Connect with us

Malware

Massive Cencora Data Breach Unveils Sensitive Patient Information from 11 Top Pharmaceutical Giants in the US

A Cencora data breach has exposed patient information from eight US drug companies. The leak stems from misconfigurations in a Cencora-owned Elasticsearch server, revealing over 37 thousand patient records.

Published

on

Update: Adding three more pharmaceutical firms impacted by the Cencora security breach.

Several of the world’s largest drug companies have reported data breaches as a result of a February 2024 cyberattack on Cencora, a company they partner with for pharmaceutical and business services.

Previously known as AmerisourceBergen, Cencora is a pharmaceutical services provider specializing in drug distribution, specialty pharmacy, consulting, and clinical trial support. This Pennsylvania-based company operates in 50 countries, employs 46,000 people, and reported a 2023 revenue of $262 billion.

In February 2024, Cencora disclosed a data breach in a Form 8-K filing with the SEC, revealing that unauthorized parties had accessed its information systems and extracted personal data. At the time, the company chose not to provide any further information about the incident or its potential impact on clients, and no ransomware groups took responsibility for the attack.

Recently, the California Attorney General’s office published a series of data breach notification samples submitted by some of the largest pharmaceutical firms in the United States, all attributing their data exposure to the February Cencora incident.

“Cencora, Inc. and its Lash Group affiliate partner with pharmaceutical companies, pharmacies, and healthcare providers to facilitate access to prescribed therapies through drug distribution, free trial offers, co-pay coupons, patient support and services, and other services,” reads a related data breach notification from Novartis.

“We take the privacy and protection of the information entrusted to us very seriously. Cencora is writing to let you know about an event that involved your personal information that Cencora maintains in connection with its patient support programs on behalf of Novartis Pharmaceuticals Corporation.”

The eleven firms impacted by this breach, all using almost identical data breach notifications, are:

  1. Novartis Pharmaceuticals Corporation – One of the largest pharmaceutical companies globally, with a strong presence in various therapeutic areas, including oncology, neuroscience, and immunology.
  2. Bayer Corporation – A large multinational company with significant operations in pharmaceuticals, consumer health, and agricultural products.
  3. AbbVie Inc – Known for its blockbuster drug Humira, AbbVie is a major player in immunology and oncology.
  4. Regeneron Pharmaceuticals, Inc. – Notable for its innovative treatments in ophthalmology, oncology, and immunology.
  5. Genentech, Inc. – A member of the Roche Group, Genentech is a leader in biotechnology and has made significant contributions to cancer treatment.
  6. Incyte Corporation – Focuses on oncology and hematology, with key products like Jakafi.
  7. Sumitomo Pharma America, Inc. – Part of the Sumitomo Pharma Co., Ltd., known for its diverse portfolio in psychiatry, neurology, and oncology.
  8. Acadia Pharmaceuticals Inc. – Specializes in central nervous system disorders and has a smaller market presence than the others in this list.
  9. GlaxoSmithKline Group – A global healthcare company known for its wide-ranging portfolio in pharmaceuticals, vaccines, and consumer healthcare, with significant efforts in respiratory diseases, HIV, and immuno-inflammation.
  10. Endo Pharmaceuticals Inc.– Specializes in pain management, urology, and endocrinology, with a notable presence in both branded and generic pharmaceuticals.
  11. Dendreon Pharmaceuticals LLC – Focuses primarily on oncology, particularly in the development and commercialization of immunotherapy treatments for prostate cancer.

The data breach notices warn that Cencora’s internal investigation, which concluded on April 10, 2024, confirmed that the following information had been exposed: full name, address, health diagnosis, medications, and prescriptions.

The letter notes that as of this time, there’s no evidence that the exfiltrated information has been publicly disclosed on the internet or used for fraudulent purposes.

In response to the increased risk for exposed individuals, Cencora is offering recipients two years of free identity protection and credit monitoring services through Experian, which they can take advantage of until August 30, 2024.

We have reached out to Cencora to learn more about the data breach incident and the number of people impacted, but a spokesperson declined to provide additional details, directing us to a news release issued last week.

