United Seating and Mobility

United Seating and Mobility

United Seating and Mobility experienced the largest single healthcare email breach in the first half of the year, exposing over **500,000 patient records**. The attack targeted **Microsoft 365**, a common weak point in healthcare cybersecurity, where **phishing or credential compromise** was likely the entry vector. The breach highlights systemic vulnerabilities in healthcare IT, including **ineffective DMARC protections (79% of breached organizations)**, reliance on human vigilance, and gaps in third-party vendor security. With healthcare breaches costing an average of **$11 million per incident** (IBM 2025), the exposure of sensitive patient data—including potential **personal and medical histories**—poses severe financial, reputational, and regulatory risks (e.g., HIPAA violations). The attack aligns with broader industry trends where **81% of breaches are classified as cyber attacks**, often exploiting under-resourced IT teams and unpatched email security configurations. Staff negligence (e.g., bypassing secure messaging, underreporting phishing) further exacerbated the breach’s scale.

Source: https://www.itpro.com/business/business-strategy/healthcare-organizations-report-rampant-email-security-failures-and-microsoft-365-is-often-the-weakest-link

TPRM report: https://www.rankiteo.com/company/numotion

"id": "num5792757091225",
"linkid": "numotion",
"type": "Breach",
"date": "6/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'customers_affected': '500,000+ records',
                        'industry': 'Healthcare (Medical Equipment/Services)',
                        'name': 'United Seating and Mobility',
                        'type': 'Healthcare Provider'},
                       {'customers_affected': '1.6 million+ records '
                                              '(aggregate)',
                        'industry': 'Healthcare',
                        'name': 'Unnamed Healthcare Organizations (107 '
                                'incidents in H1 2024)',
                        'type': ['Hospitals',
                                 'Clinics',
                                 'Third-Party Vendors (Billing, Imaging, '
                                 'IT)']}],
 'attack_vector': ['Email (Microsoft 365)', 'Phishing', 'Third-Party Vendors'],
 'data_breach': {'data_exfiltration': 'Yes (patient records)',
                 'number_of_records_exposed': '1,600,000+ (H1 2024)',
                 'personally_identifiable_information': 'Yes',
                 'sensitivity_of_data': 'High (Healthcare/PII)',
                 'type_of_data_compromised': ['Patient Records',
                                              'Personally Identifiable '
                                              'Information (PII)']},
 'date_publicly_disclosed': '2024',
 'description': 'Healthcare organizations are increasingly being targeted in '
                'email attacks, with Microsoft 365 identified as the weakest '
                'link. In 2023, 52% of healthcare email breaches involved '
                'Microsoft 365 (up from 43% in 2022). Over 1.6 million patient '
                'records were compromised in the first half of 2024, averaging '
                '~16,000 records per breach. The largest incident (United '
                'Seating and Mobility) exposed over 500,000 records. Key '
                'issues include ineffective DMARC protection (79% of breached '
                'orgs), credential compromise, phishing, and third-party '
                'vendor involvement (16% of incidents). Healthcare breach '
                'costs average $11M per incident (IBM 2025 report).',
 'impact': {'brand_reputation_impact': 'High (healthcare sector trust erosion)',
            'data_compromised': '1.6 million+ patient records (H1 2024)',
            'financial_loss': '$11M (average per incident, per IBM 2025 '
                              'report)',
            'identity_theft_risk': 'High (patient records exposed)',
            'legal_liabilities': 'Potential HIPAA violations',
            'operational_impact': 'Disruption to patient data security, '
                                  'compliance risks (HIPAA)',
            'systems_affected': ['Microsoft 365',
                                 'Email Security Platforms (Mimecast, '
                                 'Proofpoint, Barracuda)']},
 'initial_access_broker': {'entry_point': ['Phishing Emails',
                                           'Compromised Credentials'],
                           'high_value_targets': ['Patient Databases',
                                                  'Billing Systems']},
 'investigation_status': 'Ongoing (Research-Based Findings)',
 'lessons_learned': ['Over-reliance on human vigilance for email security is '
                     'ineffective.',
                     'Basic email authentication (DMARC) is critically '
                     'under-enforced (79% of breached orgs).',
                     'Third-party vendors (e.g., billing, IT) introduce '
                     'significant risk (16% of incidents).',
                     'Staff frequently bypass secure messaging (40%+ of '
                     'providers).',
                     'Phishing reporting rates are abysmally low (~5% of '
                     'attacks reported).'],
 'motivation': 'Financial Gain (Data Theft/Exfiltration)',
 'post_incident_analysis': {'corrective_actions': ['Prioritize DMARC '
                                                   'implementation with '
                                                   'automated enforcement.',
                                                   'Deploy layered email '
                                                   'security (beyond '
                                                   'brand-name solutions).',
                                                   'Streamline phishing '
                                                   'reporting for employees.',
                                                   'Conduct third-party risk '
                                                   'assessments.',
                                                   'Invest in security '
                                                   'automation to reduce '
                                                   'manual burdens.'],
                            'root_causes': ['Ineffective DMARC/DKIM/SPF email '
                                            'authentication.',
                                            'Lack of automated security '
                                            'enforcement.',
                                            'Human error (phishing '
                                            'susceptibility, secure messaging '
                                            'bypass).',
                                            'Third-party vendor '
                                            'vulnerabilities.',
                                            'Resource constraints (strained IT '
                                            'teams, alert fatigue).']},
 'recommendations': ['Implement automated DMARC enforcement and email security '
                     'configurations.',
                     'Reduce attack surface via third-party vendor risk '
                     'assessments.',
                     'Enhance phishing training and simplify reporting for '
                     'staff.',
                     'Adopt security-by-default solutions to offset limited IT '
                     'resources.',
                     'Monitor delivery logs and test configurations '
                     'proactively.'],
 'references': [{'source': 'Paubox Research (2024)'},
                {'source': 'IBM Cost of a Data Breach Report (2025)'},
                {'source': 'ITPro Article on Healthcare Email Breaches'}],
 'regulatory_compliance': {'regulations_violated': ['Potential HIPAA '
                                                    'Non-Compliance']},
 'response': {'remediation_measures': ['Recommendations: Automate email '
                                       'security (DMARC enforcement), staff '
                                       'training, reduce reliance on human '
                                       'vigilance'],
              'third_party_assistance': ['Paubox (Research)',
                                         'IBM (Cost of a Data Breach Report)']},
 'title': 'Rise in Microsoft 365 Email Breaches Targeting Healthcare '
          'Organizations',
 'type': ['Data Breach', 'Phishing', 'Credential Compromise'],
 'vulnerability_exploited': ['Ineffective DMARC Protection',
                             'Human Error (Phishing Susceptibility)',
                             'Misconfigured Email Security Solutions '
                             '(Mimecast, Proofpoint, Barracuda)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.