- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
Revere Health Data Breach Impacts Cardiology Patients
The Personal Identifiable Information (PII) of approximately 12,000 cardiology patients has been exposed in a cyber-attack on a healthcare provider based in Utah.
Patient data in the care of Revere Health was compromised when the organization fell victim to a phishing attack on June 21, 2021.
An attacker impersonating the US Agency for International Development (USAID) sent an email to a Revere Health employee that contained a malicious link. When the employee clicked the link, they inadvertently gave the threat actor access to their login credentials.
The attacker used the stolen credentials to log in to an employee email account that contained information belonging to patients of Revere Health’s Heart of Dixie Cardiology Department in St. George, Utah. No credit card or payment information was among the data accessed by the attacker.
In a patient notification statement, Revere Health said that the compromised data was limited to patient names, dates of birth, medical record numbers, provider names, procedures, and information about appointments.
“Since this data is relatively limited, we believe that this poses a low-level risk to your personal information,” said the organization.
It continued: “We have no reason to believe that they [the attacker] accessed, or were interested in, patient information. However, we cannot completely rule this out.”
Revere Health said that active monitoring by its IT security team detected the unauthorized activity quickly. Within 45 minutes of the attack’s commencing, the team was able to sever unauthorized access to the compromised email account.
An investigation into the incident led Revere Health to conclude that stealing patient data was not the assailant’s main intention.
“From our detailed investigation of this incident, we believe that the intent of this attack was to harvest login credentials from individuals in our organization and not to gather patient information,” stated the healthcare provider.
“Our security logs suggest that the attacker had three objectives: (1) to spread phishing emails, (2) to gather active usernames and passwords and (3) to attempt financial fraud against Revere Health.”
Following the incident, Revere Health has updated its security awareness training, enhanced suspicious activity detection protocols, and accelerated its rollout of two-factor authentication software.