DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Florida Healthy Kids notified by Maximus of MOVEit breach

Posted on August 12, 2023 by Dissent

Florida Healthy Kids is a state-created entity that provides health and dental insurance for Florida children aged 5-18. On Friday, they joined the unhappy ranks of those affected by the MOVEit breach that has affected more than 600 organizations already. In this case, it was their vendor, Maximus, who issued the notification.

The number of children and families affected was not disclosed, and the incident is not yet up on HHS’s public breach tool. The notification indicates that the types of information affected includes: name, address, date of birth, phone number, email
address, Social Security number, other government-issued identifier, health benefits and enrollment information, health insurance policy number or subscriber number; medical history, condition, treatment, or diagnosis, health insurance application or claims information, tribal identification or enrollment number, and Family Account Number.

Maximus is offering those affected two years of credit monitoring, identity restoration, and fraud detection services.

Florida Healthy Kids is no stranger to vendor breaches

In January 2021, Florida Healthy Kids revealed a multi-year breach at a vendor, Jelly Bean Communications. The breach reportedly affected 3.5 million members of the insurance provider. The breach investigation discovered that the vendor had failed to patch vulnerabilities for seven years and had been hacked. In March 2023, the Department of Justice announced that Jelly Bean agreed to pay almost $300,000 to settle False Claim Act charges stemming from their representations to provide secure hosting compliant with HIPAA when they had failed to patch for seven years.

In May of this year, shortly before learning of the MOVEit incident, Florida Healthy Kids was notified by yet another vendor, MCNA Dental, that they had been the victim of a cyberattack. That incident was reported to HHS by MCNA Dental as affecting 8.9 million members. It showed up on two different threat actors’ leak sites where data has since been leaked after MCNA Dental presumably refused to pay ransom demands.

 


Related:

  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: HackHealth DataSubcontractorU.S.

Post navigation

← CISA: Review Of The Attacks Associated with Lapsus$ And Related Threat Groups Report
Cumbria Police admits huge data breach as names and salaries of staff published online →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.