Georgia-Based Firm NASCO Reports Major Health Data Hack Involving Progress Software’s MOVEit Software

In a significant cybersecurity incident, NASCO, a Georgia-based firm providing administrative services for health plans, has reported a major health data hack involving their use of Progress Software’s MOVEit file transfer software. The breach, which occurred about six months ago, is said to have impacted a significant number of individuals, including thousands of residents in Maine.

Scope of the Hack: Thousands Impacted

According to NASCO, nearly 805,000 individuals were affected by the hack, with 2,840 of them being residents of Maine. This staggering number highlights the severity and potential implications of the breach.

Incident Description: Acquiring Data from MOVEit software

On May 30th, NASCO experienced a data security breach in which a threat actor successfully acquired data from their MOVEit software. The firm acted swiftly by securing its systems, launching an investigation with a reputable cybersecurity firm, and promptly notifying law enforcement authorities.

Compromised Data: Personal Information at Risk

As a result of the breach, the personal information of health plan members was compromised. This included sensitive details such as names, Social Security numbers, and various identifiers. The exposure of this information can have severe consequences for the affected individuals, potentially leading to identity theft and other fraudulent activities.

Immediate Response and Actions Taken

Upon discovering the breach, NASCO took immediate action to mitigate the damage. The affected MOVEit server has been decommissioned, making it inaccessible from the internet. Furthermore, the company made the decision to discontinue its use of MOVEit, ensuring that similar incidents do not occur in the future. Simultaneously, NASCO engaged a cybersecurity firm to conduct a thorough investigation, helping to identify the vulnerabilities that allowed the breach to take place. Law enforcement was also notified to aid in the investigation and potential prosecution of the perpetrators.

Support for affected individuals

Understanding the potential distress and stress caused by the breach, NASCO has gone above and beyond to support the affected individuals. The firm has implemented additional security procedures to strengthen its IT system environments, reducing the likelihood of future breaches. In an effort to minimize the impact on the affected individuals, NASCO is providing 24 months of complimentary identity and credit monitoring services. This goes a long way in helping them detect and address any suspicious activities related to their compromised data.

Ongoing issue with MOVEit hacks

Unfortunately, NASCO is not the first company to fall victim to a MOVEit hack. The firm now joins a growing list of organizations, including third-party vendors serving the healthcare sector, that have experienced similar incidents. The recurring nature of these hacks highlights the urgent need for robust security measures and heightened vigilance within the healthcare industry.

Recent MOVEit Incidents: An Alarming Trend

In recent times, there have been notable instances of MOVEit breaches. Radius Global Solutions reported a hack affecting nearly 136,000 individuals, whereas Arietis Health dealt with a breach impacting 55 medical providers and nearly two million individuals. These incidents have collectively affected millions of individuals worldwide, with the largest reported hack involving the U.S. government contractor Maximus, which impacted a staggering 11 million individuals.

The health data hack involving NASCO and Progress Software’s MOVEit software serves as a reminder of the ever-present cybersecurity threats faced by organizations, particularly those in the healthcare sector. As the number of incidents continues to rise, it is imperative that companies remain proactive in implementing robust security measures and promptly address any vulnerabilities. Additionally, governments and industry stakeholders must collaborate to establish more rigorous regulations and standards to safeguard sensitive personal information, thereby mitigating the risk of large-scale data breaches.

Explore more

How Is AI Transforming Real-Time Marketing Strategy?

Marketing executives today are navigating an environment where consumer intentions transform at the speed of light, making the once-revered quarterly planning cycle appear like a relic from a slower, analog century. The traditional marketing roadmap, once etched in stone months in advance, has been rendered obsolete by a digital environment that moves faster than human planners can iterate. In an

What Is the Future of DevOps on AWS in 2026?

The high-stakes adrenaline rush of a manual midnight hotfix has officially transitioned from a badge of engineering honor to a glaring indicator of organizational systemic failure. In the current cloud landscape, elite engineering teams no longer view frantic, hand-typed commands as heroic; instead, they see them as a breakdown of the automated sanctity that governs modern infrastructure. The Amazon Web

How Is AI Reshaping Modern DevOps and DevSecOps?

The software engineering landscape has reached a pivotal juncture where the integration of artificial intelligence is no longer an optional luxury but a core operational requirement. Recent industry projections suggest that between 2026 and 2028, the percentage of enterprise software engineers utilizing AI code assistants will continue its rapid ascent toward seventy-five percent. This momentum indicates a fundamental departure from

Which Agencies Lead Global Enterprise Content Marketing?

The modern corporate landscape has effectively abandoned the notion that digital marketing is a series of independent creative bursts, replacing it with the requirement for a relentless, industrialized engine of communication. Large organizations now face the daunting task of maintaining a singular brand voice across dozens of territories, languages, and product categories, all while navigating increasingly complex buyer journeys. This

The 6G Readiness Checklist and the Future of Mobile Development

Mobile engineering stands at a historical crossroads where the boundary between physical sensation and digital transmission finally begins to dissolve into a single, unified reality. The transition from 4G to 5G was largely celebrated as a revolution in raw throughput, yet for many end users, the experience remained a series of modest improvements in video resolution and download speeds. In