Security Experts:

Connect with us

Hi, what are you looking for?



University of San Diego Health Says Personal Information Stolen in Data Breach

University of San Diego Health this week revealed that personal information was accessed in a data breach involving unauthorized access to some employee email accounts.

University of San Diego Health this week revealed that personal information was accessed in a data breach involving unauthorized access to some employee email accounts.

In a substitute notification, UC San Diego Health revealed that an unknown threat actor accessed or acquired the affected data between December 2, 2020 and April 8, 2021. However, the healthcare organization was initially alerted to suspicious activity on March 12, when it launched an investigation into the claim.

The compromised data pertained to patients, students and employees, and includes names, addresses, birth dates, email addresses, fax numbers, claims information, lab results, medical identifiers, medical diagnosis, medical information, treatment details, Social Security numbers, government identification numbers, student ID numbers, payment card information, and usernames and passwords.

The healthcare organization says that it terminated the unauthorized access to the compromised accounts immediately after confirming the breach, and that it has also taken remediation steps, including changing employee credentials and disabling access points, as well as improving its security procedures.

“There is no evidence that other UC San Diego Health systems were impacted, nor do we have any evidence at this time that the information has been misused,” the organization said.

UC San Diego Health has already started notifying the affected students, employees, and patients, where contact details are available. The organization also reported the matter to law enforcement.

“This breach is an example of the personal sensitive information that can be violated by outside attackers within healthcare organizations such as medical diagnosis and conditions, medical record numbers, prescription information, social security numbers, financial account information. With such incredibly sensitive data at stake to cyber attackers, healthcare organizations should fortify their security posture,” Bugcrowd CTO and founder Casey Ellis said in an emailed comment.

Related: IBM: Average Cost of Data Breach Exceeds $4.2 Million

Related: British Airways Settles Class Action Over 2018 Data Breach

Related: Volkswagen America Discloses Data Breach Impacting 3.3 Million

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.