More than 1 million patient data ended up unprotected on the Internet

VG word pixels

Vulnerability in practice software

Not compliant with data protection: Patient data ended up on the Internet for unauthorized persons to view via practice software. Several 10,000 patients were affected.

News

Doctor's assistant digitally records a patient's data at reception
Data from medical practices ended up unprotected on the Internet.
© Adobe Stock: contrast workshop

It doesn’t get much more private than your own health data. It actually goes without saying that such data is stored as securely as possible.

Like the software collective “exploration” found out and together with “NDR” and “WDR” reported, this is not always the case. By June 2022, more than one million patient data from around 60,000 patients would have ended up largely unencrypted on the Internet via a security gap in the practice software inSuite from the company Doc Cirrus. In addition to personal data, these also include invoices and reports.

With inSuite, medical practices are supposed to prevent such data leaks. Because the software, which has been certified by the National Association of Statutory Health Insurance Physicians and the DQS certification body, among other things, makes it possible to store patient data in the practice on its own server instead of storing it centrally at Doc Cirrus. Patients can then access this data via a health portal.

But the portal contained a vulnerability. Using the browser’s development tools, it was possible to read out the access data for e-mail inboxes in most medical practices – and then to monitor their entire e-mail traffic. In addition, the data sent between the practice server and the health portal was not sufficiently secured. Unauthorized persons could query all existing patient data in unencrypted form, including personal information such as name, address, insurance status, diagnoses, referrals, blood values ​​and, in some cases, prescribed medication – across multiple medical practices.

See also  New York City sue Activision Blizzard, demand to see company records

After “Zerforschung” forwarded the security gap to the Berlin state data protection officer and the BSI, Doc Cirrus switched off the software completely. It confirmed the gap to the collective and announced further action. However, it is not known that those affected were informed about the vulnerability as promised.

The software has been available again since August. In a press release lets Doc Cirrus say:“The programming errors have now been corrected, the affected services are mostly active again, only one last service will be made available again as soon as possible after an update.” In addition, according to our own analyses “No reason to assume that outside of the responsible disclosure procedure (Editor’s note: the approach through research) Practice or patient information was viewed or tapped by third parties.”

The Abus HomeTec Pro CFA3000 on a wooden door

security breach

BSI warns of Abus wireless door locks

Unwanted door opener: A wireless door lock from Abus can allow attackers unauthorized access to the apartment. The BSI warns of the model.

12.8.2022 from
Alan Friedrichs

Continue to home page

more on the subject

Hacker Cyber ​​Attack Malware - Security (icon image)

cybersecurity

Europol hacker forum “Raidforums” closed

International investigators have unearthed one of the largest hacker forums in the world. The illegal marketplace “Raidforums” has been taken offline.

Password manager test 2021
Router on a desk.  In the background a man is using a smartphone and a laptop

IT security label

BSI is now labeling secure routers

Whether the new router meets current security requirements will soon become clearer. The BSI will now issue a corresponding indicator.

Browser test 2020: The new Edge vs. Chrome & Firefox

Chrome, Edge and Firefox

Browser vulnerability: Passwords stored in plain text

A vulnerability in Google Chrome allows passwords to be read in plain text. But Edge and Firefox should also be affected.

Hand holding a padlock in front of the Google Chrome logo

Updated to version 103.0.5060.134

New Chrome update fixes 11 security vulnerabilities

Google has released a new security update for Chrome. This eliminates 11 vulnerabilities, at least 5 of which are high risk.

Reference-www.pc-magazin.de