Stay Informed and Take Action

In today’s digital world, it’s more important than ever to stay informed about cybersecurity and take action to protect your personal information. Make sure to keep coming back to learn more about the latest cybersecurity news, tips, and best practices to safeguard your data. And if you have any questions or concerns, don’t hesitate to contact us. We’re here to help.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Malware

USDoD Hacker Responsible for Massive National Public Data Breach Captured in Brazil

Brazilian authorities have arrested a hacker accused of stealing 223GB of sensitive data from the US Department of Defense (DoD). The hacker, known as “Zambrius,” sold the data on the dark web and was also involved in other cybercrimes.

Published

on

In a dimly lit room filled with computer screens displaying sensitive data, a person in a hoodie is captured by an armed officer. The individual is reportedly connected to the National Public Data Breach incident, raising suspicions of being a USDoD hacker.

Imagine waking up one day to find your personal information plastered all over the internet. Well, that nightmare became a reality for millions of Americans when notorious hacker USDoD, also known as EquationCorp, breached National Public Data and the FBI’s InfraGard, leaking sensitive information online. But this cybercriminal’s reign of terror has come to an end, as Brazil’s Polícia Federal recently arrested USDoD in “Operation Data Breach.”

USDoD’s Infamous Data Breaches

USDoD gained notoriety for his high-profile data breaches, often stealing data and leaking it on hacking forums while taunting his victims. His breaches include the FBI’s InfraGard, a threat information sharing portal, and National Public Data, where the personal data and social security numbers of hundreds of millions of US citizens were leaked online.

However, things took a turn for the worse for USDoD when he targeted cybersecurity firm CrowdStrike and leaked the company’s internal threat actor list.

How USDoD Was Caught

After leaking CrowdStrike’s list, Brazilian publisher Techmundo received an anonymous report created by CrowdStrike that allegedly identified, or doxed, the threat actor, revealing he was a 33-year-old Brazilian named Luan BG. Strangely, USDoD confirmed that CrowdStrike’s information was accurate in an interview with HackRead and said he was currently living in Brazil.

With this information, Brazil’s Polícia Federal (PF) announced his arrest in Belo Horizonte/MG. “The Federal Police launched Operation Data Breach on Wednesday (16/10), with the aim of investigating invasions of the systems of the Federal Police and other international institutions,” reads the PF’s press release.

The Importance of Cybersecurity

This arrest serves as a reminder of the importance of cybersecurity. As individuals and businesses, we must stay vigilant and proactive in protecting our sensitive data. But you don’t have to navigate the world of cybersecurity alone.

Our IT Services team is here to help you protect your data and ensure your digital safety. From implementing robust security measures to providing guidance on best practices, we’ll work with you to keep your information secure.

Stay Informed and Stay Safe

Knowledge is power, and staying informed about the latest cybersecurity threats and best practices is the first step in keeping your data safe. We encourage you to reach out to our team and keep coming back to learn more about how to protect yourself and your business from cybercriminals.

Continue Reading

Malware

Cisco Probes Intrusion as Stolen Data Emerges for Sale on Cybercriminal Platform

Cisco is investigating a potential breach after a hacker claimed to have stolen 200GB of sensitive data. The company is working to determine the authenticity of the claim and assess any potential impacts on its customers. Protect your network with Cisco’s integrated security solutions and stay informed with the latest cybersecurity updates.

Published

on

In a striking visual, the Cisco logo emerges against a backdrop of red and blue diagonal light streaks and dots, echoing the dynamic atmosphere where Cisco probes intrusion within cybercriminal platforms.

Recently, we received information that Cisco, a leading IT company, is investigating a possible data breach after a threat actor claimed to have stolen sensitive data and put it up for sale on a hacking forum. Don’t worry, we’ve got you covered with the latest updates on this situation.

What’s going on with Cisco?

Cisco confirmed that they are looking into these claims and have launched an investigation to assess the situation. A Cisco spokesperson stated, “We are aware of reports that an actor is alleging to have gained access to certain Cisco-related files.” The investigation is still ongoing.

This all started when a notorious threat actor going by the name “IntelBroker” claimed that they, along with two accomplices called “EnergyWeaponUser” and “zjj,” had breached Cisco on October 6, 2024, and made off with a significant amount of developer data from the company. The stolen data apparently includes GitHub projects, GitLab projects, SonarQube projects, source code, hardcoded credentials, customer documents, and much more.

