UC San Diego Health Experiences Phishing Attack

The phishing attack may have exposed patient data.

By HFT Staff


On January 9, 2024, UC San Diego Health identified a phishing attack against its employees, which resulted in unauthorized access to two employee email accounts. Phishing occurs when an email is sent that looks like it is from a trustworthy source, but it is not. The email misleads the recipient to share or provide access to their email login information.

When UC San Diego Health discovered the event, they immediately secured the email accounts and enhanced their security controls. They also began an investigation to determine what happened, what information was involved, and to whom the information belonged. Their investigation determined the accounts were accessed for brief periods between January 9 and January 22, 2024. They conducted a detailed review and analysis of the email accounts’ contents, which was completed on or about February 26, 2024.

Related: Using a cybersecurity plan at your healthcare facility

The information involved was related to patients in their lung transplant and rheumatology departments. The information varied by individual but may have included patient names; addresses; email addresses; dates of birth; medical record numbers; health insurance information; treatment cost information; and/or clinical information, such as medications, provider name or diagnosis. For a limited number of patients, a Social Security number was also included.

UC San Diego Health’s electronic medical record systems are separate from their email accounts and were not affected by this event.

UC San Diego Health continues to enhance their security controls, as appropriate, to minimize the risk of similar incidents in the future. They also continue to provide phishing prevention training and education to their employees.

UC San Diego Health is mailing notification letters to individuals whose information may have been involved in this event and is also providing individuals whose Social Security number was involved with complimentary credit monitoring and identity theft protection services.



March 14, 2024


Topic Area: Information Technology , Security


Recent Posts

Case Study: How NYU Langone Rebuilt for Resilience After Superstorm Sandy

Although the damage was severe, it provided a valuable opportunity for NYU Langone to assess structural vulnerabilities and increase facility resilience.


Frederick Health Hospital Faces 5 Lawsuits Following Ransomware Attack

The lawsuits accuse FHH of inadequate cybersecurity, poor breach notification and failing to protect patients from identity theft risks.


Arkansas Methodist Medical Center and Baptist Memorial Health Care to Merge

They have signed a non-binding letter of intent to complete a shared mission agreement to merge the two organizations.


Ground Broken on Intermountain Saratoga Springs Multi-Specialty Clinic

The clinic is scheduled to open and start seeing patients in the fall of 2026.


Electrical Fire Tests Resilience of Massachusetts Hospital

Signature Healthcare Brockton Hospital used opportunity to renovate key systems and components and expand facility operations.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.