Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Patient Data. Show all posts

Healthcare Cybersecurity: Taking a Proactive Route

 

Cyberattacks in healthcare are growing more common and can disrupt an organization's operations. Healthcare organisations handle a lot of sensitive data, including financial information, patient health records, and identifying data, making them prime targets for cybercriminals. 

This vulnerability is exacerbated by the sector's sophisticated systems and the widespread dissemination of electronic health records across networks. Healthcare's economic model, with large volumes and poor margins, makes it particularly susceptible to attacks. 

Furthermore, the stakes are especially high in healthcare, where a breach or hack can have serious ramifications ranging from compromising patient privacy to life-threatening disruptions in medical services. Cybercriminals can shut down a whole healthcare system for weeks or even months, delaying critical patient treatment. They're also employing new tools like generative AI to develop sophisticated and difficult-to-detect cyberattacks. 

In 2023, the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) received a record 725 reports of large healthcare security breaches. Healthcare security breaches are twice as common as they were seven years ago, with two major breaches recorded each day on average in 2023. Cybercrime expenses (estimated by some to reach $8 trillion by 2025) are anticipated to rise, highlighting the growing financial risks. 

According to Accenture research, leaders across industries recognise the importance of cybersecurity, yet only a tiny minority believe they are adequately equipped to deal with cyberattacks. Healthcare organisations are acutely aware of the changing cyberthreat landscape and are concerned about their ability to prevent or mitigate harm from a cyberattack. 

Changing nature of cyber attacks 

Patient identity theft has long been a common target of hackers in healthcare. However, recent trends indicate a shift towards more complex techniques in which attackers attempt to paralyse operations in order to extract ransoms. Protecting patient data remains critical, and organisations must continue to improve data security and network segmentation to mitigate the risk. However, ensuring the continuity of operations is as critical. 

Online criminals are increasingly targeting healthcare organisations with hacks that encrypt critical operating data and systems, rendering them inaccessible to medical professionals. Interestingly, not all breaches result in instant attacks. Once cybercriminals have gained access to a healthcare system, they can choose when to launch an assault. 

Researchers believe traditional cybersecurity techniques, which mainly focus on perimeter defence, are no longer sufficient given the sophistication of attacks. The healthcare industry requires a more robust strategy. In addition to continuing to work to prevent breaches and secure data, researchers advise healthcare businesses to shift focus to continuity initiatives so that when an assault inevitably occurs, they can restore operations promptly to minimize downtime and disruption.

AI System Optimise Could Help GPs Identify High-Risk Heart Patients

 

Artificial intelligence (AI) is proving to be a game-changer in healthcare by helping general practitioners (GPs) identify patients who are most at risk of developing conditions that could lead to severe heart problems. Researchers at the University of Leeds have contributed to training an AI system called Optimise, which analyzed the health records of more than two million people. The AI was designed to detect undiagnosed conditions and identify individuals who had not received appropriate medications to help reduce their risk of heart-related issues. 

From the two million health records it scanned, Optimise identified over 400,000 people at high risk for serious conditions such as heart failure, stroke, and diabetes. This group represented 74% of patients who ultimately died from heart-related complications, underscoring the critical need for early detection and timely medical intervention. In a pilot study involving 82 high-risk patients, the AI found that one in five individuals had undiagnosed moderate to high-risk chronic kidney disease. 

Moreover, more than half of the patients with high blood pressure were prescribed new medications to better manage their risk of heart problems. Dr. Ramesh Nadarajah, a health data research fellow from the University of Leeds, noted that deaths related to heart conditions are often caused by a constellation of factors. According to him, Optimise leverages readily available data to generate insights that could assist healthcare professionals in delivering more effective and timely care to their patients. Early intervention is often more cost-effective than treating advanced diseases, making the use of AI a valuable tool for both improving patient outcomes and optimizing healthcare resources. 

