Excellus BlueCross BlueShield Hacked; More Than 10M Affected | Healthcare Informatics Magazine | Health IT | Information Technology Skip to content Skip to navigation

Excellus BlueCross BlueShield Hacked; More Than 10M Affected

September 10, 2015
by Heather Landi
| Reprints

Excellus BlueCross BlueShield, a Rochester, N.Y.-based insurer, was the target of a sophisticated cyber attack of its IT systems that exposed the personal data of more than 10 million people.

The payer and its affiliates disclosed late in the day on Sept. 9 that Excellus discovered the unauthorized access into their computer systems on Aug. 5 and upon further investigation working with cyber security firm Mandiant it was determined that the initial security breach occurred 20 months prior, on December 23, 2013.

This hacking incident marks the latest in a number of high profile cyber attacks on healthcare organizations, including the massive hack on Anthem in February, which exposed approximately 80 million records, as well as a large data breach at UCLA Health Systems in July which potentially affected 4.5 million people.

Excellus president and CEO Christopher Booth said in a message to customers posted on the organization’s website that an investigation determined hackers may have gained unauthorized access to individuals’ information, which could include name, date of birth, Social Security number, mailing address, telephone number, member identification number, financial account information and claims information.

The organization said that its internal investigation has not determine that any such data was removed from its systems and there is no evidence to date that such data has been used inappropriately. The company notified the Federal Bureau of Investigation (FBI) and is coordinating with the bureau’s investigation.

In a recent interview with Healthcare Informatics, Ron Mehring, the senior director, chief information security officer at Dallas-based Texas Health Resources, addressed the information security risks facing healthcare organizations and spoke specifically to the lessons learned from the data breaches at Anthem and UCLA Health.

“Be prepared and have a plan,” Mehring told HCI. “From what I have learned, and Anthem especially has been very transparent on the way they handled those breaches, you need to make sure you have a great response plan and be prepared for that inevitable breach at the tactical and technical level, but also at your executive level. You need to make sure that everyone understands that it could happen and have a plan.”

This latest attack affected about 7 million Excellus members and 3.5 million members of its non-BlueCross BlueShield subsidiary, Lifetime Healthcare Companies. Other affiliates are Lifetime Benefit Solutions, Lifetime Care, Lifetime Health Medical Group, The Med America Companies and Universa Healthcare. In the statement on the company website, Booth said the incident also affected members of other BlueCross BlueShield plans who sought treatment in the 31 county upstate New York service area of Excellus BSBS as well as individuals who do business with the payer and provided their financial information or Social Security number.

Excellus is notifying affected customers and offering identity theft protection services through Kroll, a risk mitigation and response solution company, including credit monitoring through TransUnion as a precaution against reuse of stolen personal data.

As has been previously reported in Healthcare Informatics, it can be very costly for healthcare organizations to recover from a data breach. A survey from Ponemon Institute found that healthcare organizations spent an average of more than $2 million to resolve the consequences of a data breach involving an average of almost more than 2,700 lost or stolen records. Another study from Ponemon and IBM revealed that healthcare emerged as the industry with the highest cost per stolen record with the average cost for organizations reaching as high as $363.

Topics

News

Community Data Sharing: Eight Recommendations From San Diego

A learning guide focuses on San Diego’s experience in building a community health information exchange and the realities of embarking on a broad community collaboration to achieve better data sharing.

HealthlinkNY’s Galanis to Step Down as CEO

Christina Galanis, who has served as president and CEO of HealthlinkNY for the past 13 years, will leave her position at the end of the year.

Email-Related Cyber Attacks a Top Concern for Providers

U.S. healthcare providers overwhelmingly rank email as the top source of a potential data breach, according to new research from email and data security company Mimecast and conducted by HIMSS Analytics.

Former Health IT Head in San Diego County Charged with Defrauding Provider out of $800K

The ex-health IT director at North County Health Services, a San Diego County-based healthcare service provider, has been charged with spearheading fraudulent operations that cost the organization $800,000.

Allscripts Touts 1 Billion API Shares in 2017

Officials from Chicago-based health IT vendor Allscripts have attested that the company has reached a new milestone— one billion application programming interface (API) data exchange transactions in 2017.

Dignity Health, CHI Merging to Form New Catholic Health System

Catholic Health Initiatives (CHI), based in Englewood, Colorado, and San Francisco-based Dignity Health officially announced they are merging and have signed a definitive agreement to combine ministries and create a new, nonprofit Catholic health system.