Company Details
molina-healthcare
17,236
267,749
62
molinahealthcare.com
0
MOL_5835241
In-progress

Molina Healthcare Company CyberSecurity Posture
molinahealthcare.comMolina Healthcare is a FORTUNE 500 company that is focused exclusively on government-sponsored health care programs for families and individuals who qualify for government sponsored health care. Molina Healthcare contracts with state governments and serves as a health plan providing a wide range of quality health care services to families and individuals. Molina Healthcare offers health plans in Arizona, California, Florida, Idaho, Illinois, Kentucky, Massachusetts, Michigan, Mississippi, Nevada, New Mexico, New York, Ohio, South Carolina, Texas, Utah, Virginia, Washington and Wisconsin. Molina also offers a Medicare product and has been selected in several states to participate in duals demonstration projects to manage the care for those eligible for both Medicaid and Medicare.
Company Details
molina-healthcare
17,236
267,749
62
molinahealthcare.com
0
MOL_5835241
In-progress
Between 750 and 799

Molina Healthcare Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that Molina Healthcare of California experienced a breach involving protected health information (PHI) on September 18, 2015. The breach occurred on March 26, 2015, when a former CVS employee took PHI and sent it to a personal computer, affecting an unspecified number of individuals.
Description: MolinaHealthcare.com suffered from a data breach incident that exposed every other patient's data to anyone logged into the site. In this attack a single hyperlink to a patient record would allow an attacker to enumerate and download all other claims. The exposed data includes names, addresses and dates of birth, as well as potentially sensitive information that may point to specific diseases, such as medical procedure codes and any prescribed medications. They took their ePortal temporarily offline to perform additional testing of their system security.
Description: A security flaw in the patient portal of Molina Healthcare was exploited in a cyber security incident. The incident exposed the patients' names, addresses, birthdates, diagnosis, medication, and other medically pertinent information. Molina Healthcare immediately shut down the ePortal system temporarily to perform additional testing of their system security and restore their system.


No incidents recorded for Molina Healthcare in 2025.
No incidents recorded for Molina Healthcare in 2025.
No incidents recorded for Molina Healthcare in 2025.
Molina Healthcare cyber incidents detection timeline including parent company and subsidiaries

Molina Healthcare is a FORTUNE 500 company that is focused exclusively on government-sponsored health care programs for families and individuals who qualify for government sponsored health care. Molina Healthcare contracts with state governments and serves as a health plan providing a wide range of quality health care services to families and individuals. Molina Healthcare offers health plans in Arizona, California, Florida, Idaho, Illinois, Kentucky, Massachusetts, Michigan, Mississippi, Nevada, New Mexico, New York, Ohio, South Carolina, Texas, Utah, Virginia, Washington and Wisconsin. Molina also offers a Medicare product and has been selected in several states to participate in duals demonstration projects to manage the care for those eligible for both Medicaid and Medicare.


Formed in 1994, Brown University Health (Formerly Lifespan) is a not-for-profit health system based in Providence, RI comprising three teaching hospitals of The Warren Alpert Medical School of Brown University: Rhode Island Hospital and its Hasbro Children's; The Miriam Hospital; and Bradley Hospita

The University of Texas MD Anderson Cancer Center is one of the world's most respected centers devoted exclusively to cancer patient care, research, education and prevention. MD Anderson provides cancer care at several convenient locations throughout the Greater Houston Area and collaborates with co

Welcome to the official LinkedIn page for McKesson Corporation. We're an impact-driven healthcare organization dedicated to “Advancing Health Outcomes For All.” As a global healthcare company, we touch virtually every aspect of health. Our leaders empower our people to lead with a growth mindset an

The Medical University of South Carolina (MUSC) is a public institution of higher learning the purpose of which is to preserve and optimize human life in South Carolina and beyond. The university provides an interprofessional environment for learning and discovery through education of health care p
Abbott is a global healthcare leader that helps people live more fully at all stages of life. Our portfolio of life-changing technologies spans the spectrum of healthcare, with leading businesses and products in diagnostics, medical devices, nutritional and branded generic medicines. Our 114,000 col

GeBBS Healthcare Solutions is a KLAS rated leading provider of Revenue Cycle Management (RCM) services and Risk Adjustment solutions. GeBBS’ innovative technology, combined with over 14,000-strong global workforce, helps clients improve financial performance, adhere to compliance, and enhance the pa

