{
	"id": "06177fba-e0ac-4336-a4c0-a47135c9add1",
	"created_at": "2026-04-06T00:20:16.843929Z",
	"updated_at": "2026-04-10T13:12:26.41117Z",
	"deleted_at": null,
	"sha1_hash": "8498badf518b0a6484d721defa45446438c1cfa7",
	"title": "Johnson \u0026 Johnson discloses IBM data breach impacting patients",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2143155,
	"plain_text": "Johnson \u0026 Johnson discloses IBM data breach impacting patients\r\nBy Bill Toulas\r\nPublished: 2023-09-07 · Archived: 2026-04-05 23:15:28 UTC\r\nJohnson \u0026 Johnson Health Care Systems (\"Janssen\") has informed its CarePath customers that their sensitive information\r\nhas been compromised in a third-party data breach involving IBM.\r\nIBM is a technology service provider for Janssen; specifically, it manages the CarePath application and database supporting\r\nits functions.\r\nCarePath is an application designed to help patients gain access to Janssen medications, offer discounts and cost-saving\r\nadvice on eligible prescriptions, provides guidance on insurance coverage, and serves drug refiling and administering alerts.\r\nhttps://www.bleepingcomputer.com/news/security/johnson-and-johnson-discloses-ibm-data-breach-impacting-patients/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/johnson-and-johnson-discloses-ibm-data-breach-impacting-patients/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nAccording to the notice on Janssen's site, the pharmaceutical firm became aware of a previously undocumented method that\r\ncould give unauthorized users access to the CarePath database.\r\nThe firm reported this to IBM, who promptly fixed the security gap and launched an internal investigation to assess if\r\nanyone had exploited the flaw.\r\nUnfortunately, the investigation that was concluded on August 2nd, 2023, showed that unauthorized users accessed the\r\nfollowing CarePath user details:\r\nFull name\r\nContact information\r\nDate of birth\r\nHealth insurance information\r\nMedication information\r\nMedical condition information\r\nThe exposure impacts CarePath users who enrolled on Janssen's online services before July 2nd, 2023, which might indicate\r\nthat the breach occurred on that date or the breached database was a backup.\r\nSocial security numbers and financial account data were not kept in the breached database, so those critical details have not\r\nbeen exposed.\r\nAlso, the pharmaceutical firm has clarified that this security incident doesn't impact Janssen's Pulmonary Hypertension\r\npatients.\r\nThe compromised data could support highly effective phishing, scamming, and social engineering attacks, and considering\r\nthe value of medical data, there is a high chance they will be sold for a premium on darknet markets.\r\nIBM has published a separate announcement about the incident that says there are no indications the stolen data has been\r\nmisused. Still, IBM urges Janssen CarePath users to remain vigilant and closely monitor their account statements for\r\nsuspicious activity.\r\nAlso, the tech giant is now offering a one-year credit monitoring free of charge to all impacted individuals to help protect\r\nthem from fraud.\r\nBoth announcements share toll-free numbers where providers and users may call to address their questions about the\r\nincident or get help enrolling in credit monitoring services.\r\nIBM is also among the hundreds of entities breached by Clop ransomware earlier this year when the notorious threat actors\r\nexploited a zero-day vulnerability on the MOVEit Transfer software used by numerous organizations worldwide.\r\nA couple of weeks back, the Colorado Department of Health Care Policy \u0026 Financing (HCPF) informed four million\r\nindividuals that their personal and medical data had been exposed due to the breach on IBM.\r\nBleepingComputer has asked IBM about whether this incident is related to the MOVEit attack, and a spokesperson told us\r\nthat it is a separate incident caused by different threat actors.\r\nOn the question of how many people have been impacted, IBM told BleepingComputer that they are notifying all CarePath\r\nusers.\r\nArticle updated to add clarifications provided by IBM regarding the attack and scope of the incident.\r\nhttps://www.bleepingcomputer.com/news/security/johnson-and-johnson-discloses-ibm-data-breach-impacting-patients/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/johnson-and-johnson-discloses-ibm-data-breach-impacting-patients/\r\nhttps://www.bleepingcomputer.com/news/security/johnson-and-johnson-discloses-ibm-data-breach-impacting-patients/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/johnson-and-johnson-discloses-ibm-data-breach-impacting-patients/"
	],
	"report_names": [
		"johnson-and-johnson-discloses-ibm-data-breach-impacting-patients"
	],
	"threat_actors": [],
	"ts_created_at": 1775434816,
	"ts_updated_at": 1775826746,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/8498badf518b0a6484d721defa45446438c1cfa7.pdf",
		"text": "https://archive.orkl.eu/8498badf518b0a6484d721defa45446438c1cfa7.txt",
		"img": "https://archive.orkl.eu/8498badf518b0a6484d721defa45446438c1cfa7.jpg"
	}
}