Company Details
helse-sor-ost-rhf
24,140
13,857
62
helse-sorost.no
34
HEL_8705423
Completed

Helse Sør-Øst RHF Company CyberSecurity Posture
helse-sorost.noSouth Eastern Norway Regional health Authority is a merger between the former Eastern and South regional Health Authority. Responsible for secondary healthcare services for the south-eastern parts of Norway 2.5 million people (approx 52% of population) cost containment budget 58 billion Nkr. 100% state-owned trust with full legal and financial responsibilities, own board and non-political CEO/management. Integrated payer and provider with a two-fold responsibility: Own and operate hospitals as efficiently as possible Provide region with high quality secondary care services (through own hospitals, private hospitals or hospitals in other regions) Ambitious turnaround program with 5 main elements; Hospital structure and service reconfiguration, Research strategy, IT and support services, Best practice management Mobilizing staff and leaders
Company Details
helse-sor-ost-rhf
24,140
13,857
62
helse-sorost.no
34
HEL_8705423
Completed
Between 650 and 699

HSR Global Score (TPRM)XXXX

Description: The healthcare organisation responsible for overseeing hospitals in the southeast of Norway, called Health South-East RHF, has announced that there was a security breach that exposed private information belonging to over 50% of the population. HelseCERT, the national healthcare security centre, released a statement about the event after discovering unusual behaviour against local computer systems. The security vulnerability, according to HelseCert, was caused by an attack carried out by skilled and knowledgeable hackers. Authorities and experts surmise that the Health South-East RHF data breach may have been the consequence of a foreign state's cyber espionage effort, which aimed to obtain information about politicians, government employees, and members of the armed forces.
Description: A sophisticated cyberattack targeted **Health South-East RHF**, Norway’s regional healthcare authority overseeing hospitals across ten counties, including Oslo and Akershus. The breach compromised the **personal and health records of ~2.9 million Norwegians**—over half the nation’s population—exposing data such as names, birth dates, social security numbers, diagnosis codes, policy numbers, and billing information. The attackers, described as 'advanced and professional' by **HelseCERT** (Norway’s healthcare cybersecurity response team), exploited abnormal system activity, though the exact exfiltration volume and patient safety impacts remain unconfirmed.The stolen data poses **long-term identity theft risks**, as medical records hold higher dark web value than financial data due to their permanence and depth. Fraudsters could file fake insurance claims, tax returns, or commit financial fraud using the exposed details. While no immediate patient harm (e.g., delayed treatments) was reported, the breach undermines trust in Norway’s **critical national infrastructure**, given healthcare’s intersection with state security. Authorities, including **NorCERT**, are investigating the attack’s scale and attribution, with suspicions ranging from cybercriminal syndicates to state-sponsored actors.


Helse Sør-Øst RHF has 33.33% more incidents than the average of same-industry companies with at least one recorded incident.
Helse Sør-Øst RHF has 56.25% more incidents than the average of all companies with at least one recorded incident.
Helse Sør-Øst RHF reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
HSR cyber incidents detection timeline including parent company and subsidiaries

South Eastern Norway Regional health Authority is a merger between the former Eastern and South regional Health Authority. Responsible for secondary healthcare services for the south-eastern parts of Norway 2.5 million people (approx 52% of population) cost containment budget 58 billion Nkr. 100% state-owned trust with full legal and financial responsibilities, own board and non-political CEO/management. Integrated payer and provider with a two-fold responsibility: Own and operate hospitals as efficiently as possible Provide region with high quality secondary care services (through own hospitals, private hospitals or hospitals in other regions) Ambitious turnaround program with 5 main elements; Hospital structure and service reconfiguration, Research strategy, IT and support services, Best practice management Mobilizing staff and leaders


UMass Memorial Health is the health and wellness partner of the people of Central Massachusetts. Through pain and pandemics, our commitment to our communities never wanes. We use knowledge and innovation to create breakthrough medicine, to create jobs, and to make life better for those we serve. We

Com cerca de 80 anos de experiência, a Hapvida é hoje a maior empresa de saúde integrada da América Latina. A companhia, que possui mais de 69 mil colaboradores, atende quase 16 milhões de beneficiários de saúde e odontologia espalhados pelas cinco regiões do Brasil. Todo o aparato foi construído a

Thomas Jefferson University and Thomas Jefferson University Hospitals are partners in providing excellent clinical and compassionate care for our patients in the Philadelphia region, educating the health professionals of tomorrow in a variety of disciplines and discovering new knowledge that will de

Formed in 1994, Brown University Health (Formerly Lifespan) is a not-for-profit health system based in Providence, RI comprising three teaching hospitals of The Warren Alpert Medical School of Brown University: Rhode Island Hospital and its Hasbro Children's; The Miriam Hospital; and Bradley Hospita
The International SOS Group of Companies has been in the business of saving lives for over 40 years. Protecting global workforces from health and security threats, we deliver customised health, security risk management and wellbeing solutions to fuel our clients’ growth and productivity. In the even

