DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Medical billing firm exposes unencrypted protected health information

Posted on July 3, 2017 by Dissent

Last month, DataBreaches.net was contacted by Kromtech Security’s research team and asked to assist it in alerting a medical billing firm that they were exposing patients’ personal and protected health information on their backup server. On June 12, DataBreaches.net sent iMax Medical Billing in Ohio a message and left them a voice mail, alerting them to check for email from Kromtech about security concerns. Kromtech later informed this site that the firm appeared to have secured the data promptly.

Not only did iMax secure the data promptly, as we would later learn, their incident response was also blisteringly fast and appears to be suitably comprehensive.  But more on that later in this report.

As it has done in the past, Kromtech Security provided this site with some files from the exposed server that would demonstrate the types of information that were at risk.  You can read Kromtech’s report on the incident on their site.  As is this site’s policy, DataBreaches.net will not post any unredacted PII or PHI. For now, we will just post one redacted image from one of the approximately two dozen clients’ exposed files.  The file contained approximately 1,600 patients’ names, addresses, phone numbers, date of birth, insurance policy number and carrier, and payment guarantor information. Other files that we saw from other clients contained more specific medical information about diagnoses and treatment. And yet other files contained login credentials for insurer submissions.

One of the exposed files contained approximately 1,600 patients’ names, addresses, phone numbers, date of birth, insurance policy number and carrier, and payment guarantor information. This small snippet was redacted by DataBreaches.net from a file provided by Kromtech Security.

iMax’s Response

DataBreaches.net received a response from iMax this morning. In their statement, Brian Dean writes:

I do not see the same vulnerability that was reported to  you initially, which tells me that the IT team has corrected any open web access from any Buffalo devices. We have contacted clients and made them aware of the situation and that we are finishing up the security of their information. I am not aware of any patient data that has been  compromised. If you are aware of patient data please provide evidence so that I can follow-up with those individuals specifically.

DataBreaches.net has since provided iMax with some information on patient data, but of course, since this site does not have all of the files that had been unintentionally exposed, DataBreaches.net cannot give  iMax a comprehensive list of whom they might need to notify. Their access logs should give them the answer to that question, I would hope.

In response to a follow-up inquiry about the clear-text insurer logins that DataBreaches.net had seen in exposed files, Dean also reported that most of the logins had already been reset, and “There are only a handful of logins that we are waiting on the payer to reset or unfreeze after we verify.”

Because iMax responded promptly to the initial alert, and states that it is notifying clients and appears to be diligently working to notify all those who might need to be notified and to secure its files, DataBreaches.net is not naming any of their clients at this time.  This post may be updated as more information becomes available, but for now, perhaps this incident best serves as another reminder for entities using Rsync backup to check their configuration. IMax Billing appears to be doing a truly admirable job of incident response, but I bet they join us in wishing it had never been needed.

Category: ExposureHealth DataSubcontractorU.S.

Post navigation

← The AA Exposed Emails, Credit Card Data, and Didn’t Inform Customers
Schools face hefty fines for data breaches under new EU laws →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.