Supply chain β›“ Supply Chain

Florida Healthy Kids Corporation (FHKC) / Jelly Bean Communications Design breach

πŸ“… 2013-11-01 🏒 Jelly Bean Communications Design (web hosting vendor for FHKC enrollment portal)
Primary Source β†—

Incident Details

Florida Healthy Kids Corporation (FHKC) administers the Florida KidCare health insurance program, providing subsidized health and dental coverage to children across Florida. FHKC contracted Jelly Bean Communications Design to host and maintain its online enrollment portal. In a breach disclosure filed January 28, 2021, FHKC revealed that Jelly Bean had failed to patch multiple website vulnerabilities for approximately seven years β€” from November 2013 through December 2020 β€” allowing unauthorized actors sustained access to applicant and enrollee data. Approximately 3.5 million online applicants and enrollees were affected.

The scope of exposed data was extensive: full names, dates of birth, email addresses, telephone numbers, physical addresses, Social Security numbers, financial account information, secondary insurance details, and family relationship data (identifying the child insured and their guardians). The long duration of exposure β€” spanning the entire enrollment lifecycle for hundreds of thousands of Florida families β€” significantly amplified the potential for identity theft and fraud against a vulnerable population of children and their families.

FHKC became aware of the breach in December 2020, when it was notified that applicant address data had been inappropriately accessed and tampered with. The application portal was shut down in December 2020. FHKC notified HHS on January 28, 2021, and began notifying affected individuals shortly thereafter.

The U.S. Department of Justice subsequently investigated Jelly Bean Communications under the False Claims Act. The government alleged that Jelly Bean knowingly provided deficient cybersecurity controls to FHKC, which received federal funding β€” making the contractor’s failures a violation of the FCA. Jelly Bean reached a $293,771 settlement to resolve these allegations. The case was notable for applying FCA liability to a small web development firm for systematic negligence in patching and securing a federally funded system, rather than for intentional fraud.

The incident became a widely cited example of the compounding risk introduced by long-term relationships with small third-party vendors lacking the resources or diligence to maintain security over time β€” particularly when those vendors support systems handling sensitive government health program data for children. No ransomware or active exfiltration campaign was attributed; the harm arose entirely from unpatched vulnerabilities persisting for nearly a decade.

Technical Details

Initial Attack Vector
Unpatched web application vulnerabilities at third-party hosting vendor exploited over seven years; vendor failed to apply CMS/PHP security patches from November 2013 through December 2020
Vendor / Product
Jelly Bean Communications Design (web hosting vendor for FHKC enrollment portal)
Supply Chain Attack
βœ… Confirmed third-party / vendor compromise

Timeline

  1. 2013-11-01 Breach occurred
  2. 2021-01-28 Publicly disclosed
  3. 2021-02-01 Customers notified