Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy

Did Patient Health Information Leak Into GitHub's Arctic Code Vault? (healthitsecurity.com) 25

HealthITSecurity writes: The patient data from multiple providers appears to have been captured and subsequently leaked on the data repository GitHub Arctic Code Vault by third-party vendor MedData, according to a new collaborative report from security researcher Jelle Ursem and Dissent Doe of DataBreaches.net.

Through his research, Ursem detected troves of protected health information tied to a single developer... The databases were taken down on December 17. MedData recently released a notice that detailed the massive patient data breach, which involved information provided to the vendor for processing services... Officials discovered that an employee had saved files to personal folders created on the GitHub repository between December 2018 and September 2019, during their employment...

The impacted data included patient names combined with one or more data elements, such as subscriber ID,Social Security numbers, diagnoses, conditions, claims data, dates of services, medical procedure codes, insurance policy numbers, provider names, contact details, and dates of birth. All affected patients will receive free credit monitoring and identity protection services... This is the second report from Ursem and Dissent on GitHub repositories leaking patient data in the last six months. In August, they reported that at least nine GitHub repositories leveraging improper access controls leaked data from more than 150,000 to 200,000 patients. The data belonged to multiple providers.

The incidents highlight the importance of vendor management and the need to ensure security policies are aligned. Previous reports have shown about one-third of healthcare databases stored in the cloud, or even locally, are actively leaking data online. What's worse, misconfigured databases can be hacked in about eight hours.

DataBreaches.net wonders what happened after Med-Data reached out to GitHub about the vault's logs and removal of the code. Did GitHub provide the logs? If so, what did they show? Is anyone's Protected Health Information in GitHub's Arctic Code Vault? And if so, what happens? Will GitHub remove it...? Or will code just be left there for researchers to explore in 1,000 years so they can wade through the personal and protected health information or other sensitive information of people who trusted others to protect their privacy?

In November, 2020, Ursem posed the question to GitHub on Twitter. They never replied.

This discussion has been archived. No new comments can be posted.

Did Patient Health Information Leak Into GitHub's Arctic Code Vault?

Comments Filter:
  • Did GitHub provide the logs? If so, what did they show? Is anyone's Protected Health Information in GitHub's Arctic Code Vault? And if so, what happens? Will GitHub remove it...? Or will code just be left there for researchers to explore in 1,000 years so they can wade through the personal and protected health information or other sensitive information of people who trusted others to protect their privacy?

    Almost as bad as archaeologists looking through our poo.

  • Since when was dropping every bit of code you have in a public repository (it is not secure), and clearly live data as well, ever a good idea.

  • by bagofbeans ( 567926 ) on Sunday April 04, 2021 @09:59AM (#61235474)

    All affected patients will receive free credit monitoring and identity protection service

    We don't want that. We want genuine financial compensation that hurts your bottom line.

    • All affected patients will receive free credit monitoring and identity protection service

      We don't want that. We want genuine financial compensation that hurts your bottom line.

      If it hurt their bottom line, that would just get passed on to you in the form of increased healthcare costs or taxes.

      • Or maybe it will just put them out of business for their colossal fuck up. Fining them to death is about the only way you can have a death penalty for a corp.
    • Thanks for sharing this information. I really like your blog post very much. You have really shared an informative and interesting blog post with people. t rex game [trexgame.co]
  • In November, 2020, Ursem posed the question to GitHub on Twitter. They never replied.

    OK the actual vendor who published all the private health data seems to get away with providing "credit monitoring".

    And GitHub is somehow at fault for their service working exactly as it should? And not answering any random Twitter question? It's not GitHub's job to look into the stuff you publish openly and decide whether you should not have and remove it...

    • It actually is, if there's the risk of people putting PHI on there.

      • "(iii) A subcontractor that creates, receives, maintains, or transmits protected health information on behalf of the business associate."

        If GitHub is letting covered entities use their services, they need BAAs and HIPPA-compliance. See https://www.law.cornell.edu/cf... [cornell.edu].

        • > If GitHub is letting covered entities use their services, they need BAAs and HIPPA-compliance

          Only if they have an arrangement to store or process PHI.

          If I walk out of the clinic and hand a chart to the guy mowing the lawn, that doesn't make the groundskeeping company a covered entity or a subcontractor with obligations.

          It's moot, though, because Github is Microsoft which already does a ton with healthcare. And who knows what's on Github private.

          • No, it's the lack of the agreement but doing it anyways that's illegal. GitHub takes subscription fees to host content, and presumably this would be against the terms of that agreement for services, without the concomitant BAA.

  • I reported a massive series of HIPPA violations from a former employer who knowingly handles PHI. The Office of Civil Liberties which handles those complaints refused to invesitgate, stating that they only investigate hospitals, not other covered entities. Therefore, my former employer continues, to this day, to make PHI publicly available, searchable on Google no less, despite my having reported it and the lack of business associate agreements with the various hospitals and doctors using their services.

    • Report it to the patients themselves.

      • The issue is that I didn't want to take possession of the records by making a copy myself. What I reported to the regulators was the URLs of the publicly available PHI. I also felt a bit wary of wading into contacting individuals, because I was made the designated fall guy. I tried to address it internally, making the entire staff aware of it, all the way up to the owner, every single week, for months on end. Finally, I submitted my resignation and filed a whistleblower complaint.

        • I tried to address it internally, making the entire staff aware of it, all the way up to the owner, every single week, for months on end. Finally, I submitted my resignation and filed a whistleblower complaint.

          How does it feel knowing that none of that did any good whatsoever?

          • Par for the course. It was a lousy situation to be put into, with a large number of peoples' information plastered up for anyone to see And seeing myself being set up that way was not particularly endearing. Being given responsibility for the issue, but no authority or means to correct it, short of running my mouth, is a raw deal.

            I'm out. My current employer doesn't ask me to break the law, which is a nice property in a job. (I don't work in intelligence, despite the signature, so breaking laws is not my j

    • Hit up databreaches.net, or me on Twitter. We have our ways of getting the right eyes pointed at this stuff, i'm sure that it won't fly.
  • companies have been hiring the cheapest programmers for 20 years now. Guys trained assembly line style often with little or no access to actual computers and paid $5 bucks an hour. They don't really understand what they're doing but are treated like they do. The result is they make a lot of mistakes and one of those mistakes is randomly putting things on git hub.
    • companies have been hiring the cheapest programmers for 20 years now. Guys trained assembly line style often with little or no access to actual computers and paid $5 bucks an hour. They don't really understand what they're doing but are treated like they do. The result is they make a lot of mistakes and one of those mistakes is randomly putting things on git hub.

      You're forgetting the important fact that they have no reason to care one way or the other.

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...