Governance & Risk Management , Healthcare , Incident & Breach Response

Breach of Obamacare Site Spilled Sensitive Data

94,000 Victims' Income, Pregnancy Status and More Potentially Exposed
Breach of Obamacare Site Spilled Sensitive Data

(In a Nov. 13 update, the Centers for Medicare & Medicaid Services states: " We are continuing to work with law enforcement to investigate the breach, and our estimate of affected consumers has been updated to a final total of 93,689.")

See Also: Secureworks Named a Major Player in the 2024 IDC MDR Marketscape

More than two weeks after announcing that the Obamacare website,, had been hacked, the Department of Health and Human Services has revealed that the breach exposed a wealth of information, including partial Social Security numbers and immigration status.

In its Oct. 19 statement, which was scant on details, the Centers for Medicare and Medicaid Systems - the unit of the Department of Health and Human Services that administers the Affordable Care Act, also known as Obamacare - acknowledged that data on 75,000 individuals was exposed. Now, in a notification letter dated Nov. 7 that's hidden on the website, HHS is describing that data (see: Obamacare System Breach Affects 75,000).

" includes a way for licensed insurance agents and brokers to search for consumers who have an application stored on This allows agents and brokers to help some consumers update their applications if any information changes," the letter notes.

"On October 16, 2018, we found that a number of agent and broker accounts engaged in excessive searching for consumers, and through those searches, had access to the personal information of people who are listed on Marketplace applications," the letter states. "We immediately shut off these agent and broker accounts, and also shut off the entire agent and broker function while changes were made to improve security."

Data that may have been inappropriately accessed, according to the letter, includes:

  • Name, date of birth, address, gender and the last four digits of the Social Security number;
  • Expected income, tax filing status, family relationships, whether the applicant is a citizen or an immigrant, immigration document types and numbers, employer name, whether the applicant was pregnant and whether the applicant already had health insurance;
  • Information provided by other federal agencies and data sources to confirm the information provided on the application;
  • The results of the application, including whether the applicant was eligible to enroll in a qualified health plan, and if eligible, the tax credit amount;
  • If the applicant enrolled, the name of the insurance plan, the premium and dates of coverage.

"The information that was accessible did not include bank account numbers, credit card numbers or diagnosis or treatment information," states the letter, which does not reveal the details of how the website was hacked.

Attorney Adam Greene of the law firm Davis Wright Tremaine notes: "The limited good news is that full Social Security numbers were not exposed. CMS should be commended for limiting access to the full SSNs; otherwise this could have been much worse. The bad news is that this is otherwise what everyone feared with respect to The site collects a lot of personal data and is an attractive target to hackers or insiders abusing their access."

ID Theft Protection Offered

The letter notes that HHS will provide those whose data was exposed with free identity theft protection services.

"At this time, we don't know whether all of this information was actually accessed or misused. However, since this breach involves sensitive personal information, including partial SSN, there could be a risk of identity theft," the letter acknowledges.

The tool through which the breach occurred is only available through the currently disabled Direct Enrollment pathway for agents and brokers, HHS noted in its original Oct. 19 statement. The rest of the website continues to function; open enrollment for Obamacare began Nov. 1.

The Nov. 7 notification letter states that HHS is continuing to investigate the breach "and putting additional security measures in place to make sure and the marketplace process are safe and all consumer information is protected. Please be assured that all information will be protected during open enrollment."

How Did Hack Happen?

Based on the limited details that CMS has released, "it is difficult to determine how the breach might have happened," former healthcare CIO David Finn, executive vice president at security consultancy CynergisTek, noted when HHS issued its original statement.

"It could be anything from phishing to stolen credentials to a brute force attack," he said. "Agents and brokers should be taking a good look at their own users and sites. And any impacted consumer should be checking credit reports, claims, banks and even medical records."

It's safe to say that is a target for hackers, Finn notes. "Healthcare ... is now in the top targeted industries, and there is no indication that this is going to lessen."

Security Scrutinized

Security of the site, as well as the related backend systems of the Federal Facilitated Exchanges, has been closely scrutinized, even prior to the rocky launch of Obamacare's first open enrollment season in the fall of 2013. That launch was plagued with technical problems, including individuals encountering great difficulties accessing the site (see Insurance Exchanges: Work in Progress).

In addition, the lack of end-to-end security testing before the launch of on Oct. 1, 2013, had been a sore point focused on during several Congressional hearings that followed in the months afterwards.

Then in September 2014, HHS disclosed that that malware had been uploaded on a test server in July 2014. HHS officials said at the time that the malware was designed to launch a distributed denial-of-service attacks against other websites when activated. No consumer data was exposed in the incident, officials said.

In response to criticism from privacy advocates and others, HHS in 2015 also made a number of fixes to the site to scale back on the release of consumer data to third-party commercial sites (see: Makes Privacy Fixes).

Watchdog Review systems have also been the subject of security reviews by various government watchdog agencies, including the Government Accountability Office.

For instance, in March 2016, GAO issued a report noting that between October 2013 and March 2015, CMS reported 316 security-related incidents affecting and its supporting systems (see: Report Spotlights Security Weaknesses).

But the study also noted that none of the security incidents reported by CMS showed evidence that an outside attacker had successfully compromised sensitive data, such as personally identifiable information.

Nonetheless, that report noted GAO found weaknesses in systems and connections supporting, including the Federal Data Services data hub - a portal for exchanging information between the federal marketplace and CMS's external partners.

About the Author

Howard Anderson

Howard Anderson

Former News Editor, ISMG

Anderson was news editor of Information Security Media Group and founding editor of HealthcareInfoSecurity and DataBreachToday. He has more than 40 years of journalism experience, with a focus on healthcare information technology issues. Before launching HealthcareInfoSecurity, he served as founding editor of Health Data Management magazine, where he worked for 17 years, and he served in leadership roles at several other healthcare magazines and newspapers.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.