Cybersecurity1 hr ago

Hacker Exposes Data of 22,500 Connecticut Medicaid Patients in Financially Motivated Attack

On March 4, attackers used stolen Hartford HealthCare employee credentials to enter Connecticut's Medicaid provider portal, downloading records of 22,500 patients. The financially motivated breach was discovered March 25 and contained.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Hacker Exposes Data of 22,500 Connecticut Medicaid Patients in Financially Motivated Attack
Source: WfsbOriginal source

TL;DR: On March 4 a hacker used stolen Hartford HealthCare employee credentials to enter the Connecticut Medicaid provider portal and downloaded records for about 22,500 patients. The breach was discovered on March 25, contained, and the attacker’s motive was financial gain rather than patient data theft.

Context The Connecticut Department of Social Services (DSS) and its fiscal‑agent partner Gainwell Technologies operate the HUSKY Medicaid provider portal, which Hartford HealthCare uses to submit claims and view payment details. On March 4 the attacker logged in with compromised employee credentials, gaining access to billing and payment files. The intrusion remained undetected until March 25, when DSS and Gainwell noticed anomalous file downloads and launched an investigation with external cyber‑security firms and federal law enforcement.

Key Facts - Approximately 22,500 Medicaid patients had personal information exposed, including full names, Hartford HealthCare or Medicaid identification numbers, dates of service, billed amounts, and non‑Medicaid insurance policy details. - Social Security numbers and bank account data were not stored in the accessed system, so those fields were not compromised. - Investigators determined the activity was financially motivated; the hacker sought to monetize billing information rather than harvest clinical data. - The attacker’s access was terminated after the portal was secured, and the breach is considered contained.

What It Means The incident shows how stolen valid credentials can bypass perimeter defenses and allow direct interaction with trusted applications—a classic MITRE ATT&CK T1078 (Valid Accounts) technique. Because the portal processed payment data, the attacker could extract billing records that have value on underground markets for fraud or insurance scams. Organizations that rely on third‑party portals must treat employee credentials as high‑value targets and enforce controls that limit reuse and detect abuse.

Mitigations / What Defenders Should Do 1. Enforce multi‑factor authentication (MFA) for all remote and privileged access to provider portals, reducing reliance on passwords alone (CISA AA23‑001A). 2. Implement credential‑monitoring solutions that flag impossible‑travel logins, logins from unfamiliar IP ranges, or spikes in file‑download volume (MITRE ATT&CK T1078.003). 3. Apply the principle of least privilege: restrict portal accounts to only the data elements needed for their role and segment billing versus clinical data stores. 4. Enable detailed logging of portal activity and forward logs to a SIEM with alerts for bulk export of billing records (e.g., >100 records in five minutes). 5. Rotate any passwords that may have been compromised and require password changes for all Hartford HealthCare staff with portal access. 6. Conduct regular phishing simulations and credential‑reuse checks to limit the likelihood of future credential theft.

Looking ahead, watch for any follow‑up notices from DSS regarding additional security upgrades to the HUSKY portal and for potential legal actions against the threat actor if attribution emerges.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...