Georgia-Based Firm NASCO Reports Major Health Data Hack Involving Progress Software’s MOVEit Software

In a significant cybersecurity incident, NASCO, a Georgia-based firm providing administrative services for health plans, has reported a major health data hack involving their use of Progress Software’s MOVEit file transfer software. The breach, which occurred about six months ago, is said to have impacted a significant number of individuals, including thousands of residents in Maine.

Scope of the Hack: Thousands Impacted

According to NASCO, nearly 805,000 individuals were affected by the hack, with 2,840 of them being residents of Maine. This staggering number highlights the severity and potential implications of the breach.

Incident Description: Acquiring Data from MOVEit software

On May 30th, NASCO experienced a data security breach in which a threat actor successfully acquired data from their MOVEit software. The firm acted swiftly by securing its systems, launching an investigation with a reputable cybersecurity firm, and promptly notifying law enforcement authorities.

Compromised Data: Personal Information at Risk

As a result of the breach, the personal information of health plan members was compromised. This included sensitive details such as names, Social Security numbers, and various identifiers. The exposure of this information can have severe consequences for the affected individuals, potentially leading to identity theft and other fraudulent activities.

Immediate Response and Actions Taken

Upon discovering the breach, NASCO took immediate action to mitigate the damage. The affected MOVEit server has been decommissioned, making it inaccessible from the internet. Furthermore, the company made the decision to discontinue its use of MOVEit, ensuring that similar incidents do not occur in the future. Simultaneously, NASCO engaged a cybersecurity firm to conduct a thorough investigation, helping to identify the vulnerabilities that allowed the breach to take place. Law enforcement was also notified to aid in the investigation and potential prosecution of the perpetrators.

Support for affected individuals

Understanding the potential distress and stress caused by the breach, NASCO has gone above and beyond to support the affected individuals. The firm has implemented additional security procedures to strengthen its IT system environments, reducing the likelihood of future breaches. In an effort to minimize the impact on the affected individuals, NASCO is providing 24 months of complimentary identity and credit monitoring services. This goes a long way in helping them detect and address any suspicious activities related to their compromised data.

Ongoing issue with MOVEit hacks

Unfortunately, NASCO is not the first company to fall victim to a MOVEit hack. The firm now joins a growing list of organizations, including third-party vendors serving the healthcare sector, that have experienced similar incidents. The recurring nature of these hacks highlights the urgent need for robust security measures and heightened vigilance within the healthcare industry.

Recent MOVEit Incidents: An Alarming Trend

In recent times, there have been notable instances of MOVEit breaches. Radius Global Solutions reported a hack affecting nearly 136,000 individuals, whereas Arietis Health dealt with a breach impacting 55 medical providers and nearly two million individuals. These incidents have collectively affected millions of individuals worldwide, with the largest reported hack involving the U.S. government contractor Maximus, which impacted a staggering 11 million individuals.

The health data hack involving NASCO and Progress Software’s MOVEit software serves as a reminder of the ever-present cybersecurity threats faced by organizations, particularly those in the healthcare sector. As the number of incidents continues to rise, it is imperative that companies remain proactive in implementing robust security measures and promptly address any vulnerabilities. Additionally, governments and industry stakeholders must collaborate to establish more rigorous regulations and standards to safeguard sensitive personal information, thereby mitigating the risk of large-scale data breaches.

Explore more

Trend Analysis: Agentic Commerce Protocols

The clicking of a mouse and the scrolling through endless product grids are rapidly becoming relics of a bygone era as autonomous software entities begin to manage the entirety of the consumer purchasing journey. For nearly three decades, the digital storefront functioned as a static visual interface designed for human eyes, requiring manual navigation, search, and evaluation. However, the current

Trend Analysis: E-commerce Purchase Consolidation

The Evolution of the Digital Shopping Cart The days when consumers would reflexively click “buy now” for a single tube of toothpaste or a solitary charging cable have largely vanished in favor of a more calculated, strategic approach to the digital checkout experience. This fundamental shift marks the end of the hyper-impulsive era and the beginning of the “consolidated cart.”

UAE Crypto Payment Gateways – Review

The rapid metamorphosis of the United Arab Emirates from a desert trade hub into a global epicenter for programmable finance has fundamentally altered how value moves across the digital landscape. This shift is not merely a superficial update to checkout pages but a profound structural migration where blockchain-based settlements are replacing the aging architecture of correspondent banking. As Dubai and

Exsion365 Financial Reporting – Review

The efficiency of a modern finance department is often measured by the distance between a raw data entry and a strategic board-level decision. While Microsoft Dynamics 365 Business Central provides a robust foundation for enterprise resource planning, many organizations still struggle with the “last mile” of reporting, where data must be extracted, cleaned, and reformatted before it yields any value.

Clone Commander Automates Secure Dynamics 365 Cloning

The enterprise landscape currently faces a significant bottleneck when IT departments attempt to replicate complex Microsoft Dynamics 365 environments for testing or development purposes. Traditionally, this process has been marred by manual scripts and human error, leading to extended periods of downtime that can stretch over several days. Such inefficiencies not only stall mission-critical projects but also introduce substantial security