DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Double whammy: BCBS of Michigan policyholders hit by two breaches in December

Posted on January 3, 2019 by Dissent

December appears to have been a rough month for Blue Cross Blue Shield of Michigan. Yesterday, I discovered that they had a second breach that was disclosed last month, although it seems to have flown under most media radar.

The first breach, fairly widely reported already, involved a laptop stolen from a subsidiary’s employee that held data on 15,000 policyholders. But that same week, one of the health insurer’s service providers was also sending out notifications to an unspecified number of policyholders. Wolverine Solutions’ notification template, reproduced below, explained that on September 23, they experienced a ransomware incident. Their investigation did not indicate that any data had been exfiltrated, but as is often the case, they couldn’t totally prove that it hadn’t been.

On November 8, 2018, we notified our client that we identified data in our systems that included demographic information, health plan contract numbers and some medical information. Some data also included Social Security numbers. We are alerting you because your data may have been affected.

You can read the full notification below. Wolverine Solutions informed those affected of some complimentary services to help them:

We have arranged for affected individuals to have AllClear ID protect their identity for 12 months at no cost. However, due to Blue Cross Blue Shield of Michigan’s policy, special arrangements have been made to offer you the same protection for 24 months. 

WolverineSolutions_BCBSMI

The University of Michigan reported that 70 of their employees who were covered by the BCBS of Michigan health plan were affected by the breach. It is not clear how many non-university policyholders were affected and this incident does not (yet) appear on HHS’s public breach tool.

UPDATE: The Wolverine incident not only affected BCBS, but also affected other entities, as this screenshot from a notification referring to 895 Molina Healthcare patients indicates:

Notification from Equian concerning Wolverine Solutions ransomware incident.


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
Category: Health DataMalwareU.S.

Post navigation

← Ransomware, phishing attacks top new HHS list of cyberthreats in healthcare
Exclusive: National Life Group denies claim by thedarkoverlord that they were hacked; independent insurance agency appears to be the actual victim →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.