Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 4, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 4, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 4, 2025

      Smashing Animations Part 4: Optimising SVGs

      June 4, 2025

      I test AI tools for a living. Here are 3 image generators I actually use and how

      June 4, 2025

      The world’s smallest 65W USB-C charger is my latest travel essential

      June 4, 2025

      This Spotlight alternative for Mac is my secret weapon for AI-powered search

      June 4, 2025

      Tech prophet Mary Meeker just dropped a massive report on AI trends – here’s your TL;DR

      June 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025
      Recent

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025

      Simplify Negative Relation Queries with Laravel’s whereDoesntHaveRelation Methods

      June 4, 2025

      Cast Model Properties to a Uri Instance in 12.17

      June 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025
      Recent

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025

      Rilasciata /e/OS 3.0: Nuova Vita per Android Senza Google, Più Privacy e Controllo per l’Utente

      June 4, 2025

      Rilasciata Oracle Linux 9.6: Scopri le Novità e i Miglioramenti nella Sicurezza e nelle Prestazioni

      June 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Change Healthcare Breach Nearly Doubles to 190 Million Victims

    Change Healthcare Breach Nearly Doubles to 190 Million Victims

    January 27, 2025

    Change Healthcare breach doubles to 190 million victims

    The Change Healthcare data breach and ransomware attack that hit the UnitedHealth Group subsidiary in February 2024 was much larger than initially estimated, the company has revealed.

    In a statement to The Cyber Express, a company spokesperson said “the estimated total number of individuals impacted by the Change Healthcare cyberattack is approximately 190 million.”

    Previous estimates of the size of the Change Healthcare breach were around 110 million victims.

    With the company’s investigation “substantially complete,” here’s where the investigation stands, including types of data exposed, next steps, and what victims can do to protect themselves.

    Change Healthcare Breach Victim Count Nearly Finalized

    The Change Healthcare statement said the “vast majority” of the 190 million victims have been notified.

    When the investigation is complete, the final number will be filed with the Office for Civil Rights at the U.S. Department of Health and Human Services (HHS).

    One bit of hopeful news for victims: “Change Healthcare is not aware of any misuse of individuals’ information as a result of this incident and has not seen electronic medical record databases appear in the data during the analysis.”

    It’s not clear if the company is engaged in dark web monitoring to look for any patient data – which may have been exposed in the cyberattack – that might appear on cybercrime forums and marketplaces, but that’s one possible avenue of investigation the company may be pursuing. The company paid a $22 million ransom to the ALPHV/BlackCat ransomware group to try to get the data back, but not all of the data was recovered and the RansomHub group also tried to subsequently extort the company.

    Change Healthcare’s HIPAA substitute notice page was updated recently to say that the investigation is “substantially complete” and the company “does not anticipate that it will identify any additional customers,” meaning that the “approximately 190 million” number likely won’t change once the final tally is calculated.

    Patient Data May Have Leaked

    Change Healthcare said information leaked in the breach typically includes contact information, date of birth, “and one or more of the following” types of information:

    • Health insurance information
    • Health information such as medical record numbers, providers, diagnoses, medicines, test results, images, and treatment information
    • Billing and claims information

    “For the majority of potentially affected individuals, Social Security numbers were not impacted, and except in rare instances, financial and banking information, payment cards, driver’s licenses or state ID numbers, or other ID numbers were not involved in this incident,” the HIPAA substitute notice said.

    Some of the leaked information may be related to guarantors, or a person who agrees to pay the bill for health care services on behalf of the patient.

    Next Steps for Breach Victims

    Change Healthcare recommended a number of steps for victims to take:

    • Enroll in two years of complimentary credit monitoring and identity protection services.
    • Individuals should regularly monitor explanation of benefits statements “as well as bank and credit card statements, credit reports, and tax returns, to check for any unfamiliar activity,” and to notify providers, insurers and financial companies of any potentially fraudulent activity.
    • If an individual believes they are the victim of a crime, they can also contact local law enforcement and file a police report.

    Change Healthcare is directing affected individuals to changecybersupport.com for further information and resources.

    Change Healthcare was just one attack in a difficult year for healthcare data breaches – a year that ended with a proposed new HIPAA Security Rule that could help improve healthcare cybersecurity if it gets finalized under the new U.S. Administration.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAway From the Keyboard: Ariel Hou, Staff Engineer
    Next Article Hacked buses blare out patriotic pro-European anthems in Tbilisi, attack government

    Related Posts

    Security

    HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability — Urges Immediate Patch Upgrade

    June 4, 2025
    Security

    Cisco warns of ISE and CCP flaws with public exploit code

    June 4, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-4010 – Netcom NTC 6200 and NWL 222 Web Interface Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Hackers Hijack High-Profile TikTok Accounts in Zero-Day Cyberattack

    Development

    CVE-2025-43012 – JetBrains Toolbox App SSH Plugin Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Head of Design is Dead, Long Live the Head of Design!

    Development

    Highlights

    Why 2025 Is the Perfect Time to Invest in AI-Powered Business Solutions🚀

    June 3, 2025

    Post Content Source: Read More 

    Unveiling the Power of Design Languages

    May 13, 2024

    Web Design Services Market Is Going to Boom

    November 13, 2024

    mat2 – metadata anonymisation toolkit

    December 15, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.