Credential theft
UnityPoint Health Phishing Attack β 1.4 Million Patient Records
Primary Source βIncident Details
In March and May 2018, UnityPoint Health β a major Iowa-based health system operating approximately 32 hospitals and 280 clinics in Iowa, Illinois, and Wisconsin β suffered two related business email compromise (BEC) phishing attacks that compromised employee email accounts. The first attack ran from 14 March to 3 April 2018; the second occurred in May 2018. The attacker used emails impersonating a UnityPoint Health executive to trick employees into entering credentials on a phishing site. Approximately 1.4 million patients were potentially affected as the compromised email accounts had access to or contained patient protected health information. Exposed data included names, dates of birth, medical record numbers, treatment information, health insurance details, and for some patients, Social Security numbers. UnityPoint also suffered separate wire fraud losses from the BEC component of the attack. The health system disclosed the breach on 31 July 2018. HHS OCR opened a HIPAA investigation. A class-action lawsuit was filed. A second phishing attack against UnityPoint in 2018 was separately discovered. The dual incidents made UnityPoint one of the most severely phishing-affected health systems of 2018. Business email compromise targeting healthcare executives is particularly dangerous because compromised executive emails often have access to financial authorisation and patient data systems simultaneously.
Technical Details
- Initial Attack Vector
- Business email compromise (BEC) phishing β a sophisticated email fraud campaign impersonating a UnityPoint Health executive directed employees to click a link and enter credentials, compromising multiple employee email accounts; the attacker used compromised email accounts to access patient data and attempt additional payroll and wire fraud
- Vendor / Product
- UnityPoint Health employee email / patient data systems
Timeline
- 2018-03-14 Breach occurred
- 2018-07-31 Publicly disclosed
- 2018-07-31 Customers notified