Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Millions of Americans Affected: Change Healthcare Reveals Data Stolen in Cyberattack

    Millions of Americans Affected: Change Healthcare Reveals Data Stolen in Cyberattack

    June 24, 2024

    UnitedHealth has, for the first time, detailed the types of medical and patient data stolen in the extensive cyberattack on Change Healthcare (CHC). The company announced that CHC cyberattack notifications will be mailed in July to affected individuals.

    “CHC plans to mail written letters at the conclusion of data review to affected individuals for whom CHC has a sufficient address. Please note, we may not have sufficient addresses for all affected individuals. The mailing process is expected to begin in late July as CHC completes quality assurance procedures,” reads the official statement by Change Healthcare.

    UnitedHealth issued a data breach notification, revealing that the ransomware attack exposed a “substantial quantity of data” for a “substantial proportion of people in America.” During a congressional hearing, UnitedHealth CEO Andrew Witty estimated that “maybe a third” of all Americans’ health data was compromised in the attack.

    Stolen Data Information in CHC Cyberattack

    The Change Healthcare data breach notification provided a comprehensive overview of the types of information that may have been affected. Although CHC cannot confirm exactly what data was compromised for each individual, the exposed information may include:

    Contact Information: Names, addresses, dates of birth, phone numbers, and email addresses.
    Health Insurance Information: Details about primary, secondary, or other health plans/policies, insurance companies, member/group ID numbers, and Medicaid-Medicare-government payor ID numbers.
    Health Information: Medical record numbers, providers, diagnoses, medicines, test results, images, and details of care and treatment.
    Billing, Claims, and Payment Information: Claim numbers, account numbers, billing codes, payment card details, financial and banking information, payments made, and balances due.
    Other Personal Information: Social Security numbers, driver’s license or state ID numbers, and passport numbers.

    This information may vary for each impacted individual. To date, CHC has not seen full medical histories appear in their data review.

    “The information that may have been involved will not be the same for every impacted individual. To date, we have not yet seen full medical histories appear in the data review. Also, some of this information may have related to guarantors who paid bills for health care services. A guarantor is the person who paid the bill for health care services,” the official statement reads further.

    Cyberattack on Change Healthcare: What Exactly Happen?

    The Change Healthcare cyberattack occurred when a cybercriminal gained unauthorized access to the CHC computer system on February 21, 2024. Upon discovering the ransomware deployment, CHC immediately took steps to halt the activity, disconnected and shut down systems to prevent further impact and initiated an investigation. Law enforcement was contacted, and CHC’s security team, along with several top cybersecurity experts, worked tirelessly to address the breach and understand its scope.

    The investigation revealed that a significant amount of data was exfiltrated from CHC’s environment between February 17, 2024, and February 20, 2024.

    By March 7, 2024, CHC confirmed the data exfiltration and began analyzing the compromised files.

    On April 22, 2024, CHC publicly confirmed that the impacted data could affect a substantial proportion of the American population.

    As of June 20, 2024, CHC began notifying customers whose data was identified as compromised.

    When CHC learned about the activity, CHC immediately began an investigation with support from leading cybersecurity experts and law enforcement. In response to this incident, CHC immediately took action to shut down systems and sever connectivity to prevent further impact,” informed Change Healthcare official release

    “CHC has also reinforced its policies and practices and implemented additional safeguards in an effort to prevent similar incidents from occurring in the future. CHC, along with leading external industry experts, continues to monitor the internet and dark web.

    What Steps Affected Individuals Can Take

    While the investigation continues, individuals who suspect their information may have been compromised can take several steps to protect themselves:

    Enroll in Credit Monitoring and Identity Protection: CHC is offering two years of complimentary credit monitoring and identity protection services.
    Monitor Statements and Reports: Regularly check explanations of benefits from health plans, statements from healthcare providers, bank and credit card statements, credit reports, and tax returns for any unfamiliar activity.
    Report Unfamiliar Health Services: If any unauthorized healthcare services are found on an explanation of the benefits statement, contact the health plan or doctor.
    Alert Financial Institutions: Immediately contact financial institutions or credit card companies if suspicious activity is detected on bank or credit card statements or tax returns.
    File a Police Report: Contact local law enforcement if you believe you are a victim of a crime.

    Individuals may also have additional rights depending on their state of residence and should refer to the provided Reference Guide for more information.

    The ransomware attack on CHC has highlighted significant vulnerabilities in the handling of sensitive health and personal information. As the investigation progresses, affected individuals are urged to stay vigilant and utilize the resources provided to mitigate potential risks.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleJollibee Probes Alleged Data Breach Affecting 32 Million Customers, Asks Public to Remain Vigilant
    Next Article RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48187 – RAGFlow Authentication Bypass

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    New Spectre-Style ‘Pathfinder’ Attack Targets Intel CPU, Leak Encryption Keys and Data

    Development

    8 Best Practices for Writing Clean and Maintainable Code

    Development

    Align-Pro: A Cost-Effective Alternative to RLHF for LLM Alignment

    Machine Learning

    Criando aplicativos modernos mais rápido: novos recursos no MongoDB.local NYC 2024

    Databases

    Highlights

    Machine Learning

    Fin-R1: A Specialized Large Language Model for Financial Reasoning and Decision-Making

    March 22, 2025

    LLMs are advancing rapidly across multiple domains, yet their effectiveness in tackling complex financial problems…

    Use a DAO to govern LLM training data, Part 1: Retrieval Augmented Generation

    November 1, 2024

    Xbox and PlayStation Call of Duty: Black Ops 6 and Warzone players get a much requested feature today — here’s how it’ll work

    January 28, 2025

    Bill Gates says, “I thought I was one mistake away from death.” — Microsoft’s success and his billionaire status didn’t really arrive until the late ’90s

    February 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.