Tuesday, 16 September 2025
27.3 C
Singapore
26.9 C
Thailand
19 C
Indonesia
27.1 C
Philippines

Health records of 5.3 million people exposed due to password error

5.3 million health records were exposed due to a password error, putting millions at risk of fraud and scams due to weak cybersecurity practices.

A recent data breach exposed the sensitive health records of 5.3 million people in Mexico. The breach occurred when a 500GB database belonging to a Mexican healthcare company was left unprotected due to a password mistake. Cybernews, an online research organisation, uncovered the exposed database on August 26, 2024.

The database held crucial information, including names, personal identification numbers (CURP), phone numbers, and detailed descriptions of payment requests. According to Cybernews, the breach affected around 4% of Mexico’s population, making it a significant security lapse.

How the breach occurred

The breach resulted from a “misconfigured” use of a popular data visualisation tool, Kibana. The tool was left unauthenticated, meaning anyone could access the data without a password. While this wasn’t a deliberate hack by cyber criminals, it highlights how easily data can be exposed when proper security measures are not in place.

Ecaresoft, a Texas-based software provider known for cloud-based Hospital Information Systems, is the company responsible for this massive data exposure. Ecaresoft’s products, including Anytime and Cirrus, are widely used in Mexico, serving more than 30,000 doctors, 65 hospitals, and 110 outpatient care centres. Their services help manage various healthcare tasks, such as booking appointments, handling medications, and maintaining inventories.

Unfortunately, the breach also exposed additional sensitive information, including users’ ethnicities, nationalities, religions, blood types, dates of birth, and email addresses. The amount charged for healthcare services, gender details, and hospital visits were also leaked.

There is no sign of malicious intent, but risks remain

Unlike many data breaches caused by hacking groups, this incident did not result from a deliberate cyberattack. The error was purely due to poor security practices and a lack of password protection. However, the lack of malicious intent does not mean the affected individuals are safe. Their government-issued identification numbers, equivalent to the U.S. Social Security numbers, were exposed, putting them at risk of phishing scams, wire fraud, and identity theft.

Despite the seriousness of the situation, official information needs to be provided about how long the database remained online or whether affected users have been informed. Ecaresoft has yet to release formal statements, leaving millions uncertain about the consequences.

A stark reminder of password security

This incident is a stark reminder of the importance of proper password management and online security. Weak or non-existent passwords can lead to catastrophic data breaches. The case of Ecaresoft isn’t the first time a password error has led to a major data breach. One of the most notable cases was the Equifax breach in 2017, where hackers stole sensitive data after discovering that “admin” was being used as the company’s password.

Although this breach does not affect U.S. citizens, it is a clear lesson for everyone. Protecting your online data with strong, secure passwords is essential. With increasing personal and sensitive information being stored online, even a small mistake like a weak password can lead to severe consequences.

As more companies adopt cloud-based services and digital healthcare systems, the need for stringent cybersecurity measures becomes even more critical. For now, those affected by the Ecaresoft breach can only hope for a swift response from the company and the implementation of better security protocols in the future.

Editor’s note: This story has been updated with a response from Ecaresoft. Ecaresoft has clarified that the exposed server was a non-production environment containing anonymised, randomly generated test data, not real patient data. The company disputes the claim that over 5 million individuals are at risk and states that the reported exposure did not involve actual health records.

Hot this week

iOS 26 introduces icon tinting to match iPhone cases

iOS 26 introduces a new icon tinting feature that matches iPhone Home Screen icons to MagSafe cases or the device itself.

Google pauses Pixel 10 Daily Hub to improve performance

Google has paused the Pixel 10’s Daily Hub feature to improve performance, promising a refined version will return in the future.

NVIDIA Blackwell Ultra sets new benchmark in MLPerf inference tests

NVIDIA’s Blackwell Ultra architecture sets new records in MLPerf Inference v5.1, boosting AI performance and reducing costs for enterprises.

Bandai Namco launches Dragon Ball Gekishin Squadra with Google Cloud

Bandai Namco launches Dragon Ball Gekishin Squadra, a cross-platform team action game built on Google Cloud’s global infrastructure.

Apple introduces MagSafe charger with Qi2 25W in Singapore

Apple launches MagSafe charger with Qi2 25W and a 40W Dynamic Power Adapter in Singapore, offering faster wireless and fast charging.

Biwin unveils Mini SSD, a tiny storage device that could replace microSD cards

Biwin launches Mini SSD, a tiny yet powerful storage device that could replace microSD cards if industry standards are adopted.

Apple brings major upgrades to Powerbeats Pro 2 with iOS 26

Apple adds heart rate, fitness, and smart usability upgrades to Powerbeats Pro 2 with iOS 26, launching on 15 September.

UltraGreen.ai secures US$188 million anchor investment at US$1.3 billion valuation

UltraGreen.ai secures US$188 million anchor investment led by 65EP, Vitruvian, and August, valuing the firm at US$1.3 billion.

ConnectingDNA launches AI-powered DNA wellness marketplace in Singapore

ConnectingDNA launches the world’s first AI-powered DNA wellness marketplace in Singapore, offering personalised health insights and secure data protection.

Related Articles

Popular Categories