During the ASX 2023 filing, Australia’s largest health insurer Medibank revealed how the hackers could get into their systems. According to the company’s statement, a stolen Medibank username and password were the key for the attack to be successful.
In October 2022, the company officially reported that a cyber attack hit it. A sample of data from some 9.7 million clients has been posted on the dark web. It included names, birth dates, passport numbers, and medical claims information.
Medibank CEO David Koczkar reports, “We remain committed to fully and transparently communicating with customers, and we will contact customers whose data has been released on the dark web. “The weaponisation of people’s private information to extort payment is malicious, and it attacks the most vulnerable members of our community.”
The attackers were able to gain access to the sensitive data of around 9.7 million customers, including Prime Minister Anthony Albanese. Cybersecurity experts and the Australian Federal Police believe that the criminals were part of the Russian ransomware criminal organisation REvil, though the attackers have not fully acknowledged this statement.
When Medibank refused to pay for the ransom, the hackers began publishing lists of customers on the dark web. The hackers published two lists they called naughty and nice. Sensitive medical information of customers was made available to other threat actors.
But recently, the company divulged how the attackers could get into their systems. CRN Tech writer Juha Saarinen noted that “That login was used by an unnamed third-party IT services provider for Medibank. With the stolen credentials, the hacker got through Medibank’s network through a misconfigured firewall appliance, which did not require an additional digital security certificate.”
The attack cost Medibank $26.2 million, and with this, the company has improved its cybersecurity protocols. The company ensured its firewall authentication was configured correctly and introduced the Operation Safeguard testing with Microsoft security experts. The company’s contact centres have also utilised two-factor authentication (2FA) as a security measure for customers calling in.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...