Advanced Cyber Spoofing Attack Revealed by Humana

Humana is letting members know that in certain states that an advanced spoofing attack possibly compromised their protected health information (PHI).

A spoofing attack is an effort by a bot or threat actor to access a program or information by using stolen or spoofed login information. Humana noticed the attack on June 3, because of a lot of unsuccessful login attempts had been recorded from foreign IP addresses. Quick action was done prohibit the attack. The foreign IP addresses were blacklisted from being able to access Go365.com and Humana.com websites on June 4, 2018.

Humana believes that the attacker had a huge database of user IDs because of the detected actions. It is probable the account login information are outdated and the attacker obtained them from a different third-party breach, though Humana also says that the large number of log in attempt failures clearly implies the pairing of ID and password were not from Humana.

The accounts in the website didn’t keep financial information or Social Security numbers; nonetheless, these types of info may have been seen by the hackers: Data on medical, dental, and vision claims, medical insurance provider name, service dates, services performed, bill amounts, paid amounts, spending account data, balance details, health care information, and biometric screening facts.

Humana states that there is no discovered evidence that indicates any members’ information were compromised in the data breach; nonetheless, as a preventative measure, users whose accounts could have been accessed were given one year of complimentary credit monitoring and identity theft protection services via the Equifax Credit Watch Gold service. All account passwords were also reset for safety reasons.

Humana is now employing new settings to boost the defenses of its sites and has executed a new system for status updates of failed and successful access attempts.

This attack might just be a brute force attempt to enter into accounts of users using just a username acquired from a preceding breach and a record of potential passwords. To decrease the opportunity of such an attack allowing unauthorized entry, strong, complicated passwords need to be utilized for accounts which have not been used previously on another account.

When possible, two-factor authentication must also be turned on. This calls for an extra piece of data – a code delivered to a mobile phone for example – to be inputted when an unknown device or IP makes an attempt to enter into an account.

About James Keogh 144 Articles
James Keogh has been writing about the healthcare sector in the United States for several years. With several years of covering healthcare topics, he has developed expertise in HIPAA-related issues, including compliance, patient privacy, and data breaches. His work is known for its thorough research and accuracy, making complex legal and medical information accessible . James's articles are valuable resources for healthcare professionals and have been featured in reputable publications. You can follow James on Twitter https://x.com/JamesKeoghHIPAA and contact James on LinkedIn https://www.linkedin.com/in/james-keogh-89023681.