The study’s findings suggest that using AI in this way could allow doctors to treat patients earlier, potentially reducing the strain on the NHS. Researchers plan to carry out a larger clinical trial to further test the system’s capabilities. The results were presented at the European Society of Cardiology Congress in London. It was pointed out by Professor Bryan Williams that a quarter of all deaths in the UK are due to heart and circulatory diseases. This innovative study harnesses the power of evolving AI technology to detect a range of conditions that contribute to these diseases, offering a promising new direction in medical care.

Cyberattack Exposes Patient Data in Leicestershire

 

A recent cyberattack has compromised sensitive patient data in Leicestershire, affecting several healthcare practices across the region. The breach, which targeted electronic patient records, has led to significant concerns over privacy and the potential misuse of personal information. Those impacted by the attack have received notifications detailing the breach and the measures being taken to secure their data and prevent further incidents.  

Healthcare providers in Leicestershire are collaborating with cybersecurity experts and law enforcement agencies to investigate the breach, identify the perpetrators, and implement enhanced security measures. The goal is to protect patient information and prevent similar incidents in the future. Patients are advised to be vigilant, monitor their personal information closely, and report any suspicious activity to the authorities. The exposed data includes names, contact details, and medical records, all of which are highly sensitive and valuable to cybercriminals. The breach underscores the growing threat of cyberattacks in the healthcare sector, where such information is frequently targeted. 

In response, affected practices have taken immediate steps to bolster their cybersecurity protocols and provide support to those impacted. In addition to enhancing security measures, healthcare providers are committed to maintaining transparency and keeping patients informed about the investigation’s progress and any new developments. This commitment is crucial in rebuilding trust and ensuring that patients feel secure in the handling of their personal information. The healthcare sector has increasingly become a prime target for cyberattacks due to the vast amounts of sensitive data it holds. This incident in Leicestershire serves as a stark reminder of the vulnerabilities within our digital systems and the importance of robust cybersecurity measures. The breach has highlighted the need for constant vigilance and proactive steps to protect sensitive information from cyber threats. 

In the aftermath of the breach, healthcare providers are focusing on not only addressing the immediate security concerns but also on educating patients about the importance of cybersecurity. Patients are being encouraged to take measures such as changing passwords, enabling two-factor authentication, and being cautious about sharing personal information online. As the investigation continues, healthcare providers are committed to working closely with cybersecurity experts to strengthen their defenses against future attacks. 

This collaborative effort is essential in safeguarding patient data and ensuring the integrity of healthcare systems. The Leicestershire data breach is a significant event that underscores the critical need for heightened security measures in the healthcare sector. It calls for a concerted effort from both healthcare providers and patients to navigate the challenges posed by cyber threats and to work together in creating a secure environment for personal information. 

By taking proactive steps and fostering a culture of cybersecurity awareness, the healthcare sector can better protect itself and its patients from the ever-evolving landscape of cyber threats.

Massive Data Breach Hits London Hospitals Following Cyber Attack

 

In a severe cyber attack targeting a London hospital, hackers have published a massive 400GB of sensitive data, raising significant alarm within the healthcare sector. This breach underscores the escalating threat posed by cybercriminals to critical infrastructure, especially within public health services. 

The attack, attributed to a sophisticated hacking group, involved infiltrating the hospital’s IT systems, exfiltrating vast amounts of data, and subsequently releasing it online. The compromised data reportedly includes patient records, internal communications, and operational details, posing severe privacy risks and operational challenges for the hospital. The cybercriminals initially demanded a hefty ransom for the decryption of the stolen data and for not making it public. When the hospital administration, adhering to governmental policies against ransom payments, refused to comply, the hackers followed through on their threat, releasing the data into the public domain. 

This move has not only compromised patient privacy but has also led to significant disruptions in hospital operations. Experts warn that the healthcare sector is increasingly becoming a prime target for ransomware attacks due to the sensitive nature of the data and the critical need for operational continuity. The incident has once again highlighted the urgent need for robust cybersecurity measures within healthcare institutions. Public healthcare providers often operate with complex IT systems and limited budgets, making them vulnerable targets for cyber attacks. 