Advocate Health Care is proud to be a part of Advocate Health, the third-largest nonprofit integrated health system in the U.S. Advocate Health is the third-largest nonprofit, integrated health system in the United States, created from the combination of Advocate Aurora Health and Atrium Health. Pr
Mayo Clinic has expanded and changed in many ways, but our values remain true to the vision of our founders. Our primary value – The needs of the patient come first – guides our plans and decisions as we create the future of health care. Join us and you'll find a culture of teamwork, professionalism
Fresenius Medical Care is the world’s leading provider of products and services for individuals with renal diseases. We aim to create a future worth living for chronically and critically ill patients – worldwide and every day. Thanks to our decades of experience in dialysis, our innovative research
.png)
Over 500 thought leaders and 150 cybersecurity leaders gathered in Dubai for a special joint session of the Annual Meetings of the Global...
UnitedHealth Group (UNH) shares experienced a dramatic surge of over 12% in premarket trading on Friday, August 15, 2025, following the...
Senator Jacky Rosen has sent a letter to Robert Kennedy Jr., the Secretary of Health and Human Services (HHS) today regarding recent cuts.
The American Hospital Association (AHA) named James “Scott” Gee deputy national adviser for cybersecurity and risk.
Robust growth in premium revenue, up 17% from the previous year.Strategic acquisitions and contract wins expanding market presence.
Change Healthcare disconnected its systems to prevent further impact as a result of an ongoing cybersecurity issue.
Janow was recognized by peers for successfully leading Mastercard's CEO transition and cybersecurity efforts.
Major Medicaid insurer Molina Healthcare gave $1 million during the first half of 2023 to Republican governors, more money than in the past...
Aveanna Healthcare agreed to pay $425000 and adopt new security measures after several phishing-related healthcare data breaches impacted...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Molina Healthcare is https://careers.molinahealthcare.com/.
According to Rankiteo, Molina Healthcare’s AI-generated cybersecurity score is 768, reflecting their Fair security posture.
According to Rankiteo, Molina Healthcare currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Molina Healthcare is not certified under SOC 2 Type 1.
According to Rankiteo, Molina Healthcare does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Molina Healthcare is not listed as GDPR compliant.
According to Rankiteo, Molina Healthcare does not currently maintain PCI DSS compliance.
According to Rankiteo, Molina Healthcare is not compliant with HIPAA regulations.
According to Rankiteo,Molina Healthcare is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Molina Healthcare operates primarily in the Hospitals and Health Care industry.
Molina Healthcare employs approximately 17,236 people worldwide.
Molina Healthcare presently has no subsidiaries across any sectors.
Molina Healthcare’s official LinkedIn profile has approximately 267,749 followers.
Molina Healthcare is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Molina Healthcare does not have a profile on Crunchbase.
Yes, Molina Healthcare maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/molina-healthcare.
As of November 27, 2025, Rankiteo reports that Molina Healthcare has experienced 3 cybersecurity incidents.
Molina Healthcare has an estimated 29,991 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with shutdown of eportal system, and remediation measures with additional testing of system security, and recovery measures with restoration of eportal system, and containment measures with taking eportal temporarily offline, and remediation measures with additional testing of system security..
Title: Molina Healthcare Patient Portal Data Breach
Description: A security flaw in the patient portal of Molina Healthcare was exploited, exposing patients' names, addresses, birthdates, diagnosis, medication, and other medically pertinent information.
Type: Data Breach
Attack Vector: Exploitation of a Security Flaw
Vulnerability Exploited: Security flaw in the patient portal
Title: MolinaHealthcare.com Data Breach
Description: MolinaHealthcare.com suffered from a data breach incident that exposed every other patient's data to anyone logged into the site. In this attack, a single hyperlink to a patient record would allow an attacker to enumerate and download all other claims. The exposed data includes names, addresses, and dates of birth, as well as potentially sensitive information that may point to specific diseases, such as medical procedure codes and any prescribed medications. They took their ePortal temporarily offline to perform additional testing of their system security.
Type: Data Breach
Attack Vector: Exploitation of a hyperlink vulnerability
Vulnerability Exploited: Hyperlink vulnerability allowing enumeration and download of patient records
Title: Molina Healthcare of California PHI Breach
Description: A former CVS employee took protected health information (PHI) and sent it to a personal computer, affecting an unspecified number of individuals.
Date Detected: 2015-09-18
Type: Data Breach
Attack Vector: Insider Threat
Threat Actor: Former CVS Employee
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Addresses, Birthdates, Diagnosis, Medication, Other medically pertinent information
Systems Affected: Patient Portal (ePortal)
Downtime: Temporary shutdown of ePortal system

Data Compromised: Names, Addresses, Dates of birth, Medical procedure codes, Prescribed medications
Systems Affected: ePortal
Downtime: Temporary

Data Compromised: Protected Health Information (PHI)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Birthdates, Diagnosis, Medication, Other Medically Pertinent Information, , Personal Information, Medical Information, and Protected Health Information (PHI).

Entity Name: Molina Healthcare
Entity Type: Healthcare Provider
Industry: Healthcare

Entity Name: MolinaHealthcare.com
Entity Type: Healthcare Provider
Industry: Healthcare

Entity Name: Molina Healthcare of California
Entity Type: Healthcare Provider
Industry: Healthcare
Location: California

Containment Measures: Shutdown of ePortal system
Remediation Measures: Additional testing of system security
Recovery Measures: Restoration of ePortal system

Containment Measures: Taking ePortal temporarily offline
Remediation Measures: Additional testing of system security

Type of Data Compromised: Names, Addresses, Birthdates, Diagnosis, Medication, Other medically pertinent information
Sensitivity of Data: High

Type of Data Compromised: Personal information, Medical information
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesDates of birth

Type of Data Compromised: Protected Health Information (PHI)
Sensitivity of Data: High
Data Exfiltration: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Additional testing of system security, Additional testing of system security.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by shutdown of eportal system and taking eportal temporarily offline.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Restoration of ePortal system.

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General.
Last Attacking Group: The attacking group in the last incident was an Former CVS Employee.
Most Recent Incident Detected: The most recent incident detected was on 2015-09-18.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Birthdates, Diagnosis, Medication, Other medically pertinent information, , Names, Addresses, Dates of birth, Medical procedure codes, Prescribed medications, and Protected Health Information (PHI).
Most Significant System Affected: The most significant system affected in an incident was ePortal.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Shutdown of ePortal system and Taking ePortal temporarily offline.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Addresses, Diagnosis, Medical procedure codes, Birthdates, Protected Health Information (PHI), Prescribed medications, Medication, Dates of birth, Other medically pertinent information and Names.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.