Anatomy of a Breach

Anatomy of a Breach: Medibank — 9.7 Million Australians' Health Data Published After Ransom Refused

> series: anatomy_of_a_breach —— part: 166 —— target: medibank —— customers: 9,700,000 —— published: mental_health_hiv_pregnancy_data<span class="cursor-blink">_</span>_

Hedgehog Security 31 October 2022 14 min read

9.7 million Australians. Mental health records. HIV status. Published as punishment for not paying.

In October 2022, Medibank — one of Australia's largest private health insurers — disclosed that attackers had stolen the personal data of approximately 9.7 million current and former customers, including names, dates of birth, Medicare numbers, and — for a subset of customers — detailed health claims data including diagnosis codes, procedure codes, and provider details. The breach represented approximately 40% of Australia's population.

Medibank refused to pay the ransom, following Australian government guidance. The attackers — linked to Russia's REvil ransomware operation — responded by publishing stolen data on the dark web in categorised tranches, including files labelled 'abortions', 'boozy' (alcohol-related claims), and 'psychos' (mental health claims). The deliberate categorisation and publication of the most sensitive health data — mental health treatment, substance abuse rehabilitation, pregnancy terminations, and HIV status — was designed to cause maximum personal harm as retaliation for non-payment. The Australian government sanctioned the Russian individual identified as responsible.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

When the most intimate data is weaponised as punishment.

The Medibank breach represented the darkest evolution of double-extortion ransomware: stealing data, demanding payment, and — when refused — deliberately publishing the most sensitive, stigmatised, and personally damaging health information to punish the victim organisation and harm its customers. The Ashley Madison breach (2015) had shown that personal data can destroy lives; Medibank showed that health data can be weaponised with surgical cruelty.

Health Data as a Weapon
Mental health records, addiction treatment, pregnancy terminations, HIV status — the attackers specifically targeted and categorised the most stigmatised health conditions for publication. For UK <a href="/blog/sector-under-the-microscope-healthcare">healthcare organisations</a>, the Medibank case demonstrates that health data theft now carries the risk of deliberate, targeted publication of patients' most sensitive conditions. <a href="https://www.socinabox.co.uk/sectors/gp-surgeries">SOC in a Box for Healthcare</a> detects data exfiltration before it reaches attackers.
Punishment for Non-Payment
The staged publication of categorised data was explicitly retaliatory — designed to pressure future victims into paying. Medibank's refusal to pay was principled but came with devastating consequences for affected patients. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides guidance on ransom decisions including the human impact of non-payment.
Stolen Credentials as Entry
The initial access was through compromised credentials belonging to a third-party contractor — the same pattern documented across this series from <a href="/blog/anatomy-of-a-breach-target">Target</a> (2013) to <a href="/blog/anatomy-of-a-breach-uber-2022">Uber</a> (2022). <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates MFA for all access, including contractor accounts.
International Sanctions
The Australian government imposed sanctions on the identified Russian attacker — using international sanctions as a tool against ransomware operators. This reflected the escalating government response to ransomware that began with the <a href="/blog/anatomy-of-a-breach-colonial-pipeline">Colonial Pipeline Executive Order</a> (2021).

Health data is the most dangerous data to lose. Protect it accordingly.

Medibank proved that health data breaches carry consequences beyond financial loss — they can cause lasting personal harm through the deliberate publication of stigmatised conditions. For UK healthcare organisations, the Medibank case means that data exfiltration prevention — stopping data from leaving the network — is as important as preventing initial access. Data loss prevention through SOC in a Box for Healthcare detects bulk data exfiltration. Infrastructure testing validates network segmentation and data access controls. Cyber Essentials mandates MFA including for contractors. And UK Cyber Defence provides the incident response and crisis management capability for health data breaches.


Medibank: 9.7M patients' health data published as punishment. Could your patients' records be next?

<a href="https://www.socinabox.co.uk/sectors/gp-surgeries">SOC in a Box for Healthcare</a> detects data exfiltration. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> validates data access controls. <a href="/cyber-essentials">Cyber Essentials</a> mandates MFA.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles