Data leak

Community Health Systems APT18 Breach via Heartbleed (4.5M Patients)

πŸ“… 2014-04-01 🏒 Juniper VPN (Heartbleed) πŸ”Ž CVE-2014-0160
Primary Source β†—

Incident Details

Between approximately April and June 2014, APT18 (also known as Dynamite Panda, Threat Group-0416, or Wekby), a Chinese state-linked advanced persistent threat group attributed by Mandiant, exploited the Heartbleed vulnerability (CVE-2014-0160) against a Juniper Networks SSL VPN appliance used by Community Health Systems (CHS). Heartbleed allowed the attacker to read arbitrary memory from the vulnerable device, extracting valid VPN credentials. Using these credentials, APT18 authenticated to CHS’s network as a legitimate user and accessed systems containing patient demographic data. CHS disclosed the breach via an SEC filing on August 18, 2014 β€” one of the first major public disclosures linking Heartbleed exploitation to a real-world data breach. CHS operated 206 hospitals across 29 U.S. states at the time. Approximately 4.5 million patients who received care at CHS-affiliated hospitals within the preceding 5 years were affected. Stolen data: names, addresses, birthdates, phone numbers, and Social Security numbers β€” but notably NO medical records, clinical data, or payment card information was taken. CHS settled a multistate attorney general investigation with 28 states for $5 million.

Technical Details

Initial Attack Vector
APT18 (Dynamite Panda), a Chinese state-linked threat actor, exploited the Heartbleed vulnerability (CVE-2014-0160) against Community Health Systems' Juniper VPN appliance to extract VPN credentials from memory; used stolen credentials to authenticate as a legitimate user and access the network
Vendor / Product
Juniper VPN (Heartbleed)
CVE / GHSA References
CVE-2014-0160

Timeline

  1. 2014-04-01 Breach occurred
  2. 2014-08-18 Publicly disclosed
  3. 2014-09-01 Customers notified