What has been leaked?

IntelBroker shared samples of the alleged stolen data, which includes a database, customer information, various customer documentation, and screenshots of customer management portals. However, they did not provide any details about how they obtained the data.

It’s worth noting that back in June, IntelBroker was involved in selling or leaking data from several other companies, such as T-Mobile, AMD, and Apple. Those attacks were believed to have been carried out by targeting a third-party managed services provider for DevOps and software development. It’s not clear yet whether the Cisco breach is related to these previous incidents.

What’s the current status of the investigation?

As of now, Cisco is continuing to investigate the reports and has engaged law enforcement to assist in their efforts. So far, they have found no evidence of a breach in their systems. If any confidential customer information is confirmed to have been obtained by the threat actor, Cisco has stated that they will notify the affected customers.

In conclusion, it’s essential to stay vigilant and keep up-to-date on the latest cybersecurity news and threats. You can trust us to provide you with the most recent information and help you navigate the ever-evolving world of cybersecurity. Don’t hesitate to contact us to learn more about how to protect your organization, and keep coming back for more updates on this and other cybersecurity topics.

Continue Reading

Malware

Game Freak Confirms Massive Breach: Stolen Pokémon Data Exposed Online

Game Freak, the developer behind Pokémon, has confirmed a security breach after stolen data leaked online. The leaked data includes information on unreleased games, potentially impacting both the company and fans. Game Freak is working to address the situation and strengthen their security measures to prevent future incidents.

Published

on

An animated character in an orange outfit and hat stands beside a fox-like creature with large ears in a sunlit forest, reminiscent of a Game Freak creation.

Imagine spending years of your life working on a top-secret project, only for it to be stolen and leaked online. That’s what happened to Game Freak, the Japanese video game developer behind the wildly popular Pokémon series, in August 2024. And now, we’re learning just how extensive the damage was.

A Digital Heist in the World of Pokémon

Game Freak has been at the forefront of the Pokémon gaming world since 1996, when they released Pokémon Red and Blue for the Nintendo Game Boy. Since then, they’ve produced countless titles for various Nintendo platforms, as well as for iOS and Android devices.

But in August, things took a turn for the worse. Screenshots of source code and development builds for upcoming Pokémon games started appearing on leak sites and channels like Discord, Reddit, and X. While Game Freak didn’t acknowledge the leak of the game data, they did confirm something even more concerning: the personal information of their workforce, contractors, and former employees was stolen in the cyberattack.

Damage Control and Apologies

In a machine-translated notice, Game Freak stated, “We deeply apologize for any inconvenience and concern this may have caused to all concerned parties.” They went on to explain that the leaked information included full names and company email addresses. While this doesn’t put people at risk for identity theft, it does leave them vulnerable to phishing and targeted brute-forcing attacks.

Game Freak is working to contact those affected by the incident individually, but they published the notice on their site because not everyone can be reached. On a positive note, it seems that Pokémon player data hasn’t been impacted. Game Freak has completed a detailed investigation of the breached servers and implemented security measures to prevent similar incidents in the future.

Not an Isolated Incident

Game Freak isn’t the only gaming company to fall victim to a cyberattack recently. Earlier this month, Canadian video game developer Red Barrels warned its community that an attack could cause delays on patches and additional content for existing Outlast games and upcoming titles. The Nitrogen ransomware group later claimed responsibility for the attack, boasting that they had stolen 1.8 TB of confidential data from Red Barrels.

As for the attack on Game Freak, no one has claimed responsibility yet. But the fact remains that this is a stark reminder of the vulnerability of even the most successful companies in the gaming industry.

What You Can Do to Help

As fans and consumers, it’s essential for us to stay informed and vigilant about cybersecurity. By keeping up-to-date with the latest news and best practices, we can help protect ourselves and the companies we love from these devastating cyberattacks.

But you don’t have to do it alone. Our IT Services team is here to help you navigate the ever-evolving landscape of cybersecurity. Don’t hesitate to contact us with any questions or concerns you might have. And remember to keep coming back for the latest information and advice on staying secure in the digital world.

Continue Reading

Trending

Copyright © 2023 IT Services Network.