Intellihartx, a company providing patient balance resolution services to hospitals, is informing roughly 490,000 individuals that their personal information was compromised in the GoAnywhere zero-day attack earlier this year.
Disclosed in early February and linked to the infamous Cl0p ransomware gang, the cyberattack exploited a zero-day vulnerability in Fortra’s GoAnywhere managed file transfer (MFT) software.
Tracked as CVE-2023-0669 and leading to remote code execution, the flaw had been exploited starting January 28. A patch was released one week after public disclosure and Fortra published the conclusion of its investigation in April.
In an incident notification on its website, Intellihartx says it has concluded its review of the data potentially compromised during the attack and has also identified the impacted individuals.
The affected information, the company says, includes names, addresses, insurance data and medical billing, diagnosis and medication information, birth dates, and Social Security numbers.
Intellihartx says it is not aware of the compromised information being misused. However, the Cl0p gang has made the data allegedly stolen from the company available on its leak site.
Intellihartx informed the Maine Attorney General’s Office that just under 490,000 individuals were impacted by the incident.
Dozens of organizations have been hit by the incident and numerous major companies previously confirmed impact, including Community Health Systems (CHS), Rubrik, Hitachi Energy, Crown Resorts, the City of Toronto, Saks Fifth Avenue, Pluralsight, PPF, P&G, Atos, and Rio Tinto.
Other organizations have observed exploitation attempts but said the attack had limited impact.
The Cl0p cybergang has also claimed responsibility for the recent MOVEit Transfer MFT zero-day attack, which impacted several major organizations, including Irish airline Aer Lingus, British Airways, the BBC, UK-based payroll and HR company Zellis, and the Canadian province of Nova Scotia.