The ramifications of such breaches are far-reaching, affecting not just the targeted institution but also the patients relying on its services. In response to the breach, the hospital has ramped up its cybersecurity protocols, working closely with cybersecurity experts and law enforcement agencies to mitigate the damage and prevent future incidents. Efforts are also underway to support affected patients, ensuring that their data is secured and providing necessary assistance in the wake of the breach.  

This incident serves as a stark reminder of the persistent and evolving threat landscape that healthcare providers face. It underscores the necessity for continuous investment in cybersecurity infrastructure and the implementation of proactive measures to safeguard sensitive data against potential breaches. 

As the investigation into this attack continues, healthcare institutions worldwide are urged to reassess their cybersecurity strategies, ensuring that they are equipped to defend against such malicious activities. The leak of 400GB of sensitive data stands as a testament to the devastating impact of cybercrime on critical public services, emphasizing the importance of vigilance and robust security practices in the digital age.

Cyberattacks Threaten US Hospitals: Patient Care at Risk


 

A severe cyberattack on Ascension, one of the largest healthcare systems in the United States, has disrupted patient care significantly. The ransomware attack, which began on May 8, has locked medical providers out of critical systems that coordinate patient care, including electronic health records and medication ordering systems. This disruption has led to alarming lapses in patient safety, as reported by health care professionals across the nation.

Marvin Ruckle, a nurse at Ascension Via Christi St. Joseph in Wichita, Kansas, highlighted the chaos, recounting an incident where he almost administered the wrong dose of a narcotic to a baby due to confusing paperwork. Such errors were unheard of when the hospital’s computer systems were operational. Similarly, Lisa Watson, an ICU nurse at Ascension Via Christi St. Francis, narrowly avoided giving a critically ill patient the wrong medication, emphasising the risks posed by the shift from digital to manual systems.

The attack has forced hospitals to revert to outdated paper methods, creating inefficiencies and increasing the potential for dangerous mistakes. Watson explained that, unlike in the past, current systems for timely communication and order processing have disappeared, exacerbating the risk of errors. Melissa LaRue, another ICU nurse, echoed these concerns, citing a close call with a blood pressure medication dosage error that was fortunately caught in time.

Health care workers at Ascension hospitals in Michigan reported similar issues. A Detroit ER doctor shared a case where a patient received the wrong medication due to paperwork confusion, necessitating emergency intervention. Another nurse recounted a fatal delay in receiving lab results for a patient with low blood sugar. These incidents highlight the dire consequences of prolonged system outages.

Justin Neisser, a travel nurse at an Indiana Ascension hospital, chose to quit, warning of potential delays and errors in patient care. Many nurses and doctors fear that these systemic failures could jeopardise their professional licences, drawing parallels to the high-profile case of RaDonda Vaught, a nurse convicted of criminally negligent homicide for a fatal drug error.

The health sector has become a prime target for ransomware attacks. According to the FBI, health care experienced the highest share of ransomware incidents among 16 critical infrastructure sectors in 2023. Despite this, many hospitals are ill-prepared for prolonged cyberattacks. John Clark, an associate chief pharmacy officer at the University of Michigan, noted that most emergency plans cover only short-term downtimes.

Ascension's response to the attack included restoring access to electronic health records by mid-June, but patient information from the outage period remains temporarily inaccessible. Ascension has asserted that its care teams are trained for such disruptions, though many staff members, like Ruckle, reported receiving no specific training for cyberattacks.

Federal efforts to enhance health care cybersecurity are ongoing. The Department of Health and Human Services (HHS) has encouraged improvements in email security, multifactor authentication, and cybersecurity training. However, these measures are currently voluntary. The Centers for Medicare & Medicaid Services (CMS) are expected to release new cybersecurity requirements, though details remain unclear.

The American Hospital Association (AHA) argues that cybersecurity mandates could divert resources needed to combat attacks. They contend that many data breaches originate from third-party associates rather than hospitals themselves. Nevertheless, experts like Jim Bagian believe that health systems should face consequences for failing to implement basic cybersecurity protections.

