Usernames, passwords, and other details have been leaked online

May 28, 2013 09:07 GMT  ·  By

Anonymous hackers of the TeamBerserk group claim to have breached the systems of the Health Information Trust Alliance (HITRUST) – the alliance of healthcare, technology and information security leaders that have developed the Common Security Framework, one of the most widely adopted security frameworks in the US healthcare industry.

The hackers have published a file containing various pieces of information, including usernames, passwords, email addresses, physical addresses, and phone numbers, Cyber War News reports.

The leaked data appears to be genuine, but we’ve reached out to HITRUST in hope that they can provide more details regarding the breach.

In addition to HITRUST, the hacker collective also claims to have breached the systems of Interactive Data, a company that provides financial market data, analytics and related services to financial institutions.

Usernames and passwords, including ones belonging to administrators, appear to have been leaked from Interactive Data’s databases.

Update. HITRUST representatives have responded to our inquiry. Here is their complete statement:

“HITRUST had a non-critical, standalone public web server compromised by an SQL injection that resulted in some test data being leaked. The media article accurately claims that 111 records, including some real names, companies, addresses, phone numbers and email addresses, as well as six encrypted passwords, were taken and compromised.

The database in question was a test database that was populated with information from rosters previously made public from planning meetings held during 2008, in addition to some factitious data created by our developers.

The user names and passwords mentioned were available only in the test database. The server did not contain any personal health or other sensitive information.

We sincerely regret any inconvenience this has created and take data security very seriously. It is our mission to protect information and do so in a manner that is appropriate and practical given the risks. We had not deemed this particular web server and test data to require higher assurances.

We have updated our policies both to non-critical, non-sensitive web servers and our test environments and will secure our test environments and public general information websites to a higher assurance level. The server in question has been addressed and test information deleted. None of our other servers or data centers were involved in this event.

HITRUST does maintain its operations in compliance with the CSF and utilizes CSF Certified environments.”