Data leak
Banner Health Data Breach β 3.7 Million Patients and Health Plan Members
Primary Source βIncident Details
Between 23 June and 7 July 2016, attackers first compromised Banner Health’s point-of-sale (POS) systems at food and beverage outlets within Banner Health facilities, using RAM-scraping malware to steal payment card data. The attackers then pivoted from the POS network into Banner’s broader healthcare IT infrastructure and accessed patient, health plan member, and provider data. Banner Health operates 29 hospitals and numerous clinics across multiple US states. The total breach affected approximately 3.7 million individuals: approximately 2.9 million patients and health plan members whose personal and health information was exposed (names, dates of birth, Social Security numbers, addresses, clinical and claims data), plus payment card data for individuals who used food and beverage outlets at Banner facilities between 23 June and 7 July 2016, and provider data for physicians credentialed with Banner. Banner disclosed the breach on 3 August 2016. HHS OCR investigated and reached a $1.25 million settlement with Banner Health in 2023 for multiple HIPAA violations related to the breach, including insufficient risk analysis, inadequate access controls, and failure to implement hardware and software controls. The breach demonstrated a novel attack vector: using lightly-secured ancillary payment systems as a pivot point into the main healthcare network.
Technical Details
- Initial Attack Vector
- Attackers first compromised Banner Health's food and beverage payment card systems (targeting point-of-sale systems at Banner's healthcare facility cafeterias and restaurants) and used that initial foothold to pivot into Banner's main healthcare network, accessing patient data systems
- Vendor / Product
- Banner Health patient records / payment card systems
- Malware Family
- POS RAM-scraping malware
Timeline
- 2016-06-17 Breach occurred
- 2016-08-03 Publicly disclosed
- 2016-08-03 Customers notified