Cyberattackers Accessed HealthEquity Customer Info via Third Party

Data thieves heisted the HSA provider's data repository for 4.5 million people's HR information, including employer and dependents intel.

2 Min Read
clinician presses a broken padlock icon
Alamy

HealthEquity, a Utah-based health savings account (HSA) provider, has disclosed a data breach affecting 4.5 million customers across the US. The incident stemmed from a hack of a data repository maintained by a third party, a spokesperson confirmed.

The company said in the notice that a hacker managed to breach an "an unstructured data repository outside our core systems" containing customer data, making off with various kinds of personally identifiable information (PII). While the spokesperson confirmed that the repository was maintained by a third-party vendor, she declined to offer further details on the topography or supply chain implications beyond noting that internal systems, including transactional platforms and integrations, weren't impacted.

The stolen PII included a mix of benefits sign-up information that varied by customer. That mix could include name, address, phone number, employee ID, employer, Social Security number, and dependent information. In all, the heist offers crooks a treasure trove of social engineering information.

"By referencing a procedure or test that an individual might think is private and known only to medical professionals, bad actors can more easily build trust with potential victims," said Erich Kron, security awareness advocate at KnowBe4, in an emailed statement.  

Related:AI in Healthcare Demands Vigilant Security Measures

Dwell Time & Response Anatomy

The initial access occurred on March 9, but it was only officially reported on June 26, according to a notice filed with the Maine Attorney General's Office. However, the dwell time for the cyberattackers before discovery was "much narrower" than that timeline would suggest, according to the company's spokesperson.

Rather than months, the attackers apparently went unnoticed for a little more than two weeks. The first inkling that there was a problem was a systems anomaly alert on March 25. HealthEquity said it took immediate action upon receiving the alert from its vendor, resolving the issue quickly and then kicking off an "extensive technical investigation and … data forensics" effort that lasted through June 10.

Continue Reading This Article on Dark Reading

Read more about:

Dark Reading

About the Authors

Tara Seals

Managing Editor, News, Dark Reading

Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine. She also spent 13 years working for Informa (formerly Virgo Publishing), as executive editor and editor-in-chief at publications focused on both the service provider and the enterprise arenas. A Texas native, she holds a B.A. from Columbia University, lives in Western Massachusetts with her family and is on a never-ending quest for good Mexican food in the Northeast.

Dark Reading

Long one of the most widely read cyber security news sites on the Web, Dark Reading, a sister site to ITPro Today, is now the most trusted online community for security professionals like you. Dark Reading's community members include thought-leading security researchers, CISOs, and technology specialists, along with thousands of other security professionals.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like