OhioHealth is a nationally recognized, not-for-profit, faith-based health system of more than 35,000 associates, providers and volunteers. We lead with our mission to improve the health of those we serve throughout our 16 hospitals and 200+ urgent, primary and specialty care sites spanning 50 Ohio c

As a nationally ranked academic medical center and one of Alabama’s largest employers, UAB Medicine is about teamwork, support, mentorship, and collaboration. Employees are empowered to lead, learn, and innovate as they deliver world-class care to every patient, every family, every time. When you ar
The people of Memorial Sloan Kettering Cancer Center (MSK) are united by a singular mission: ending cancer for life. Our specialized care teams provide personalized, compassionate, expert care to patients of all ages. Informed by basic research done at our Sloan Kettering Institute, scientists acros

El Seguro Social de Salud, EsSalud, es un organismo público descentralizado, con personería jurídica de derecho público interno, adscrito al Sector Trabajo y Promoción Social. Tiene por finalidad dar cobertura a los asegurados y sus derechohabientes, a través del otorgamiento de prestaciones de pre
.png)
Hackers have breached the systems of the Southern and Eastern Norway Regional Health Authority (Helse Sør-Øst RHF), and possibly made off...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Helse Sør-Øst RHF is https://helse-sorost.no.
According to Rankiteo, Helse Sør-Øst RHF’s AI-generated cybersecurity score is 692, reflecting their Weak security posture.
According to Rankiteo, Helse Sør-Øst RHF currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Helse Sør-Øst RHF is not certified under SOC 2 Type 1.
According to Rankiteo, Helse Sør-Øst RHF does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Helse Sør-Øst RHF is not listed as GDPR compliant.
According to Rankiteo, Helse Sør-Øst RHF does not currently maintain PCI DSS compliance.
According to Rankiteo, Helse Sør-Øst RHF is not compliant with HIPAA regulations.
According to Rankiteo,Helse Sør-Øst RHF is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Helse Sør-Øst RHF operates primarily in the Hospitals and Health Care industry.
Helse Sør-Øst RHF employs approximately 24,140 people worldwide.
Helse Sør-Øst RHF presently has no subsidiaries across any sectors.
Helse Sør-Øst RHF’s official LinkedIn profile has approximately 13,857 followers.
Helse Sør-Øst RHF is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Helse Sør-Øst RHF does not have a profile on Crunchbase.
Yes, Helse Sør-Øst RHF maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/helse-sor-ost-rhf.
As of November 27, 2025, Rankiteo reports that Helse Sør-Øst RHF has experienced 2 cybersecurity incidents.
Helse Sør-Øst RHF has an estimated 30,007 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (investigation ongoing; norcert and helsecert involved), and third party assistance with norcert (norwegian cert), third party assistance with helsecert (healthcare cert), and communication strategy with public disclosure via norwegian media (vg); advisories likely issued to affected individuals..
Title: Data Breach at Health South-East RHF
Description: The healthcare organisation responsible for overseeing hospitals in the southeast of Norway, called Health South-East RHF, has announced that there was a security breach that exposed private information belonging to over 50% of the population.
Type: Data Breach
Threat Actor: Skilled and knowledgeable hackers
Motivation: Cyber espionage to obtain information about politicians, government employees, and members of the armed forces.
Title: Massive Data Breach at Health South-East Regional Health Authority (RHF) in Norway
Description: Cybercriminals stole a massive trove of Norway's healthcare data in a recent breach, impacting over half of the nation's population (2.9 million out of 5.2 million). An unknown hacker or group breached the systems of Health South-East RHF, stealing personal info and health records. The attack was detected by HelseCERT, which described the culprits as 'advanced and professional.' The full extent of data exfiltration and consequences for patient safety remain unclear.
Date Publicly Disclosed: 2023-XX-XX (announced on a Monday; exact date not specified)
Type: Data Breach
Threat Actor: Unknown (described as 'advanced and professional'; possibly advanced criminals or state-sponsored actors)
Motivation: Financial gain (identity theft, fraud)Potential chaos (if state-sponsored)Data monetization on dark web
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Private information

Data Compromised: Personal information, Health records, Names, Birth dates, Policy numbers, Diagnosis codes, Social security numbers, Billing information
Systems Affected: Health South-East RHF computer systemsHospitals in southeast Norway (Østfold, Akershus, Oslo, Hedmark, Oppland, Buskerud, Vestfold, Telemark, Aust-Agder, Vest-Agder)
Brand Reputation Impact: High (long-term identity theft risk for 2.9 million individuals)
Identity Theft Risk: Critical (lifelong risk due to sensitive health data exposure)
Payment Information Risk: Moderate (billing information compromised)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Private information, Personal Identifiable Information (Pii), Protected Health Information (Phi), Financial/Billing Data and .

