Get your free and exclusive +30-page Authentication Analytics Whitepaper

How did Medibank data breach happen & how to avoid it?

Learn about the Medibank data breach, key vulnerabilities exploited, prevention measures and actionable strategies to prevent similar cyberattacks.

Vincent Delitz

Vincent

Created: December 17, 2024

Updated: March 21, 2026

medibank data breach
WhitepaperAustralia Icon

20-page AU Passkey Whitepaper:
Learn from AU rollouts (myGov, Telstra, Ubank, VicRoads)

Get free Whitepaper
Key Facts
  • The Medibank breach exposed personal and medical data of 9.7 million customers in October 2022, resulting from preventable security failures rather than sophisticated hacking.
  • Attackers gained entry using credentials stolen from a third-party IT provider's malware-infected personal device, exploiting the absence of MFA on remote access systems.
  • Delayed incident response allowed criminals to exfiltrate 200 GB of data before Medibank's security team shut down access, despite earlier alerts from security tools.
  • Attackers demanded 10 million USD in ransom. Medibank refused, leading criminals to leak stolen data on the dark web including names, passport details and Medicare numbers.
  • Multi-factor authentication could have blocked the breach at entry. Microsoft data cited in the article shows MFA prevents up to 98% of account compromise attempts.

1. Introduction#

In October 2022, Medibank, one of Australia’s largest private health insurers, suffered a data breach that exposed the sensitive personal and medical information of 9.7 million customers. This incident showed the severe consequences of failing to implement basic cybersecurity measures. Understanding how the breach occurred, and the security gaps exploited is essential to prevent similar attacks in the future.

That is why this blog post will cover these main questions:

  • What vulnerabilities that enabled the Medibank breach?
  • What countermeasures could have prevented the Medibank breach?

2. How Did the Medibank Data Breach Happen?#

The Medibank data breach was not the result of sophisticated hacking methods. Instead, it occurred because of a series of preventable security mistakes. These oversights allowed cybercriminals to enter Medibank’s network, steal large amounts of sensitive information, and then demand a ransom.

2.1 Stolen Credentials and Unsecured Entry Points#

The attack began when a third-party IT provider, contracted by Medibank, stored Medibank’s administrator-level login details on a personal device. This device was infected with malware, which allowed attackers to obtain user credentials. Because Medibank’s remote access system did not require multi-factor authentication at the time, the attackers could log into the company’s network using these stolen credentials, appearing to be authorized users.

Igor Gjorgjioski Testimonial

Igor Gjorgjioski

Head of Digital Channels & Platform Enablement, VicRoads

Corbado proved to be a trusted partner. Their hands-on, 24/7 support and on-site assistance enabled a seamless integration into VicRoads' complex systems, offering passkeys to 5 million users.

Passkeys that millions adopt, fast. Start with Corbado's Adoption Platform.

Start Free Trial

2.2 Data Theft and Delayed Response of Medibank#

Once inside Medibank’s system, the criminals installed a script to search for and extract sensitive customer information. They compressed this data and transferred it out of the network through a build in backdoor. Although the company’s security tools flagged suspicious activities, these alerts were not followed up on with the urgency they required. By the time Medibank’s security team finally acted and shut down the attackers’ access 200 GB of personal data had already been stolen.

2.3 Ransom Demands and Data Leaks#

The stolen information included:

  • Names
  • Dates of birth
  • Passport details
  • Medicare numbers

With posession of this data, the attackers demanded a ransom of $10 million USD to stop them from releasing to the public. Medibank refused to pay, believing that doing so would encourage further attacks and therefore the criminals began leaking portions of the data on the dark web in response, placing additional pressure on the company.

Substack Icon

Subscribe to our Passkeys Substack for the latest news.

