have been affected. People who get a notice from Landmark will also receive 12 months of free credit monitoring and identity theft protection to reduce the chances of further harm.
Those affected are encouraged to keep an eye on their credit activity. They may also consider placing a fraud alert or even freezing their credit to stay protected from possible misuse.
The full extent of the breach is still being investigated, which means the number of victims may grow. In the meantime, people are advised to stay alert, review their financial statements, and take steps to protect their identities.
Cyberattacks are becoming as consequential a threat as physical insurgencies, targeting government systems and vital businesses with growing frequency. A ransomware attack on the Uttarakhand government on October 2, 2024, brought over 90 key state-run websites to a grinding halt, including important platforms such as the CM Helpline, Chardham registration portal, and land registry systems. This breach brought the state's entire IT infrastructure to a standstill, where attackers gained control of sensitive information and demanded ransom, thereby paralyzing all state operations.
Extent of the Attack
This attack compromised the central data center of the Uttarakhand government and compromised not only sensitive information regarding citizens and other important departments but also compromised the Chief Minister's office.
Though the government said on October 10 that no data had been lost, the incident highlighted glaringly the lack of preparedness in mitigating such threats. This incident also represents a trend, as India suffered 388 data breaches, 107 data leaks, and close to 5 billion cyberattacks in 2023. Such attack gravity was previously witnessed in 2022, when AIIMS Delhi remained closed for two weeks following a ransomware attack that crippled healthcare services.
Scrutiny over Preparedness and Accountability
The question on the preparedness and accountability of Uttarakhand government in terms of cybersecurity has now been raised.
An initiative two years ago even assigned ITI Limited in Bengaluru to design a disaster recovery plan, which still did not come into existence.
Experts are now wondering why this state did not have the basic cybersecurity protocols in place such as data backup systems and security audits that would have minimized damage, and that there is still no dedicated cybersecurity task force or enough technical experts within the Information Technology Development Agency (ITDA).
Urgency for Policy Overhauls
The attack puts a primer on the need for overhaul in Uttarakhand and, by extension, other states across the nation. It calls for hiring subject matter experts, carrying regular audits, and placing cybersecurity nodal officers in each department. A comprehensive program to train officials along with collabingotals with cybersecurity professionals is the need of the hour to structure an effective system for future assault.
Learning from the Crisis
What has been called Uttarakhand's "Cyber Security Cloud Burst," this is a wake-up call. Rather than waiting for the restoration of the state's infrastructure, by putting in place stringent protocols and opening channels for frank dialogues with cybersecurity experts, steps can be taken to create precedence for other states as well. Cybersecurity cannot and should not be considered something to be done on the back burner but something integral to governance.
A prominent DNA-testing company, Atlas Biomed, appears to have ceased operations without informing customers about the fate of their sensitive genetic data. The London-based firm previously offered insights into genetic profiles and predispositions to illnesses, but users can no longer access their online reports. Efforts by the BBC to contact the company have gone unanswered.