Ayush Jharkhand portal breached, 3.2L patients’ records exposed: Security researchers

1

According to the cybersecurity company CloudSEK, the website’s database, amounting to 7.3 MB, holds patient records that include personally identifiable information (PII) and medical diagnoses. The compromised data also contains sensitive information about doctors, including their PII, login credentials, usernames, passwords, and phone numbers.

The data breach was initiated by a threat actor named “Tanaka”.

The Ayush website is a critical resource providing information about Ayurveda, Yoga, Naturopathy, Unani, Siddha, and Homoeopathy treatments.

“The link between the compromised data and Ayush Jharkhand’s website was established by cross-referencing chatbot and blog post data shared by the threat actor with publicly accessible data on the website,” the researchers said.

According to the report, the data breach exposed about 500 login credentials (some in cleartext), contact information of 737 individuals who utilized the “Contact Us” form, 472 records containing PII details of doctors, PII data of 91 doctors, along with the information about where they were posted.

Moreover, the researchers said that the data breach poses significant risks, potentially leading to — account takeovers due to leaked data, brute force attacks exploiting common or weak passwords, and heightened susceptibility to sophisticated phishing attacks.

To address this critical breach, the cybersecurity experts recommended several mitigation strategies such as the implementation of a robust password policy, activation of multi-factor authentication (MFA) across all logins, prompt patching of vulnerable and exploitable endpoints, prohibition of sharing unencrypted secrets on messaging platforms like Slack or WhatsApp, and others.

–IANS

shs/dan

Disclaimer
The opinions expressed within this article are the personal opinions of the author. They do not reflect the views of the website and this website does not assume any responsibility or liability for the same.