Wednesday, 24 December 2025
28.7 C
Singapore
23.1 C
Thailand
21.1 C
Indonesia
27.2 C
Philippines

Health records of 5.3 million people exposed due to password error

[output_post_excerpt]

A recent data breach exposed the sensitive health records of 5.3 million people in Mexico. The breach occurred when a 500GB database belonging to a Mexican healthcare company was left unprotected due to a password mistake. Cybernews, an online research organisation, uncovered the exposed database on August 26, 2024.

The database held crucial information, including names, personal identification numbers (CURP), phone numbers, and detailed descriptions of payment requests. According to Cybernews, the breach affected around 4% of Mexico’s population, making it a significant security lapse.

How the breach occurred

The breach resulted from a “misconfigured” use of a popular data visualisation tool, Kibana. The tool was left unauthenticated, meaning anyone could access the data without a password. While this wasn’t a deliberate hack by cyber criminals, it highlights how easily data can be exposed when proper security measures are not in place.

Ecaresoft, a Texas-based software provider known for cloud-based Hospital Information Systems, is the company responsible for this massive data exposure. Ecaresoft’s products, including Anytime and Cirrus, are widely used in Mexico, serving more than 30,000 doctors, 65 hospitals, and 110 outpatient care centres. Their services help manage various healthcare tasks, such as booking appointments, handling medications, and maintaining inventories.

Unfortunately, the breach also exposed additional sensitive information, including users’ ethnicities, nationalities, religions, blood types, dates of birth, and email addresses. The amount charged for healthcare services, gender details, and hospital visits were also leaked.

There is no sign of malicious intent, but risks remain

Unlike many data breaches caused by hacking groups, this incident did not result from a deliberate cyberattack. The error was purely due to poor security practices and a lack of password protection. However, the lack of malicious intent does not mean the affected individuals are safe. Their government-issued identification numbers, equivalent to the U.S. Social Security numbers, were exposed, putting them at risk of phishing scams, wire fraud, and identity theft.

Despite the seriousness of the situation, official information needs to be provided about how long the database remained online or whether affected users have been informed. Ecaresoft has yet to release formal statements, leaving millions uncertain about the consequences.

A stark reminder of password security

This incident is a stark reminder of the importance of proper password management and online security. Weak or non-existent passwords can lead to catastrophic data breaches. The case of Ecaresoft isn’t the first time a password error has led to a major data breach. One of the most notable cases was the Equifax breach in 2017, where hackers stole sensitive data after discovering that “admin” was being used as the company’s password.

Although this breach does not affect U.S. citizens, it is a clear lesson for everyone. Protecting your online data with strong, secure passwords is essential. With increasing personal and sensitive information being stored online, even a small mistake like a weak password can lead to severe consequences.

As more companies adopt cloud-based services and digital healthcare systems, the need for stringent cybersecurity measures becomes even more critical. For now, those affected by the Ecaresoft breach can only hope for a swift response from the company and the implementation of better security protocols in the future.

Editor’s note: This story has been updated with a response from Ecaresoft. Ecaresoft has clarified that the exposed server was a non-production environment containing anonymised, randomly generated test data, not real patient data. The company disputes the claim that over 5 million individuals are at risk and states that the reported exposure did not involve actual health records.

Hot this week

Zoom introduces AI Companion 3.0 with a web-based assistant and expanded task automation

Zoom launches AI Companion 3.0, adding a web-based assistant that automates tasks, drafts emails and reshapes the platform into an AI workspace.

The rise of agentic AI and what it means for enterprise leaders

Agentic AI is accelerating across Asia, pushing leaders to rethink productivity, governance, and the infrastructure needed for long-term competitiveness.

Apple explores new strategies to revive interest in the iPhone Air

Apple is reportedly planning camera and pricing changes to boost iPhone Air sales after weak demand for its ultra-slim flagship.

IATA raises concerns over potential 5G interference with aviation systems

IATA warns uneven global 5G rules could pose aviation risks, even as Singapore reports no interference with aircraft systems.

Yooka-Replaylee free demo launches on Nintendo Switch 2

Try the free Yooka-Replaylee demo on Nintendo Switch 2 and explore the reimagined adventure of Yooka and Laylee.

Square Enix releases Final Fantasy VII Remake Intergrade demo on Switch 2 and Xbox

Free demo for Final Fantasy VII Remake Intergrade launches on Switch 2 and Xbox, letting players carry progress into the full 2026 release.

AI designs a Linux computer with 843 parts in a single week

Quilter reveals a Linux computer designed by AI in one week, hinting at a future where hardware development is faster and more accessible.

Super Mario Bros inspired Hideo Kojima’s path into game development

Hideo Kojima reveals how Super Mario Bros convinced him that video games could one day surpass movies and led him into game development.

Indie Game Awards withdraws Clair Obscur honours over generative AI use

Indie Game Awards withdraws Clair Obscur’s top honours after confirming generative AI assets were used during the game’s production.

Related Articles

Popular Categories