Breach Notification , Data Breach , Data Loss

Misconfiguration Leads to Major Health Data Breach

UW Medicine Notifying Nearly 1 Million Patients of Data Exposure
Misconfiguration Leads to Major Health Data Breach

A misconfigured database at UW Medicine in Washington state that left patient data exposed on the internet for several weeks resulted in a breach affecting 974,000 individuals.

See Also: Webinar | Passwords: Here Today, Gone Tomorrow? Be Careful What You Wish For.

UW Medicine says in a statement that on Dec. 26, 2018, it became aware of a vulnerability on a website server that made protected internal files available and visible by search on the internet on Dec. 4, 2018.

The mistake was discovered by a patient who was conducting a Google search for their own name and found a file containing their information. The patient reported this to UW Medicine, a Seattle, Washington-based academic medical system that includes several hospitals and a large physician practice plan.

UW Medicine is just the latest healthcare organization to report a breach involving misconfigured IT. Similar mishaps have been reported by many others, including breaches that have resulted in enforcement actions by federal and state regulators.

To help avoid incidents involving misconfigured IT, organizations should add a step to their change management processes - check af list of key security attributes to ensure they're still intact after a change is completed, says Keith Fricke, principle consultant at tw-Security. "Such a practice may even uncover that security controls were missing before the change," he notes.

Coding Error

The misconfigured database at UW Medicine was the result of a coding error when data was being moved onto a new server, a UW Medicine spokeswoman tells Information Security Media Group.

The organization is not offering free credit or ID monitoring services because the exposed files contained no Social Security numbers, patient financial information or medical records, the spokeswoman says.

The files contained protected health information that UW Medicine is legally required to track to, for example, comply with Washington state reporting requirements, the statement says. The exposed information included patients' names, medical record numbers, and a description and purpose of the information shared for regulatory reporting purposes.

"The database is used to keep track of the times UW Medicine shares patient health information that meets certain legal criteria," the statement says. The most common reasons involve situations where UW Medicine is required by Washington state law to share patient information with public health authorities, law enforcement and Child Protective Services, the organization notes.

"Another common example is when a researcher receives approval to access medical records to determine whether a patient may be eligible for a research study or to recruit participants. The researcher must document in the database when they access the medical record," the statement adds.

"When we learned of the exposure of the files to the internet, we took immediate steps to remove the information from the site and initiated appropriate measures to remove saved information from any third-party sites," UW Medicine says in the statement. "At this time, there is no evidence that there has been any misuse or attempted use of the information exposed in this incident."

UW Medicine notes that because Google had saved some of the files before Dec. 26, 2018, the institution worked with Google to remove the saved versions and prevent them from showing up in search results. All saved files were completely removed from Google's servers by Jan. 10, 2019, UW Medicine notes.

Federal Tally

Although UW Medicine notes that the incident has been reported to the Department of Health and Human Services, the breach has not yet been posted on the HHS Office for Civil Rights HIPAA Breach Reporting Tool website, which lists health data breaches affecting 500 or more individuals.

Once regulators confirm the details and add the incident to the website, it could be the largest health data breach reported so far in 2019.

Common Problem

Misconfigured databases, servers and other IT are a fairly common culprit in health data security incidents.

Some breaches involving misconfigurations have also resulted in hefty HIPAA settlements with OCR. For example, earlier this month, OCR slapped Cottage Health, which runs several California-based hospitals, with a $3 million settlement for two breaches involving misconfigured IT that impacted a total of 62,500 individuals.

Two breaches involving misconfigurations have cost Cottage Health $5 million in regulatory settlements.

One of those Cottage Health breaches, which impacted more than 5,000 individuals, occurred when a server was misconfigured following an IT response to a troubleshooting ticket, exposing unsecured electronic PHI on the internet.

Among OCR's findings during its investigation into the Cottage Health breaches, the agency says the entity failed to perform periodic technical and nontechnical evaluations in response to environmental or operational changes affecting the security of ePHI.

Besides the enforcement action by OCR, Cottage Health in 2017 reached a $2 million settlement with the California attorney general's office for the same two breaches Health Data Breaches Lead to $2 Million California Penalty).

In another incident reported last October, a coding error in a portal of the Employee Retirement System of Texas, which administers retirement benefits, including health insurance, for state workers, inadvertently allowed some users to view the information of others, potentially exposing information on nearly 1.25 million of its members.

Avoiding Mishaps

Misconfiguration incidents often occur because a change or an upgrade is only tested for user functionality, and security is not tested, notes Tom Walsh, president of tw-Security.

"Information security needs to be integrated into all phases of the change control and configuration management, including request, review, approval and implementation. This is to ensure that changes to the application or system do not introduce any additional vulnerabilities," he says.

"Regardless who is handling the change - vendor, internal IT staff, web master/developer, etc. - information security and privacy need to be involved."

No Simple Answer

Unfortunately, there is no simple way to completely prevent misconfiguration mishaps, such as the one at UW Medicine, says Mark Johnson of the consultancy LBMC Information Security.

"It highlights that the basics of configuration management, involving cybersecurity in that process, vetting and reviewing each change, and validating that the change was done correctly might have prevented this instance," he says.

"However, no technology or process will 100 percent prevent human error. These steps will reduce the likelihood of it - but not eliminate it. "

Some industry researchers predict that 80 percent of cloud data breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, rather than cloud provider vulnerabilities, by 2020, Johnson says.

"Therefore, I believe it [misconfiguration] will become more common still due the complexity of the healthcare technical environment and the push to give patients greater access and accounting of their protected health information," he says.


About the Author

Marianne Kolbasuk McGee

Marianne Kolbasuk McGee

Executive Editor, HealthcareInfoSecurity

McGee is executive editor of Information Security Media Group's HealthcareInfoSecurity.com media site. She has about 30 years of IT journalism experience, with a focus on healthcare information technology issues for more than 15 years. Before joining ISMG in 2012, she was a reporter at InformationWeek magazine and news site, and played a lead role in the launch of InformationWeek's healthcare IT media site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.