Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 2, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 2, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 2, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 2, 2025

      How Red Hat just quietly, radically transformed enterprise server Linux

      June 2, 2025

      OpenAI wants ChatGPT to be your ‘super assistant’ – what that means

      June 2, 2025

      The best Linux VPNs of 2025: Expert tested and reviewed

      June 2, 2025

      One of my favorite gaming PCs is 60% off right now

      June 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      `document.currentScript` is more useful than I thought.

      June 2, 2025
      Recent

      `document.currentScript` is more useful than I thought.

      June 2, 2025

      Adobe Sensei and GenAI in Practice for Enterprise CMS

      June 2, 2025

      Over The Air Updates for React Native Apps

      June 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025
      Recent

      You can now open ChatGPT on Windows 11 with Win+C (if you change the Settings)

      June 2, 2025

      Microsoft says Copilot can use location to change Outlook’s UI on Android

      June 2, 2025

      TempoMail — Command Line Temporary Email in Linux

      June 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Change Healthcare Breach Nearly Doubles to 190 Million Victims

    Change Healthcare Breach Nearly Doubles to 190 Million Victims

    January 27, 2025

    Change Healthcare breach doubles to 190 million victims

    The Change Healthcare data breach and ransomware attack that hit the UnitedHealth Group subsidiary in February 2024 was much larger than initially estimated, the company has revealed.

    In a statement to The Cyber Express, a company spokesperson said “the estimated total number of individuals impacted by the Change Healthcare cyberattack is approximately 190 million.”

    Previous estimates of the size of the Change Healthcare breach were around 110 million victims.

    With the company’s investigation “substantially complete,” here’s where the investigation stands, including types of data exposed, next steps, and what victims can do to protect themselves.

    Change Healthcare Breach Victim Count Nearly Finalized

    The Change Healthcare statement said the “vast majority” of the 190 million victims have been notified.

    When the investigation is complete, the final number will be filed with the Office for Civil Rights at the U.S. Department of Health and Human Services (HHS).

    One bit of hopeful news for victims: “Change Healthcare is not aware of any misuse of individuals’ information as a result of this incident and has not seen electronic medical record databases appear in the data during the analysis.”

    It’s not clear if the company is engaged in dark web monitoring to look for any patient data – which may have been exposed in the cyberattack – that might appear on cybercrime forums and marketplaces, but that’s one possible avenue of investigation the company may be pursuing. The company paid a $22 million ransom to the ALPHV/BlackCat ransomware group to try to get the data back, but not all of the data was recovered and the RansomHub group also tried to subsequently extort the company.

    Change Healthcare’s HIPAA substitute notice page was updated recently to say that the investigation is “substantially complete” and the company “does not anticipate that it will identify any additional customers,” meaning that the “approximately 190 million” number likely won’t change once the final tally is calculated.

    Patient Data May Have Leaked

    Change Healthcare said information leaked in the breach typically includes contact information, date of birth, “and one or more of the following” types of information:

    • Health insurance information
    • Health information such as medical record numbers, providers, diagnoses, medicines, test results, images, and treatment information
    • Billing and claims information

    “For the majority of potentially affected individuals, Social Security numbers were not impacted, and except in rare instances, financial and banking information, payment cards, driver’s licenses or state ID numbers, or other ID numbers were not involved in this incident,” the HIPAA substitute notice said.

    Some of the leaked information may be related to guarantors, or a person who agrees to pay the bill for health care services on behalf of the patient.

    Next Steps for Breach Victims

    Change Healthcare recommended a number of steps for victims to take:

    • Enroll in two years of complimentary credit monitoring and identity protection services.
    • Individuals should regularly monitor explanation of benefits statements “as well as bank and credit card statements, credit reports, and tax returns, to check for any unfamiliar activity,” and to notify providers, insurers and financial companies of any potentially fraudulent activity.
    • If an individual believes they are the victim of a crime, they can also contact local law enforcement and file a police report.

    Change Healthcare is directing affected individuals to changecybersupport.com for further information and resources.

    Change Healthcare was just one attack in a difficult year for healthcare data breaches – a year that ended with a proposed new HIPAA Security Rule that could help improve healthcare cybersecurity if it gets finalized under the new U.S. Administration.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAway From the Keyboard: Ariel Hou, Staff Engineer
    Next Article Hacked buses blare out patriotic pro-European anthems in Tbilisi, attack government

    Related Posts

    Security

    Chrome Zero-Day Alert: CVE-2025-5419 Actively Exploited in the Wild

    June 2, 2025
    Security

    CISA Adds 5 Actively Exploited Vulnerabilities to KEV Catalog: ASUS Routers, Craft CMS, and ConnectWise Targeted

    June 2, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    A Must-Have Playbook for Digital Product People

    Development

    CVE-2025-0049 – GoAnywhere Directory Traversal Information Disclosure

    Common Vulnerabilities and Exposures (CVEs)

    StarCalendar – full-featured international calendar

    Development

    CVE-2025-5285 – WooCommerce Stored Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Development

    Researchers from Stanford and Amazon Developed STARK: A Large-Scale Semi-Structure Retrieval AI Benchmark on Textual and Relational Knowledge Bases

    May 2, 2024

    Imagine you’re looking for the perfect gift for your kid – a fun yet safe…

    CVE-2025-1056 – Axis Camera Station Pro File Path Traversal Vulnerability

    April 23, 2025
    Personalizziamo un po’ GNOME – Versione 2025

    Personalizziamo un po’ GNOME – Versione 2025

    April 9, 2025

    Managing Request Host Information in Laravel

    February 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.