- A clinical research organization’s data set has been discovered online
- The documents include personally identifiable information (PII)
- It is not clear whether criminals have access to the information
A dataset belonging to a clinical research company has been discovered publicly postponed online without encryption or password protection.
Security researcher Jeremiah Fowler discovered DM Clinical Research Database containing 1,674,218 items, a total of 2 TB, including names, medical information, phone numbers, E -mail addresses, medicine and health conditions -along with other data that would put someone exposed at risk for fraud, identity theft or social technical attacks.
Although the name of the data set indicates that the details belong to the DM Clinical Research, it is not clear whether this was owned and administered by them directly or by a third party – but here’s what we know so far.
Valuable information
It is unclear how long the database was exposed to before the researcher sent a notice of information, but it was no longer available ‘within hours after the message was sent. There is a chance that threat players may have access to the information, but only an internal forensic audit could determine this.
“Our team is currently reviewing the details of your findings to ensure a quick and comprehensive resolution,” replied the DM Clinical Research to the reveal. “The protection of sensitive data is a cornerstone of our organization’s operations, and we are obliged to tackle any vulnerabilities in adaptation with best practice and applicable laws and regulations.”
Information of healthcare is extremely sensitive and very valuable to threat actors. Because of this, health organizations are severely affected by cyberattacks – especially by ransomware and data violations – and that is why data protection is so important in industries that contain personal information.
By 2024, a Cyberattack to the 190 million American compromise, forcing some applications offline and unitedtehealth also led a ransomware attack that resulted in customer information leaking on the dark web – highlighted how attractive the industry is too criminals.
Serious consequences
This can be really harmful to patients, especially those with serious medical conditions that can come with stigma, such as psychiatric conditions, HIV or cancer. If criminals gain access to your medical information, they can construct attacks on social engineering that pretends to be a doctor, health insurance company or medical professional.
“Any public exposure of health -related information could have potentially serious consequences. While things like financial data and some PII may change over time, Personal Health History doesn’t do that, ”Fowler points out.
For companies, there are steps you can take to protect your data so your organization is protected. Security breach can cost an organization millions, not only in direct costs, but in reputation damage to customers and business partners.
To make sure you store customer data safe, encryption software is incredibly important. Businesses have a legal responsibility to protect their customer items, which means that unencrypted data sets can result in litigation and financial loss.
Using a real -time threat and intrusion can also be an important tool, such as Endpoint Detection Software, which works by scanning by intrusion and suspicious activity and warning security administrators if anything is found.
After a violation, it is important for businesses to be transparent to mitigate the damage. This will ensure lasting consumer confidence and trust between your organization and its partners.
For persons affected by a data violation, it is important to monitor financial accounts, bank statements and transactions to look for something misplaced.
Particularly important is to be looking for social technical attacks such as phishing – with medical information, criminals may form as trusted professionals or in the United States, where healthcare can compromise your financial situation, benefit from patients who may desperately need money.
Be wary of unexpected communication, any non -recognized E emails or phone calls, and do not open any attached files that are not from 100% trusted sources. Be sure to create a strong and secure password, and not reuse it, especially for financial and health organizations.