Skip to main content
Mallory
Mallory

Third-Party Healthcare and Benefits Service Provider Breaches Expand to Millions of Victims

third-partybreach notificationhealth insurancehealthcarebreachdata exfiltrationvendor riskmedicaidbenefitsregulatory filingssocial security numberspersonally identifiable informationconduent
Updated February 27, 2026 at 09:06 AM2 sources
Third-Party Healthcare and Benefits Service Provider Breaches Expand to Millions of Victims

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Health insurance technology provider TriZetto Provider Solutions (a Cognizant subsidiary) updated breach notifications indicating the impact of its November 2024 intrusion has grown to more than 3.4 million affected individuals. Disclosures to state regulators and downstream notifications from county governments and healthcare providers indicate theft of sensitive personal data including addresses, Social Security numbers, and health insurance identifiers, with some jurisdictions reporting hundreds of thousands of impacted residents.

Separately, the Conduent incident has expanded dramatically in public filings, with reported totals rising from roughly 10.5 million to more than 25 million affected individuals across the US, including a major increase in Texas (reported at 15.4 million) while Oregon remains around 10.5 million. Reporting indicates attackers maintained access for roughly three months and exfiltrated about 8 TB of data, underscoring the systemic risk posed by large, behind-the-scenes vendors that support Medicaid/SNAP and other state benefit programs, healthcare-related processing, and major employer services—creating a wide “blast radius” even for individuals unfamiliar with the vendor name.

Related Stories

TriZetto Provider Solutions Data Exfiltration Affecting Healthcare Client Insurance Data

TriZetto Provider Solutions Data Exfiltration Affecting Healthcare Client Insurance Data

**TriZetto Provider Solutions** (a Cognizant business unit providing revenue cycle management and claims clearinghouse services) is notifying more than **3.4 million individuals** after investigators determined threat actors accessed and exfiltrated healthcare clients’ **insurance-related data**. The activity reportedly began in **November 2024** but was not detected until **October 2025**, indicating a prolonged period of unauthorized access before discovery. The incident was reported to the U.S. Department of Health and Human Services via the **HIPAA Breach Reporting Tool** as impacting approximately **3.43 million** people, while TriZetto has not publicly specified how many healthcare customers were affected. Multiple healthcare organizations have publicly stated they were impacted and have issued their own patient notifications, underscoring downstream exposure risk for providers relying on TriZetto’s billing and claims processing services.

1 weeks ago
Healthcare Sector Data Breach Disclosures Expand Victim Counts Across Multiple Incidents

Healthcare Sector Data Breach Disclosures Expand Victim Counts Across Multiple Incidents

Multiple healthcare-related breach disclosures expanded significantly, led by *TriZetto Provider Solutions* reporting to regulators that **3,433,965** people were affected after an attacker used a web portal to access historical eligibility reports containing sensitive data (including **SSNs** and insurance information). Separately, *Conduent Business Services* told Wisconsin regulators that its incident now impacts **“25 million-plus”** people nationwide; the Xerox spinoff had previously reported **~15.5 million** affected in Texas, prompting an investigation by Texas AG Ken Paxton, while reporting noted the event is still smaller than the largest U.S. health-data breach on record. Reporting on the *Change Healthcare* ransomware incident reiterated that UnitedHealth estimated roughly **190 million** people were affected, with congressional testimony attributing initial access to a **Citrix remote access portal lacking MFA**, followed by data theft and ransomware deployment; reporting also cited a **$22 million** ransom payment. In the Asia-Pacific region, a separate healthcare privacy incident involving New Zealand’s *ManageMyHealth* patient portal was cited as exposing data from **~120,000** people, and was used to underscore governance, access control, and third-party oversight gaps as recurring drivers of healthcare-sector exposure.

2 weeks ago
Large US Healthcare Data Breaches Impacting Millions of Patients

Large US Healthcare Data Breaches Impacting Millions of Patients

Multiple healthcare-sector data breaches were disclosed with significant exposure of **protected health information (PHI)**. TriZetto Provider Solutions (TPS), an insurance verification provider, reported a compromise that began in **November 2024** and was not detected until nearly a year later; the threat was reportedly eradicated on **Oct. 2, 2025**. Notifications to affected healthcare provider customers across several states continued into late 2025 and early 2026, with one Oregon advisory estimating exposure affecting **more than 700,000 people**; impacted providers stated there was no current evidence of misuse and that **financial details were not stolen**. Separately, Healthcare Interactive (*HCIactive*), an AI-powered insurance enrollment and benefits administration vendor, confirmed that an intrusion and data exfiltration tied to activity in mid-2025 ultimately affected **3,056,950 individuals**, after earlier placeholder reporting while scope was still being determined; reported unauthorized access windows vary from **July 8–12, 2025** to a broader **June 17–July 22, 2025**. Another incident involved AI care-coordination platform *Lena Health*, where a threat actor claimed exposure of patient data (including references to a **Twilio call recording database**) and alleged that **2,134 patients’ PHI** was stored in an unencrypted export in a public-facing **AWS S3 bucket**, with follow-on reporting indicating exploitation after a publicly disclosed vulnerability and an available patch that was not applied in time.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.