DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Centers for Medicare and Medicaid notifying 645,000 Medicare members about MOVEit breach (UPDATED)

Posted on July 28, 2023 by Dissent

Update: This incident was reported to HHS as affecting 1,362,470 patients.

The Centers for Medicare and Medicaid (CMS) has posted a notice on its site about a data breach at one of its contractors, Maximus Federal Services, Inc. Maximus was one of hundreds of victims of a 0day attack on MOVEit file transfer software by the Clop ransomware gang.

Maximus detected unusual activity on May 30 and reported the incident to CMS on June 2. CMS estimates that approximately 645,000 Medicare numbers had their information caught up in the attack.

The types of personal and protected health information that may have been acquired by the threat actors included:

  • Name
  • Social Security Number or Individual Taxpayer Identification Number
  • Date of Birth
  • Mailing Address
  • Telephone Number, Fax Number, and Email Address
  • Medicare Beneficiary Identifier (MBI) or Health Insurance Claim Number (HICN)
  • Driver’s License Number and State Identification Number
  • Medical History/Notes (including medical record/account numbers, conditions,
    diagnoses, dates of service, images, treatments, etc.)
  • Healthcare Provider and Prescription Information
  • Health Insurance Claims and Policy/Subscriber Information
  • Health Benefits & Enrollment Information

Those whose Medicare number was involved will be issued new Medicare numbers by CMS. Maximus is also offering 2 years of credit protection monitoring and other services to those who were affected.

CMS’s notice states:

At this time, CMS is not aware of any reports of identity fraud or improper use of information of people with Medicare as a direct result of this incident. However, you may want to take the following actions:

  • Contact the Experian dedicated and confidential toll-free response line at (833) 919-4749 if you have any questions. This response line is staffed with professionals familiar with this incident and the credit monitoring products available. The response line is available Monday through Friday from 8 am – 10 pm Central, or Saturday and Sunday from 10 am – 7 pm Central (excluding major U.S. holidays).
  • If you believe that your Medicare Number may have been impacted, you can get more information and ask if your Number can be changed by calling 1-800-MEDICARE (1-800- 633-4227).

As reported on this site earlier today, Maximus estimates that 8-11 million people have been affected by the attack on them. Maximus had been listed on Clop’s site but without any data. Sometime between yesterday and earlier this morning, the listing was removed.

Thanks to Brett Callow for alerting us to this notice.

Related:

  • CMS Notifies Additional Individuals Potentially…
  • The Fortra/GoAnywhere breach also affected…
  • The Fortra/GoAnywhere breach also affected…
  • Health data of more than 8 million people accessed…
  • The Ransomware Superhero of Normal, Illinois
Category: Government SectorHackHealth DataOf NoteSubcontractorU.S.

Post navigation

← SSNDOB Marketplace Admin Pleads Guilty To Charges Related To His Operation Of A Series Of Websites
Smartphone Vulnerability That Could Expose User Location to Hackers Found by Researchers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Liberty Township in Ohio has recovered its network after a ransomware attack
  • Marquette County Medical Care Facility discloses data breach
  • Industry Letter – June 23, 2025: Impact to Financial Sector of Ongoing Global Conflicts
  • MNGI Digestive Health settles class action lawsuit stemming from BlackCat attack
  • Four REvil ransomware members released after time served on carding charges
  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit
  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How Internet of Things devices affect your privacy – even when they’re not yours
  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.