• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cvs health data breach leaves a billion records exposed

CVS Health data breach leaves a billion records exposed

You are here: Home / General Cyber Security News / CVS Health data breach leaves a billion records exposed
June 16, 2021

A misconfiguration in a CVS Health cloud databases still left above a billion data exposed, in accordance to an investigation by WebsitePlanet in cooperation with security researcher Jeremiah Fowler. 

The about 240GB databases was not password protected, meaning anyone who understood where by to look could obtain the information held within.

A full of 1,148,327,940 information belonging to the US well being care and pharmaceutical behemoth, which owns CVS Pharmacy and Aetna, were being located. The database contained generation records that exposed Visitor ID, Session ID, and machine details (i.e., iPhone, Android, iPad, and many others.). 

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Worryingly, the data files also gave threat actors a very clear comprehending of configuration settings, where by info is stored, and a blueprint of how the logging service operates from the backend.

Scientists also found various records of visitors’ lookup histories, which include drugs, COVID-19 vaccines, and other CVS goods.

“Hypothetically, it could have been possible to match the Session ID with what they searched for or extra to the searching cart for the duration of that session and then test to discover the purchaser working with the uncovered emails,” scientists reported.

The investigation also carried out a sampling research question that disclosed e-mail hackers could concentrate on in a phishing attack or likely use to cross-reference other steps.

Just after identifying the unprotected database on March 21, the researchers immediately despatched a responsible disclosure discover to CVS Health and fitness. The firm limited community accessibility the same day.

In a statement, CVS Wellbeing stated, “We had been able to access out to our vendor and they took rapid motion to clear away the databases. Defending the personal information and facts of our consumers and our company is a large priority, and it is essential to notice that the databases did not contain any own facts of our shoppers, members or individuals.”

Paul Norris, a senior units engineer at Tripwire, instructed ITPro that misconfigurations like these are starting to be all way too popular. 

“Exposing sensitive information doesn’t involve a subtle vulnerability, and the fast progress of cloud-based mostly info storage has uncovered weaknesses in procedures that depart facts offered to anybody. A misconfigured databases on an internal network may not be discovered, and if observed may well not go community, but the stakes are bigger when your info storage is instantly connected to the Internet,” he explained.

“Organizations really should determine procedures for securely configuring all methods, together with cloud-primarily based storage, like Elasticsearch and Amazon S3. When a method is in put, the units have to be monitored for alterations to their configurations. These are solvable problems, and tools exist nowadays to aid.”


Some pieces of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News US Convicts Russian Malware-masker
Next Post: Health care ransomware attacks: Oklahoma health system driven to EHR downtime health care ransomware attacks: oklahoma health system driven to ehr»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.