United Seating and Mobility experienced the largest single healthcare email breach in the first half of the year, exposing over **500,000 patient records**. The attack targeted **Microsoft 365**, a common weak point in healthcare cybersecurity, where **phishing or credential compromise** was likely the entry vector. The breach highlights systemic vulnerabilities in healthcare IT, including **ineffective DMARC protections (79% of breached organizations)**, reliance on human vigilance, and gaps in third-party vendor security. With healthcare breaches costing an average of **$11 million per incident** (IBM 2025), the exposure of sensitive patient data—including potential **personal and medical histories**—poses severe financial, reputational, and regulatory risks (e.g., HIPAA violations). The attack aligns with broader industry trends where **81% of breaches are classified as cyber attacks**, often exploiting under-resourced IT teams and unpatched email security configurations. Staff negligence (e.g., bypassing secure messaging, underreporting phishing) further exacerbated the breach’s scale.
TPRM report: https://www.rankiteo.com/company/numotion
"id": "num5792757091225",
"linkid": "numotion",
"type": "Breach",
"date": "6/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'customers_affected': '500,000+ records',
'industry': 'Healthcare (Medical Equipment/Services)',
'name': 'United Seating and Mobility',
'type': 'Healthcare Provider'},
{'customers_affected': '1.6 million+ records '
'(aggregate)',
'industry': 'Healthcare',
'name': 'Unnamed Healthcare Organizations (107 '
'incidents in H1 2024)',
'type': ['Hospitals',
'Clinics',
'Third-Party Vendors (Billing, Imaging, '
'IT)']}],
'attack_vector': ['Email (Microsoft 365)', 'Phishing', 'Third-Party Vendors'],
'data_breach': {'data_exfiltration': 'Yes (patient records)',
'number_of_records_exposed': '1,600,000+ (H1 2024)',
'personally_identifiable_information': 'Yes',
'sensitivity_of_data': 'High (Healthcare/PII)',
'type_of_data_compromised': ['Patient Records',
'Personally Identifiable '
'Information (PII)']},
'date_publicly_disclosed': '2024',
'description': 'Healthcare organizations are increasingly being targeted in '
'email attacks, with Microsoft 365 identified as the weakest '
'link. In 2023, 52% of healthcare email breaches involved '
'Microsoft 365 (up from 43% in 2022). Over 1.6 million patient '
'records were compromised in the first half of 2024, averaging '
'~16,000 records per breach. The largest incident (United '
'Seating and Mobility) exposed over 500,000 records. Key '
'issues include ineffective DMARC protection (79% of breached '
'orgs), credential compromise, phishing, and third-party '
'vendor involvement (16% of incidents). Healthcare breach '
'costs average $11M per incident (IBM 2025 report).',
'impact': {'brand_reputation_impact': 'High (healthcare sector trust erosion)',
'data_compromised': '1.6 million+ patient records (H1 2024)',
'financial_loss': '$11M (average per incident, per IBM 2025 '
'report)',
'identity_theft_risk': 'High (patient records exposed)',
'legal_liabilities': 'Potential HIPAA violations',
'operational_impact': 'Disruption to patient data security, '
'compliance risks (HIPAA)',
'systems_affected': ['Microsoft 365',
'Email Security Platforms (Mimecast, '
'Proofpoint, Barracuda)']},
'initial_access_broker': {'entry_point': ['Phishing Emails',
'Compromised Credentials'],
'high_value_targets': ['Patient Databases',
'Billing Systems']},
'investigation_status': 'Ongoing (Research-Based Findings)',
'lessons_learned': ['Over-reliance on human vigilance for email security is '
'ineffective.',
'Basic email authentication (DMARC) is critically '
'under-enforced (79% of breached orgs).',
'Third-party vendors (e.g., billing, IT) introduce '
'significant risk (16% of incidents).',
'Staff frequently bypass secure messaging (40%+ of '
'providers).',
'Phishing reporting rates are abysmally low (~5% of '
'attacks reported).'],
'motivation': 'Financial Gain (Data Theft/Exfiltration)',
'post_incident_analysis': {'corrective_actions': ['Prioritize DMARC '
'implementation with '
'automated enforcement.',
'Deploy layered email '
'security (beyond '
'brand-name solutions).',
'Streamline phishing '
'reporting for employees.',
'Conduct third-party risk '
'assessments.',
'Invest in security '
'automation to reduce '
'manual burdens.'],
'root_causes': ['Ineffective DMARC/DKIM/SPF email '
'authentication.',
'Lack of automated security '
'enforcement.',
'Human error (phishing '
'susceptibility, secure messaging '
'bypass).',
'Third-party vendor '
'vulnerabilities.',
'Resource constraints (strained IT '
'teams, alert fatigue).']},
'recommendations': ['Implement automated DMARC enforcement and email security '
'configurations.',
'Reduce attack surface via third-party vendor risk '
'assessments.',
'Enhance phishing training and simplify reporting for '
'staff.',
'Adopt security-by-default solutions to offset limited IT '
'resources.',
'Monitor delivery logs and test configurations '
'proactively.'],
'references': [{'source': 'Paubox Research (2024)'},
{'source': 'IBM Cost of a Data Breach Report (2025)'},
{'source': 'ITPro Article on Healthcare Email Breaches'}],
'regulatory_compliance': {'regulations_violated': ['Potential HIPAA '
'Non-Compliance']},
'response': {'remediation_measures': ['Recommendations: Automate email '
'security (DMARC enforcement), staff '
'training, reduce reliance on human '
'vigilance'],
'third_party_assistance': ['Paubox (Research)',
'IBM (Cost of a Data Breach Report)']},
'title': 'Rise in Microsoft 365 Email Breaches Targeting Healthcare '
'Organizations',
'type': ['Data Breach', 'Phishing', 'Credential Compromise'],
'vulnerability_exploited': ['Ineffective DMARC Protection',
'Human Error (Phishing Susceptibility)',
'Misconfigured Email Security Solutions '
'(Mimecast, Proofpoint, Barracuda)']}