Data Breaches

Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer

Point32Health says the personal and protected health information of 2.5 million Harvard Pilgrim Health Care subscribers was stolen in a recent ransomware attack.

Point32Health says the personal and protected health information of 2.5 million Harvard Pilgrim Health Care subscribers was stolen in a recent ransomware attack.

Point32Health, the second-largest health insurer in Massachusetts, is in the process of informing more than 2.5 million individuals that their personal and protected health information was stolen in a recent ransomware attack.

Identified on April 17 and initially disclosed on April 20, the attack impacted systems related to Point32Health’s Harvard Pilgrim Health Care, and resulted in the exfiltration of data pertaining to both current and former health plan subscribers and dependents.

Between March 28 and April 17, Harvard Pilgrim says, the attackers exfiltrated files containing names, addresses, phone numbers, birth dates, Social Security numbers, health insurance account information, taxpayer identification numbers, and clinical information, including medical history, diagnoses, and treatment details.

The ransomware attack, the company says, impacted systems supporting its Harvard Pilgrim Health Care Commercial and Medicare Advantage Stride plans (HMO/HMO-POS), which have yet to be fully restored.

“We are continuing our active investigation and conducting extensive system reviews and analysis before we can resume our normal business operations,” the company writes in an incident notice on its website.

The company informed the US Department of Health and Human Services that the information of more than 2.55 million individuals was compromised in the ransomware attack.

According to Harvard Pilgrim, the incident impacts former and current customers back to March 28, 2012, as well as currently contracted providers. Current and former members of Health Plans Inc. between June 2020 and present may also be affected.

“Harvard Pilgrim is still investigating this incident and will provide updates if the investigation determines additional individuals may potentially be impacted,” the company says.

Advertisement. Scroll to continue reading.

Harvard Pilgrim says it is not aware of the stolen information being misused. However, it is not uncommon for cybercriminals to trade or share stolen data on underground forums, or use such data in phishing and other types of attacks.

The company says that, while the investigation into the attack continues, it aims to start sending written notification letters to the impacted individuals by June 15.

SecurityWeek is not aware of any ransomware gang claiming responsibility for this attack.

Related: Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals

Related: Personal Information of 9 Million Individuals Stolen in MCNA Ransomware Attack

Related: Industrial Giant ABB Confirms Ransomware Attack, Data Theft

Related Content

Data Breaches

UnitedHealth confirms that personal and health information was stolen in a ransomware attack that could cost the company up to $1.6 billion.

Data Breaches

The LockBit ransomware gang leaks data allegedly stolen from government contractor Tyler Technologies.

Ransomware

Akira ransomware has hit over 250 organizations worldwide and received over $42 million in ransom payments.

Cybercrime

Telecom giant Frontier shuts down systems to contain a cyberattack that led to personal information compromise.

Ransomware

Join this one-day virtual summit as we shine the spotlight on the shadowy dynamics of ransomware attacks and how you can best prepare your...

Ransomware

United Nations Development Programme (UNDP) investigating a ransomware attack in which hackers stole sensitive data.

Data Breaches

Cherry Health says the personal information of over 180,000 individuals was stolen in a ransomware attack.

Data Breaches

The RansomHub group has started leaking information allegedly stolen from Change Healthcare in February 2024.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version