The cyberattack on Ascension calls for robust cybersecurity measures in health care. As hospitals consolidate into larger systems, they become more vulnerable to data breaches and ransomware attacks. Health care professionals and patients alike are calling for transparency and improvements to ensure safety and quality care. The situation at Ascension highlights the critical nature of cybersecurity preparedness in protecting patient lives.


DocGo Confirms Cyberattack: Patient Health Data Breach

 

In a recent turn of events, DocGo, a prominent mobile medical care firm providing healthcare services across the United States and the United Kingdom, has fallen victim to a cyberattack. The breach, confirmed by the company in a filing with the U.S. Securities and Exchange Commission (SEC), has raised concerns about the security of patient health data and the impact on DocGo's operations. 

Here's what we know so far: According to the SEC filing, DocGo discovered unauthorized activity within its systems and promptly initiated an investigation with the assistance of third-party cybersecurity experts. While the company has not disclosed the specific nature of the cyberattack, it is common practice for organizations to shut down affected IT systems to prevent further compromise. 

As part of their investigation, DocGo determined that the hackers gained access to a "limited number of healthcare records" belonging to the company's U.S.-based ambulance transportation business. This breach has raised serious concerns about the security of patient health information and the potential impact on individuals affected by the attack. In response to the breach, DocGo is actively reaching out to individuals whose data may have been compromised. The company assures that no other business units have been affected, and they have not found evidence of continued unauthorized access. 

Despite the breach, DocGo believes that the incident will not have a significant impact on its operations and finances. One of the key concerns following a cyberattack of this nature is the possibility of ransomware involvement. If the attackers deployed ransomware and a ransom demand is not met, there is a risk that the stolen data could be used as leverage for future extortion attempts against DocGo. However, as of now, no threat actors have claimed responsibility for the breach. The breach at DocGo underscores the importance of robust cybersecurity measures in protecting sensitive medical data. 

Healthcare organizations must remain vigilant against evolving cyber threats and prioritize the security of patient information. Additionally, swift and transparent communication with affected individuals is crucial in mitigating the potential impact of a data breach. As the investigation into the cyberattack continues, DocGo is likely to implement additional security measures to prevent future incidents and safeguard patient health data. 

However, the full extent of the breach and its implications for affected individuals remain to be seen. The cyberattack on DocGo serves as a stark reminder of the persistent threat posed by cybercriminals to organizations across all sectors, including healthcare. It highlights the need for continuous monitoring, robust cybersecurity protocols, and proactive response strategies to mitigate the risks associated with data breaches

UnitedHealth Paid Ransom After Massive Change Healthcare Cyber Assault

 

The Russian cybercriminals who targeted a UnitedHealth Group-owned company in February did not leave empty-handed.

"A ransom was paid as part of the company's commitment to do everything possible to protect patient data from disclosure," a spokesperson for UnitedHealth Group stated earlier this week. 

The spokesperson did not reveal how much the healthcare giant paid following the cyberattack, which halted operations at hospitals and pharmacies for more than a week. Multiple media outlets claimed that UnitedHealth paid $22 million in bitcoin. 

"We know this attack has caused concern and been disruptive for consumers and providers and we are committed to doing everything possible to help and provide support to anyone who may need it," UnitedHealth CEO Andrew Witty said in a statement Monday. 

UnitedHealth attributed the intrusion on the Russian ransomware gang ALPHV, also known as BlackCat. The group claimed responsibility for the attack, stating that it took more than six terabytes of data, including "sensitive" medical records, from Change Healthcare, which handles health insurance claims for patients who visit hospitals, medical centres, or pharmacies. 

The attack's scale—Change Healthcare performs 15 billion transactions every year, according to the American Hospital Association—meant that even people who were not UnitedHealth clients could have been affected. The attack has already cost UnitedHealth Group almost $900 million, company officials said in reporting first-quarter earnings last week. 

Ransomware attacks, which include disabling a target's computer systems, are becoming more widespread in the healthcare industry. In 2022, a study published in JAMA Health Forum found that the yearly frequency of ransomware attacks against hospitals and other providers increased.

