DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AU: Medibank’s latest update reveals more woes; My Home Hospital patient info accessed

Posted on October 27, 2022 by Dissent

AU health insurer Medibank has been diligently providing updates on a massive data breach.  With each update, they have revealed growing awareness of how much personal data has been accessed or exfiltrated. Their latest update, issued overnight, begins:

It has become clear overnight that the criminal has accessed patient information relating to My Home Hospital.

My Home Hospital is a service delivered by a joint venture between Calvary and Medibank on behalf of Wellbeing SA and the South Australian Government.

The data accessed includes personal information and some health data.

Medibank has begun directly contacting affected patients.  Any patients admitted to My Home Hospital on or after 13 October 2022 have not been affected.

While Medibank has not yet determined if the data has been illegally taken from our system, we know it has been accessed.

Medibank has not named the threat actor or group, telling DataBreaches that it cannot disclose that as that is part of the Australian Federal Police (AFP) investigation.

Medibank’s incident update page currently contains this alert at the top: “My Home Hospital patients please contact 1800 081 245.”

Related posts:

  • Health insurer Medibank enters trading halt after cyberattack, says it received communication from alleged hackers (UPDATED)
  • Medibank updates incident report; customer data also affected
  • Hackers release Australian health insurer’s customer data
Category: Health DataNon-U.S.Of Note

Post navigation

← Davenport Community Schools’ “server issues” were Karakurt issues
UK: Braverman should be given ‘second chance’ despite ‘multiple’ security breaches →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.