Entity Name: Health South-East RHF
Entity Type: Healthcare Organisation
Industry: Healthcare
Location: Southeast of Norway
Customers Affected: Over 50% of the population

Entity Name: Health South-East Regional Health Authority (RHF)
Entity Type: Healthcare Organization (Regional Health Authority)
Industry: Healthcare
Location: Southeast Norway (Østfold, Akershus, Oslo, Hedmark, Oppland, Buskerud, Vestfold, Telemark, Aust-Agder, Vest-Agder)
Size: Large (manages multiple hospitals; serves ~2.9 million patients)
Customers Affected: 2.9 million (out of Norway's 5.2 million population)

Incident Response Plan Activated: Yes (investigation ongoing; NorCERT and HelseCERT involved)
Third Party Assistance: Norcert (Norwegian Cert), Helsecert (Healthcare Cert).
Communication Strategy: Public disclosure via Norwegian media (VG); advisories likely issued to affected individuals
Incident Response Plan: The company's incident response plan is described as Yes (investigation ongoing; NorCERT and HelseCERT involved).
Third-Party Assistance: The company involves third-party assistance in incident response through NorCERT (Norwegian CERT), HelseCERT (Healthcare CERT), .

Type of Data Compromised: Private information

Type of Data Compromised: Personal identifiable information (pii), Protected health information (phi), Financial/billing data
Number of Records Exposed: 2.9 million (estimated)
Sensitivity of Data: Extremely high (lifelong identity theft risk)
Data Exfiltration: Likely (confirmed breach; extent unclear)
Personally Identifiable Information: NamesBirth datesSocial security numbersPolicy numbersDiagnosis codesAddressesPhone numbersEmployment history

Regulatory Notifications: Likely (mandatory under GDPR and Norwegian healthcare laws)

Recommendations: Affected individuals should monitor financial accounts for unauthorized activity., File taxes early to prevent refund fraud., Remain vigilant against identity theft indefinitely (lifelong risk)., Healthcare organizations should prioritize cybersecurity for critical infrastructure.Affected individuals should monitor financial accounts for unauthorized activity., File taxes early to prevent refund fraud., Remain vigilant against identity theft indefinitely (lifelong risk)., Healthcare organizations should prioritize cybersecurity for critical infrastructure.Affected individuals should monitor financial accounts for unauthorized activity., File taxes early to prevent refund fraud., Remain vigilant against identity theft indefinitely (lifelong risk)., Healthcare organizations should prioritize cybersecurity for critical infrastructure.Affected individuals should monitor financial accounts for unauthorized activity., File taxes early to prevent refund fraud., Remain vigilant against identity theft indefinitely (lifelong risk)., Healthcare organizations should prioritize cybersecurity for critical infrastructure.

Source: HelseCERT

Source: VG (Norwegian publication)

Source: NorCERT/HelseCERT statements
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: HelseCERT, and Source: VG (Norwegian publication), and Source: NorCERT/HelseCERT statements.

Investigation Status: Ongoing (early phase; 'far too early to say how big the attack is')
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure via Norwegian media (VG); advisories likely issued to affected individuals.

Customer Advisories: Warning about lifelong identity theft risk.Guidance on monitoring financial/tax activity.Vigilance against fraudulent use of stolen data.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Warning About Lifelong Identity Theft Risk., Guidance On Monitoring Financial/Tax Activity., Vigilance Against Fraudulent Use Of Stolen Data. and .

High Value Targets: Politicians, Government Employees, Members Of The Armed Forces,
Data Sold on Dark Web: Politicians, Government Employees, Members Of The Armed Forces,

High Value Targets: Health Records, Pii,
Data Sold on Dark Web: Health Records, Pii,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Norcert (Norwegian Cert), Helsecert (Healthcare Cert), .
Last Attacking Group: The attacking group in the last incident were an Skilled and knowledgeable hackers and Unknown (described as 'advanced and professional'; possibly advanced criminals or state-sponsored actors).
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-XX-XX (announced on a Monday; exact date not specified).
Most Significant Data Compromised: The most significant data compromised in an incident were Private information, Personal information, Health records, Names, Birth dates, Policy numbers, Diagnosis codes, Social security numbers, Billing information and .
Most Significant System Affected: The most significant system affected in an incident were Health South-East RHF computer systemsHospitals in southeast Norway (Østfold, Akershus, Oslo, Hedmark, Oppland, Buskerud, Vestfold, Telemark, Aust-Agder, Vest-Agder).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was norcert (norwegian cert), helsecert (healthcare cert), .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Diagnosis codes, Birth dates, Policy numbers, Health records, Billing information, Private information, Social security numbers and Personal information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.9M.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Remain vigilant against identity theft indefinitely (lifelong risk)., Healthcare organizations should prioritize cybersecurity for critical infrastructure., Affected individuals should monitor financial accounts for unauthorized activity. and File taxes early to prevent refund fraud..
Most Recent Source: The most recent source of information about an incident are VG (Norwegian publication), NorCERT/HelseCERT statements and HelseCERT.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (early phase; 'far too early to say how big the attack is').
Most Recent Customer Advisory: The most recent customer advisory issued was an Warning about lifelong identity theft risk.Guidance on monitoring financial/tax activity.Vigilance against fraudulent use of stolen data.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.