• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Brightline Hack Exposes Data of Over 780,000 Child Mental Health Patients

You are here: Home / Cyber Security News / Brightline Hack Exposes Data of Over 780,000 Child Mental Health Patients

Pediatric mental overall health supplier Brightline has warned people that it suffered a facts breach on January 30, impacting 783,606 men and women.

Composing in a discover on its site previously this 7 days, Brightline stated the breach was related to a zero-working day vulnerability in its Fortra GoAnywhere MFT protected file-sharing system.

“Through its investigation, Fortra states that it recognized a formerly-not known vulnerability which an unauthorized celebration applied to achieve obtain to certain Fortra customers’ accounts and obtain files, including ours,” reads the detect.

Brightline said its investigation determined the incident was minimal to the Fortra assistance and did not influence its network. However, the information stolen from the breach incorporated patients’ confidential data.

“[This] potentially [includes] some mixture of the pursuing info elements: individuals’ names, addresses, dates of beginning, member identification figures, day of wellbeing plan protection, and/or employer names,” the business wrote.

According to Bleeping Computer system, these attacks ended up carried out by the Clop ransomware gang employing the command injection vulnerability CVE-2023-0669.

Read through additional on the vulnerability and Clop here: Clop Ransomware Team Exploits GoAnywhere MFT Flaw

“The point that the Clop ransomware gang was equipped to keep compromise in Brightline’s environments for months, even just after publicly listing Brightline in their portal, is very telling of the present-day state of information security in the health care market,” commented David Benas, an associate principal advisor at the Synopsys Software Integrity Group.

“While proactive defense against vulnerabilities is critically crucial, this incident displays that proving you have powerful incident reaction abilities prior to you get breached is just as important—if not even extra important— in a condition like this.”

Echoing Benas’s issue, James Graham, VP of RiskLens, explained healthcare industry members are usually focused by risk actors, which suggests health care organizations need to be extremely confident of their cybersecurity investments.

“Part of this is carrying out quantitative risk assessments utilizing the Fair conventional to present an overview of risk in conditions of probability and charge, enabling for security investments to be manufactured additional competently.”

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Android Spyware BouldSpy Linked to Iranian Government
Next Post: Meta Tackles Malware Posing as ChatGPT in Persistent Campaigns »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
  • ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
  • ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
  • The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

Copyright © 2025 · AllTech.News, All Rights Reserved.