Subscribe

3. Key Vulnerabilities in Medibank’s Security#

The Medibank breach showed several critical weaknesses in the organization’s cybersecurity defenses. By failing to implement these essential security controls, Medibank created opportunities for attackers to exploit privileged access, navigate internal systems, and exfiltrate sensitive data. Here are the key vulnerabilities that contributed to the incident:

3.1 Lack of Credential Protection#

Medibank’s failure to safeguard privileged credentials allowed the attackers to bypass initial security measures as there was no 2FA/MFA in place to then use the login inside the system.

3.2 Absence of the Principle of Least Privilege (POLP)#

The employee account bought by the hackers on the dark web had more access than necessary to perform daily tasks, increasing the risk of high-privilege account compromise. This allowed the attackers to access critical data directly.

3.3 Insufficient Network Segmentation#

The lack of network segmentation made it easier for attackers to locate and exfiltrate sensitive data. Without isolated zones or robust access controls, the attackers could access the database without encountering significant barriers.

3.4 Delayed Detection of Backdoors#

Despite eventually detecting the breach, Medibank’s delayed response enabled the attackers to already download a significant amount of data before shutting down the cyber attack.

Slack Icon

Become part of our Passkeys Community for updates & support.

Join

4. How Could the Medibank Breach Have Been Prevented?#

Here are four strategies that could have mitigated or even prevented the Medibank data breach:

4.1 Implement Cyber Threat Awareness Training#

Teaching employees how to recognize phishing attempts and credential theft can reduce the risk of initial compromise since phishing remains one of the most common methods for credential theft.

4.2 Enforce the Principle of Least Privilege (POLP)#

POLP limits access to sensitive systems and data to only those who need it. By enforcing POLP, Medibank could have slowed down the attackers or prevented them from accessing critical databases altogether.

4.3 Use Multi-Factor Authentication (MFA)#

MFA adds an extra layer of security by requiring additional verification steps beyond just a password. According to Microsoft, MFA can prevent up to 98% of account compromise attempts. Adaptive MFA, which adjusts requirements based on risk factors, provides even stronger protection.

4.4 Implement Robust Network Segmentation#

Network segmentation isolates sensitive data into secure zones, making it more challenging for attackers to locate and access. For extra security, jump servers can control connection requests to these zones, reducing the risk of unauthorized access.

5. Conclusion#

The Medibank data breach highlights the critical need for robust cybersecurity measures in today’s digital landscape. By implementing basic security practices like credential protection, MFA, POLP, and network segmentation, organizations can significantly reduce their risk of suffering a similar attack.

This incident serves as a stark reminder that protecting sensitive customer data is not just a legal obligation but a fundamental aspect of maintaining trust in the digital age.

Frequently Asked Questions#

How did attackers initially get into the Medibank network?#

Attackers obtained Medibank administrator credentials from a third-party IT provider's personal device that was infected with malware. Because Medibank's remote access system lacked multi-factor authentication at the time, the stolen credentials were sufficient to log in as an authorized user.

What made the Medibank breach so damaging once attackers were inside the network?#

Two key weaknesses amplified the damage: the compromised account had excessive privileges beyond what daily tasks required, violating the Principle of Least Privilege, and insufficient network segmentation meant attackers could move freely to locate and extract sensitive databases without significant barriers.

What security controls would have most effectively prevented the Medibank data breach?#

Enforcing MFA on all remote access points was the most critical missing control, as Microsoft data shows MFA blocks up to 98% of account compromise attempts. Combining MFA with the Principle of Least Privilege and robust network segmentation would have stopped or significantly limited the attack even if credentials were stolen.

Why should organizations avoid paying ransoms after a data breach like Medibank's?#

Medibank refused to pay the 10 million USD ransom specifically because the company believed payment would encourage further attacks against them and others. Despite the refusal leading to dark web data leaks, this position aligns with broader security guidance that ransom payments do not guarantee data deletion and incentivize repeat attacks.

See what's really happening in your passkey rollout.

Start Observing

Share this article


LinkedInTwitterFacebook