medibank data breachAuthentication

How did the Medibank data breach happen and how to avoid it?

Learn about the Medibank data breach, key vulnerabilities exploited, prevention measures and actionable strategies to prevent similar cyberattacks.

Blog-Post-Author

Vincent

Created: December 17, 2024

Updated: December 17, 2024


Our mission is to make the Internet a safer place, and the new login standard passkeys provides a superior solution to achieve that. That's why we want to help you understand passkeys and its characteristics better.

1 Introduction#

In October 2022, Medibank, one of Australia’s largest private health insurers, suffered a data breach that exposed the sensitive personal and medical information of 9.7 million customers. This incident showed the severe consequences of failing to implement basic cybersecurity measures. Understanding how the breach occurred, and the security gaps exploited is essential to prevent similar attacks in the future.

That is why this blog post will cover these main questions:

  • What vulnerabilities that enabled the Medibank breach?
  • What countermeasures could have prevented the Medibank breach?

2 How Did the Medibank Data Breach Happen?#

The Medibank data breach was not the result of sophisticated hacking methods. Instead, it occurred because of a series of preventable security mistakes. These oversights allowed cybercriminals to enter Medibank’s network, steal large amounts of sensitive information, and then demand a ransom.

2.1 Stolen Credentials and Unsecured Entry Points#

The attack began when a third-party IT provider, contracted by Medibank, stored Medibank’s administrator-level login details on a personal device. This device was infected with malware, which allowed attackers to obtain user credentials. Because Medibank’s remote access system did not require multi-factor authentication at the time, the attackers could log into the company’s network using these stolen credentials, appearing to be authorized users.

2.2 Data Theft and Delayed Response of Medibank#

Once inside Medibank’s system, the criminals installed a script to search for and extract sensitive customer information. They compressed this data and transferred it out of the network through a build in backdoor. Although the company’s security tools flagged suspicious activities, these alerts were not followed up on with the urgency they required. By the time Medibank’s security team finally acted and shut down the attackers’ access 200 GB of personal data had already been stolen.

2.3 Ransom Demands and Data Leaks#

The stolen information included:

  • Names
  • Dates of birth
  • Passport details
  • Medicare numbers

With posession of this data, the attackers demanded a ransom of $10 million USD to stop them from releasing to the public. Medibank refused to pay, believing that doing so would encourage further attacks and therefore the criminals began leaking portions of the data on the dark web in response, placing additional pressure on the company.

Substack Icon

Subscribe to our Passkeys Substack for the latest news, insights and strategies.

Subscribe

3. Key Vulnerabilities in Medibank’s Security#

The Medibank breach showed several critical weaknesses in the organization’s cybersecurity defenses. By failing to implement these essential security controls, Medibank created opportunities for attackers to exploit privileged access, navigate internal systems, and exfiltrate sensitive data. Here are the key vulnerabilities that contributed to the incident:

3.1 Lack of Credential Protection#

Medibank’s failure to safeguard privileged credentials allowed the attackers to bypass initial security measures as there was no 2FA/MFA in place to then use the login inside the system.

3.2 Absence of the Principle of Least Privilege (POLP)#

The employee account bought by the hackers on the dark web had more access than necessary to perform daily tasks, increasing the risk of high-privilege account compromise. This allowed the attackers to access critical data directly.

3.3 Insufficient Network Segmentation#

The lack of network segmentation made it easier for attackers to locate and exfiltrate sensitive data. Without isolated zones or robust access controls, the attackers could access the database without encountering significant barriers.

3.4 Delayed Detection of Backdoors#

Despite eventually detecting the breach, Medibank’s delayed response enabled the attackers to already download a significant amount of data before shutting down the cyber attack.

Slack Icon

Become part of our Passkeys Community for updates and support.

Join

4. How Could the Medibank Breach Have Been Prevented?#

Here are four strategies that could have mitigated or even prevented the Medibank data breach:

4.1 Implement Cyber Threat Awareness Training#

Teaching employees how to recognize phishing attempts and credential theft can reduce the risk of initial compromise since phishing remains one of the most common methods for credential theft.

4.2 Enforce the Principle of Least Privilege (POLP)#

POLP limits access to sensitive systems and data to only those who need it. By enforcing POLP, Medibank could have slowed down the attackers or prevented them from accessing critical databases altogether.

4.3 Use Multi-Factor Authentication (MFA)#

MFA adds an extra layer of security by requiring additional verification steps beyond just a password. According to Microsoft, MFA can prevent up to 98% of account compromise attempts. Adaptive MFA, which adjusts requirements based on risk factors, provides even stronger protection.

4.4 Implement Robust Network Segmentation#

Network segmentation isolates sensitive data into secure zones, making it more challenging for attackers to locate and access. For extra security, jump servers can control connection requests to these zones, reducing the risk of unauthorized access.

5 Conclusion#

The Medibank data breach highlights the critical need for robust cybersecurity measures in today’s digital landscape. By implementing basic security practices like credential protection, MFA, POLP, and network segmentation, organizations can significantly reduce their risk of suffering a similar attack.

This incident serves as a stark reminder that protecting sensitive customer data is not just a legal obligation but a fundamental aspect of maintaining trust in the digital age.

Share this article


LinkedInTwitterFacebook

Enjoyed this read?

🤝 Join our Passkeys Community

Share passkeys implementation tips and get support to free the world from passwords.

🚀 Subscribe to Substack

Get the latest news, strategies, and insights about passkeys sent straight to your inbox.


We provide UI components, SDKs and guides to help you add passkeys to your app in <1 hour

Start for free