> series: anatomy_of_a_breach —— part: 166 —— target: medibank —— customers: 9,700,000 —— published: mental_health_hiv_pregnancy_data<span class="cursor-blink">_</span>_
In October 2022, Medibank — one of Australia's largest private health insurers — disclosed that attackers had stolen the personal data of approximately 9.7 million current and former customers, including names, dates of birth, Medicare numbers, and — for a subset of customers — detailed health claims data including diagnosis codes, procedure codes, and provider details. The breach represented approximately 40% of Australia's population.
Medibank refused to pay the ransom, following Australian government guidance. The attackers — linked to Russia's REvil ransomware operation — responded by publishing stolen data on the dark web in categorised tranches, including files labelled 'abortions', 'boozy' (alcohol-related claims), and 'psychos' (mental health claims). The deliberate categorisation and publication of the most sensitive health data — mental health treatment, substance abuse rehabilitation, pregnancy terminations, and HIV status — was designed to cause maximum personal harm as retaliation for non-payment. The Australian government sanctioned the Russian individual identified as responsible.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Medibank breach represented the darkest evolution of double-extortion ransomware: stealing data, demanding payment, and — when refused — deliberately publishing the most sensitive, stigmatised, and personally damaging health information to punish the victim organisation and harm its customers. The Ashley Madison breach (2015) had shown that personal data can destroy lives; Medibank showed that health data can be weaponised with surgical cruelty.
Medibank proved that health data breaches carry consequences beyond financial loss — they can cause lasting personal harm through the deliberate publication of stigmatised conditions. For UK healthcare organisations, the Medibank case means that data exfiltration prevention — stopping data from leaving the network — is as important as preventing initial access. Data loss prevention through SOC in a Box for Healthcare detects bulk data exfiltration. Infrastructure testing validates network segmentation and data access controls. Cyber Essentials mandates MFA including for contractors. And UK Cyber Defence provides the incident response and crisis management capability for health data breaches.
<a href="https://www.socinabox.co.uk/sectors/gp-surgeries">SOC in a Box for Healthcare</a> detects data exfiltration. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> validates data access controls. <a href="/cyber-essentials">Cyber Essentials</a> mandates MFA.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call