It was "straight out an attack on the U.S. health system and designed to create maximum damage," Witty informed analysts last week during an earnings call about the Change Healthcare incident. According to UnitedHealth's earnings report, the cyberattack is ultimately estimated to cost the organisation between $1.3 billion and $1.6 billion this year.

Harnessing AI and ChatGPT for Eye Care Triage: Advancements in Patient Management

 

In a groundbreaking study conducted by Dr. Arun Thirunavukarasu, a former University of Cambridge researcher, artificial intelligence (AI) emerges as a promising tool for triaging patients with eye issues. Dr. Thirunavukarasu's research highlights the potential of AI to revolutionize patient management in ophthalmology, particularly in identifying urgent cases that require immediate specialist attention. 

The study, conducted in collaboration with Cambridge University academics, evaluated the performance of ChatGPT 4, an advanced language model, in comparison to expert ophthalmologists and medical trainees. Remarkably, ChatGPT 4 exhibited a scoring accuracy of 69% in a simulated exam setting, outperforming previous iterations of the program and rival language models such as ChatGPT 3.5, Llama, and Palm2. 

Utilizing a vast dataset comprising 374 ophthalmology questions, ChatGPT 4 demonstrated its capability to analyze complex eye symptoms and signs, providing accurate recommendations for patient triage. When compared to expert clinicians, trainees, and junior doctors, ChatGPT 4 proved to be on par with experienced ophthalmologists in processing clinical information and making informed decisions. 

Dr. Thirunavukarasu emphasizes the transformative potential of AI in streamlining patient care pathways. He envisions AI algorithms assisting healthcare professionals in prioritizing patient cases, distinguishing between emergencies requiring immediate specialist intervention and those suitable for primary care or non-urgent follow-up. 

By leveraging AI-driven triage systems, healthcare providers can optimize resource allocation and ensure timely access to specialist services for patients in need. Furthermore, the integration of AI technologies in primary care settings holds promise for enhancing diagnostic accuracy and expediting treatment referrals. ChatGPT 4 and similar language models could serve as invaluable decision support tools for general practitioners, offering timely guidance on eye-related concerns and facilitating prompt referrals to specialist ophthalmologists. 

Despite the remarkable advancements in AI-driven healthcare, Dr. Thirunavukarasu underscores the indispensable role of human clinicians in patient care. While AI technologies offer invaluable assistance and decision support, they complement rather than replace the expertise and empathy of healthcare professionals. Dr. Thirunavukarasu reaffirms the central role of doctors in overseeing patient management and emphasizes the collaborative potential of AI-human partnerships in delivering high-quality care. 

As the field of AI continues to evolve, propelled by innovative research and technological advancements, the integration of AI-driven triage systems in clinical practice holds immense promise for enhancing patient outcomes and optimizing healthcare delivery in ophthalmology and beyond. Dr. Thirunavukarasu's pioneering work exemplifies the transformative impact of AI in revolutionizing patient care pathways and underscores the imperative of embracing AI-enabled solutions to address the evolving needs of healthcare delivery.

Orrick Data Breach: Law Firm Dealing with Data Breaches Hit by One


An international law firm assists businesses impacted by security events has experienced a cyberattack, where it compromised the sensitive health information of hundreds of thousands of data breach victims. 

Orrick, Herrington & Sutcliffe, the San Francisco-based company revealed last week that that during an attack in March 2023, threat actors stole personal information and critical health data of more than 637,000 data breach victims.

Orrick said that the hackers had taken massive amounts of data from its systems related to security incidents at other organizations, for which he provided legal assistance, in a series of letters notifying those impacted of the data breach.

Orrick informs that the data involved in the breach involved its customers’ data, including those with dental policies with Delta Dental, a major healthcare insurance network that covers millions of Americans' dental needs, and those with vision plans with insurance company EyeMed Vision Care.

The company further added that it had contacted with the U.S. Small Business Administration, the behavioral health giant Beacon Health Options (now Carelon), and the health insurance provider MultiPlan that their data was also exposed in Orrick's data breach.

