top of page
Momentum Z, your cybersecurity partner
Search

Data Breach: 90,000 Military Personnel and Veterans and families affected in the US

  • Writer: MZT
    MZT
  • Oct 7
  • 3 min read

An unauthorized actor accessed CPAP’s network between December 13 and December 21, 2024. The breach was not discovered until late June 2025, and affected parties were notified by mid-August.


The stolen data includes:

  1. Full names

  2. Birth dates

  3. Social Security numbers

  4. Health insurance information

  5. Medical history

  6. Treatment plans

Healthcare organizations continue to face significant risks from cyberattacks, as demonstrated by the recent incident involving CPAP Medical Supplies and Services Inc., a provider of sleep therapy equipment based in Jacksonville, Florida. This breach affected up to 90,133 patients and highlights ongoing vulnerabilities in the healthcare sector. The following analysis examines the details of the incident, its implications, and strategies for enhancing cybersecurity defenses.

ree

Incident Overview: Timeline and Scope


CPAP Medical provides sleep therapy products to military families, active-duty personnel, and retirees, requiring the management of sensitive patient information. Between December 13 and December 21, 2024, unauthorized actors accessed the company's network, potentially compromising various types of data.


A forensic investigation and document review, completed by June 27, 2025, determined that the breach exposed full names, dates of birth, Social Security numbers, financial and banking details, medical records, and health insurance information for approximately 90,000 individuals. No evidence of data misuse has been reported to date, though such information remains valuable for activities including identity theft and extortion.


This event aligns with a broader trend in healthcare breaches. For instance, Health Services LLC, a franchisee of Miracle-Ear, experienced a similar incident in January 2025 that impacted 75,906 individuals. Additionally, East Adams Rural Healthcare reported a breach in September 2024 affecting 8,896 patients. These cases indicate that smaller providers, which may have limited resources, are frequently targeted through exploitable weaknesses.


Consequences: Operational and Personal Impacts


The breach led to operational challenges for CPAP Medical, including system lockdowns, investigative efforts, and patient notifications. Individuals relying on continuous positive airway pressure (CPAP) devices for sleep therapy encountered potential delays in service access.


On a personal level, affected patients received notifications about the exposure of their sensitive data, which can lead to risks such as fraud. For veterans and retirees managing complex healthcare needs, such incidents compound existing challenges.


From a sectoral perspective, these breaches contribute to diminished trust in healthcare systems. Organizations handle protected health information (PHI) under the Health Insurance Portability and Accountability Act (HIPAA), and compromises can result in resource strain, regulatory investigations, and increased attacker motivation. In 2024, ransomware attacks in healthcare rose by 30 percent, often leveraging unpatched vulnerabilities or phishing attempts mimicking medical communications.



Response Measures and Key Lessons


CPAP Medical took prompt steps to address the incident, including securing affected systems, providing free credit monitoring and identity theft protection to impacted individuals, and notifying the U.S. Department of Health and Human Services (HHS) Office for Civil Rights. These actions conform to established incident response protocols and help mitigate potential harm.


Common factors in such breaches often include insufficient multi-factor authentication (MFA), unupdated software, or phishing vulnerabilities. Although the exact entry method remains undisclosed, the incident appears to involve a standard unauthorized network intrusion, which could be detected early through endpoint security tools.


Recommendations for Strengthening Defenses

Based on standard cybersecurity practices for healthcare environments, the following measures can help reduce risks:


  • Adopt Zero-Trust Architecture: This approach verifies all access requests, segmenting networks to separate patient data from other systems. Frameworks such as those from Microsoft support this implementation.


  • Emphasize Patch Management and Multi-Factor Authentication: Approximately 80 percent of breaches exploit known vulnerabilities. Automated patching and universal MFA deployment address many credential-based threats.


  • Perform Regular Penetration Testing: Quarterly simulations of attacks, particularly on Internet of Things (IoT) devices like medical equipment running outdated operating systems, can identify weaknesses proactively.


  • Develop and Test Incident Response Plans: Annual exercises, including tabletop simulations, ensure compliance with HIPAA's 60-day notification requirement and facilitate effective communication.


  • Utilize Advanced Threat Detection: Security Information and Event Management (SIEM) systems incorporating artificial intelligence can identify anomalies, such as unusual data transfers during non-standard hours.


For affected individuals, monitoring credit reports, activating fraud alerts, and using virtual private networks (VPNs) for online health interactions provide additional safeguards.


ree

Broader Implications for the Healthcare Sector


Events like the CPAP Medical breach reflect challenges arising from rapid digital adoption outpacing security advancements. As cybercriminals employ sophisticated methods, including artificial intelligence for phishing, the need for standardized cybersecurity requirements and investments in technology and personnel becomes evident.


Healthcare providers are encouraged to prioritize these areas to maintain operational integrity and patient confidence.


Sources: This analysis is based on reporting from The HIPAA Journal. https://www.hipaajournal.com/cyberattack-medical-equipment-provider/

 
 
 

Comments


bottom of page