Scammers use DocuSign API to send fraudulent invoices
CFOs, beware: cybercriminals are exploiting DocuSign’s legitimate business tools to deliver fraudulent invoices directly through trusted channels. This scheme is particularly dangerous …
Health Equity, a major US health savings account (HSA) provider, recently disclosed a significant data breach affecting 4.3 million people. As the healthcare industry increasingly becomes a prime target for cyberattacks, this incident highlights not only the vulnerability of even the most prominent health savings account (HSA) providers but also the potential consequences for millions of affected individuals.
The breach stemmed from unauthorised access to an unstructured data repository outside Health Equity’s core systems. Threat actors exploited a partner’s compromised credentials, gaining entry on 9 March 2024. However, the breach wasn’t verified until 26 June, following an internal investigation.
The compromised information varied per individual, but included:
Upon discovery, Health Equity took swift action:
The company is offering affected individuals two years of credit monitoring and identity theft protection through Equifax. Health Equity has also advised customers to remain vigilant and review their account statements for suspicious activity.
According to the IBM Cost of a Data Breach Report 2024, healthcare remains the costliest sector for data breaches, averaging $9.77 million per incident. While this represents a 10.6% decrease from 2023 ($10.93 million), it’s still significantly higher than other industries – finance comes in second, averaging $6.08 million.
The Health Equity incident is part of a concerning pattern of data breaches in the healthcare sector. In Australia alone, healthcare had the highest number of data breaches between July and December 2023, reporting 104 incidents – 22% of all breaches reported during this period. This doubles finance, which came in second with 49 reported breaches (10%).
Recent high-profile cases in Australia, such as the MediSecure and Medibank breaches, underscore the severity and complexity of these cyber threats.
MediSecure breach: In May 2024, MediSecure, a major e-prescriptions provider in Australia, fell victim to a ransomware attack. The incident likely originated from a third-party vendor, highlighting the vulnerability of supply chain relationships. The breach put private personal and health information of millions of Australians at risk, prompting a whole-of-government response. The full extent of the damage is still being assessed, but the incident has already shaken trust in electronic health systems.
Medibank breach: In late 2022, Medibank, Australia’s largest health insurer, suffered a devastating cyber attack that compromised the data of 9.7 million current and former customers. The breach involved sensitive medical and financial information. Hackers initially demanded a $15 million ransom, which Medibank refused to pay. Subsequently, the attackers began leaking customer data on the dark web. The fallout has been significant:
These cases illustrate that the healthcare industry remains a prime target for attackers looking to exploit valuable medical data which can be sold on the dark web to facilitate identity theft and other lucrative cybercrimes.
In the aftermath of the Health Equity breach, finance leaders should keep the following takeaways in mind:
Potential risks to prepare for:
When a data breach occurs, finance teams need to stay informed on the latest updates to ensure they’re on guard during periods of heightened suspicious activity. Consider these two key areas:
The Health Equity breach shows that even large, established organisations in highly regulated industries remain vulnerable to cyber attacks. As the healthcare sector continues to digitise processes, finance leaders must remain vigilant, continuously updating their cybersecurity strategies to protect sensitive data and maintain stakeholder trust.
CFOs, beware: cybercriminals are exploiting DocuSign’s legitimate business tools to deliver fraudulent invoices directly through trusted channels. This scheme is particularly dangerous …
Because LinkedIn is used as a professional networking platform, account holders don’t use the same caution as they would on Facebook or …
Fraud can strike any time, but certain periods increase your business’s vulnerability to fraudulent activities. During these times, your teams may be …
Eftsure provides continuous control monitoring to protect your eft payments. Our multi-factor verification approach protects your organisation from financial loss due to cybercrime, fraud and error.