Apparently, the stolen data includes victims’ names, dates of birth, postal address and email addresses, and government-issued identification numbers, such as Social Security numbers, passport and driver license numbers, and tax identification numbers. Also, information about patient’s medical treatment and diagnosis details, insurance claim like date and service-charges, and healthcare insurance numbers and provider details have been compromised. 

Orrick further says that credit or debit card details as well as online account credentials were also involved in the breach. 

Since the initial announcement of the breach, the number of affected individuals have been on the rise. In its recent breach notice, Orrick states that it “does not anticipate providing notifications on behalf of additional businesses,” however the company did not specify how it came to this conclusion. 

Orrick said in December to a federal court in San Francisco that it reached a preliminary settlement to end four class action lawsuits that claimed Orrick failed to disclose the breach from victims for months after it had occurred.

“We are pleased to reach a settlement well within a year of the incident, which brings this matter to a close, and will continue our ongoing focus on protecting our systems and the information of our clients and our firm,” added Orrick’s spokesperson.  

Future Health: AI's Impact on Personalised Care in 2024

 



As we dive into the era of incorporating Artificial Intelligence (AI) into healthcare, the medical sector is poised for a profound transformation. AI holds immense potential in healthcare, offering groundbreaking advancements in diagnostics, personalised treatment approaches, and streamlined administrative processes. Casting our gaze forward to 2024, the influence of AI on patient care is increasingly palpable, with the seamless fusion of technology and healthcare charting a collaborative course toward a future marked by synergy. 

AI's influence is particularly notable in diagnostics, where healthcare professionals leverage its ability to interpret intricate health data. Unlike traditional methods, AI systems analyse diverse datasets, providing a more comprehensive understanding of a patient's health. Recent regulatory recommendations from the World Health Organization (WHO) highlight the global recognition of AI's significance in healthcare, emphasising effective integration, patient safety, and data privacy. 

The concept of personalised medicine, tailoring treatments to individual patients, is evolving with AI playing a crucial role. AI's ability to process and analyse diverse patient data, including genetic details and lifestyle factors, is propelling the development of highly individualised treatment plans. This shift marks a pivotal moment in healthcare, promising a future where care is not only more precise but also tailored to the nuanced needs of individuals. 

In the next three years, trends in AI healthcare use cases are expected to shape the industry. Natural Language Processing (NLP) and Conversational AI will aid in symptom checking and triage, while virtual assistants guide patients and improve automated scheduling. Integrating omics data with Electronic Health Records (EHRs) and wearable device data will enhance patient phenotyping. Stringent regulations on AI, particularly in medical devices, are anticipated in the U.S. and Europe. The evolving role of AI in targeted diagnostics and personalised care simplifies data structuring, empowering healthcare professionals to focus on quality care. 

However, the widespread adoption of AI in daily clinical practice poses a critical challenge. The true potential of AI in healthcare can only be realised when medical professionals collaborate with these technologies, leveraging unique human skills and cognitive function. Those embracing this partnership are poised to harness AI's full potential, offering a glimpse into a future defined by advancements and redefined patient care standards. 

As AI reshapes the industry, ethical considerations take centre stage, especially regarding patient data privacy and the potential for algorithmic bias. The World Health Organization's recommendations reinforce the necessity for robust regulatory frameworks to ensure responsible AI use in healthcare. 

While AI brings significant benefits, the crucial role of human oversight cannot be overstated. AI serves as a valuable tool to assist healthcare professionals rather than replace them, with human judgement remaining essential in interpreting AI-generated data and making final treatment decisions. 

The year 2024 signifies a pivotal moment for AI in healthcare, showcasing its evolution from a conceptual idea to a practical tool enhancing patient care. This journey underscores the relentless pursuit of innovation in the medical field. As AI continues to progress, it holds the potential to unlock new dimensions in personalised patient care, making healthcare more efficient, precise, and tailored to individual needs. Challenges accompany this transformative journey, and the healthcare community must navigate them with a steadfast commitment to ethical practices, ensuring that AI integration enhances rather than compromises patient well-being.


