DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Attorney General Says Health Net Security Breach Concerns Worsen After Report Reveals Breach Was Likely Theft

Posted on December 8, 2009 by Dissent

The Connecticut Attorney General, Richard Blumenthal, has issued a statement about his intensified concerns about the Health Net breach:

Attorney General Richard Blumenthal said he is deeply troubled by an investigative report on the Health Net security breach that acknowledges a missing disk drive containing private financial and health information on hundreds of thousands of citizens was likely stolen.

Blumenthal is seeking more details from Health Net about its massive security breach, as well as details about two laptops that were also apparently stolen from Health Net’s Shelton office.

Blumenthal is also requesting federal criminal authorities to investigate this potential theft, which could have national ramifications.

“An independent investigative report shreds Health Net’s sanitized story — revealing that this severe security breach was most likely a theft, and that two laptops were also stolen from Health Net’s facility at virtually the same time,” Blumenthal said. “This report dramatizes Health Net’s unconscionable delay in notifying law enforcement and its customers about this breach.

“These alarming revelations require immediate investigation by federal criminal authorities as well as intensified state efforts. This unprecedented breach is a privacy breach perfect storm demanding heightened scrutiny because it involves sensitive financial and health information on thousands of Health Net consumers.

“Health Net’s account of this breach raises more questions than it answers — still failing to explain a six-month delay in identifying and notifying individuals whose private information was compromised.”

The likelihood that the drive was stolen should have raised alarms that sensitive information could be exploited for criminal purposes, and prompted a rapid response and timely disclosures both to affected members and law enforcement.

In a second letter to Health Net officials, Blumenthal said there are significant inconsistencies between Health Net’s response to his office and an independent report by Kroll, a security company Health Net hired to assess the loss of the missing disk drive. Blumenthal has asked Health Net for more details and requested a meeting.

“Health Net’s assessment of the cause of the drive’s disappearance is heavily at odds with conclusions reached by Kroll,” Blumenthal said. “The most glaring inconsistencies are Health Net’s explanations for its delay in reporting the data breach, its characterization of the likely cause of that data breach, and its assessment of the accessibility level of the data that was contained on the missing disk drive.

“Health Net has emphasized its inability to promptly access data on the disk to indentify and notify those whose information was compromised, and offered assurances that the data could not be viewed without special software. These claims contradict Health Net’s own private security firm, which claims the data could be easily accessed through common commercially available software — and indicating another Health Net office in Rancho Cordova may have had a copy of the compromised information on hand to identify.

“Health Net has gone out of its way to dismiss and downplay this serious security breach when it should have been focusing on notifying and protecting people who may be at risk of financial fraud or having health information leaked.”

Blumenthal has requested a meeting with Health Net staff and is seeking additional details, including:

  • Why did Health net fail to assess the information contained on the missing drive by communicating with its Rancho Cordova office and assessing the information it had successfully copied from the drive onto its EXP server?
  • Why was there an eight-day delay in notifying the Health Net Privacy Officer after the drive was discovered to be missing?
  • Were the IBM and other technical consultants retained under a “business associate” agreement as the term is defined under HIPAA?
  • Was any protected health or financial information contained on the stolen laptops?
  • How many separate Connecticut individuals’ protected health information was on the missing drive?

Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • NY: Gloversville hit by ransomware attack, paid ransom
  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
Category: Health DataOf NoteU.S.

Post navigation

← Gonzalez to plead guilty in NJ
Class Action Lawsuit Alleges Palm Pre/Pixi Users Suffered from Data Loss →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.