Utah Imaging Associates (UIA) discloses a security breach, on September 4, 2021 the company claims to have detected and blocked a cyber attack. The healthcare provider promptly secured its infrastructure with the help of a specialized third-party cybersecurity firm. Utah Imaging Associates also notified the U.S. Department of Health and Human Services.
The healthcare provider also conducted an investigation to determine the scope of the intrusion. Threat actors gained access to some UIA files containing sensitive data of 583,643 individuals, the initial infiltration took place on August 29, 2021.
On November 18, 2021, UIA started notifying the impacted individuals via first-class mail the detailing the remediation actions the company is taking in response to the incident.
According to the HIPAA Journal, compromised files included first and last names, mailing addresses, dates of birth, Social Security numbers, health insurance policy numbers, and medical information such as treatment, diagnosis, and prescription information. The information exposed in the security breach varied from patient to patient.
Below are the recommendations included in the notice of Data Security Incident published by the company:
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Utah Imaging Associates)
[adrotate banner=”5″]
[adrotate banner=”13″]
Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…
The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…
ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…
This website uses cookies.