Data Breach Incident Affects Several Las Vegas Valley Hospitals


In another cybersecurity incident in Las Vegas, cyber actors have targeted several Las Vegas Valley hospitals which may have resulted in the compromise of their patients’ sensitive information. 

The hospitals, part of the Valley Health System, include Centennial Hills, Desert Springs, Spring Valley, Summerlin, and Valley.

“So big question, how many people does it affect?” says Shannon Wilkinson, Chief Executive Officer for Tego Cyber.

Wilkinson runs a firm based in Las Vegas, that deals with cyber threats, he adds, “There’s one thing that I recommend that everybody does, and that is if you are not actively trying to get a loan, or get credit cards, or buy a car. Lock your credit.”

ESO, the company that suffered the data breach, is a third-party vendor that supplies software and other services to Valley Health's emergency medical services. One of the major concerns in regards to the breach is the timeline of when ESO detected the breach and when this news reached the online audience and the ones affected.

With respect to the issue, Valley Health System stated, “Letters were mailed to potentially affected individuals beginning on December 12, 2023.”

ESO notes that the firm detected the incident around September 28, following which they notified their “business associate” of the issue on October 27. 

Wilkinson stated that if hospitals have to shut down systems, these breaches may have an impact on patient care.

He notes that there is a direct link between hospital mortality and ransomware attacks, which target cyberspace, indicating that following a cyberattack like this, hospitals witness a rise in the death rate. However, Valley Health System confirms that the breach has not affected its emergency care. 

ESO further notes that it has taken all measures to prevent the data from getting leaked further. Moreover, ESO shared details of the measures that the victims of their data breach can take. 

ESO informs that the affected individual can contact its helpline between the hours of 9:00 a.m. to 6:30 p.m. Eastern Time, Monday through Friday, excluding holidays. The company has urged the data breach victims to call ESO’s helpline at (866) 347-8525 with their queries, or even to confirm if they were affected.  

Malek Team: Iran-linked Hackers Claim to Leak Medical Records From Israeli Hospital


An alleged Iran-based hacker group has claimed responsibility for stealing thousands of medical records from an Israeli hospital and leaking them on online forums. The stolen data also includes medical information of Israeli soldiers. The hospital – Ziv Medical Center – is situated in the city of Safed, near the border of Syria and Lebanon. 

The hackers claim to have stolen 500GB of medical data dating back to 2022. The 700,000 documents purportedly contained patient medical and personal data, including disease types and prescribed medication.

Last weekend, the hacker group involved in the attack – Malek Team – after attacking the hospital, began releasing documents that included the ones containing data from the Israel Defense Force (IDF) on their Telegram channel.

While the hackers did not disclose when exactly they attacked the hospital, a warning was released last week by the Israeli National Cyber Directorate regarding an incident affecting Ziv Medical Center's computer systems.

The warning read, “The incident has been identified and contained without disrupting or affecting various systems and the operation of the medical center.” Taking precautions, the hospital temporarily took down its email server and some of its computer systems.

The security team has conducted an investigation on the issue, however, findings have yet to be released as of yet to ascertain whether or not there was an information leak. 

Israel’s newspaper The Jerusalem Post reported that this was not the first time Ziv Medical Center has fallen victim to a cyberattack. The hospital had suffered two other cyber incidents in four months. Local media outlets reported that Ziv's systems appeared to have leaked information, which was admitted by both the hospital and the Israeli privacy protection body.

Israeli officials have said that they are pursuing charges against those connected to the incident and have forbidden the use, transfer, or distribution of any information that has been disclosed.

Along with Israeli tech and media organizations, Malek Team also claimed responsibility for cyberattacks on other targets in Israel, such as Ono Academic College, which was previously targeted earlier in October.

In their ventures, the hackers have leaked several data pieces, including videos of university classes and admission interviews with students. Also, scans of victims’ passports and documents have also been released. However, the authenticity of this data has not been confirmed.