Health Agency from Sweden Closes SmiNet after Hacking Attempts


SmiNet, the country’s infectious diseases database which is also used to store electronic reports with statistics on COVID-19 infections, was shut down in order to investigate the hacking attempts.

The Swedish Public Health Agency has discovered that there have been several attempted intrusions into the SmiNet database. The database has therefore been closed down temporarily.

Work is underway to investigate as quickly as possible whether anyone may have accessed sensitive personal data from the database, as well as sort out and rectify any deficiencies.

Source

Because of the attack, the Swedish Public Health Agency was not able to report complete COVID-19 stats since the database shut down, and while the investigation is ongoing, no additional updates will be issued as well.

Translated the tweet will read:

Even if so far no evidence of unauthorized parties accessing sensitive information was found, the investigation will last at least a few more days until the reporting process will be restarted.

The SmiNet database, which stores electronic reports of infectious diseases, including covid-19, was previously closed for security reasons after several intrusion attempts. After adjustments to further increase security, the database has been running again since the evening of 28 May.

More time is needed to ensure that the statistics are complete so that a reliable assessment of the epidemiological situation can be made. Therefore, the next update of the statistics on cases of covid-19 will be on Thursday, June 3. Data from care providers and laboratories are then estimated to have been reported and analyzed.

The investigation into unauthorized access to sensitive information is still ongoing.

The incident has been reported to the Police and to the Privacy Protection Authority.

Source

This is not the first event of this kind, as two years ago the 1177 Swedish Healthcare Guide service for health care information was affected by a data breach after the company in charge of managing its storage server exposed it to…

Source…