Company Details
south-country-health-alliance
71
457
62
mnscha.org
0
SOU_1086423
In-progress

South Country Health Alliance Company CyberSecurity Posture
mnscha.orgSouth Country Health Alliance is a county-based purchasing health plan serving eight Minnesota counties - Brown, Dodge, Goodhue, Kanabec, Sibley, Steele, Wabasha and Waseca - in a joint effort to support accessible, quality health care through partnerships with community services and local providers for Minnesota Health Care Program enrollees.
Company Details
south-country-health-alliance
71
457
62
mnscha.org
0
SOU_1086423
In-progress
Between 650 and 699

SCHA Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General reported that South Country Health Alliance (SCHA) experienced unauthorized access to an employee email account on June 25, 2020, discovered on September 14, 2020. A total of 66,874 individuals were affected, including 3 residents of Maine who were notified on December 30, 2020. Personal information potentially compromised includes Social Security Numbers.
Description: **Wabasha County Data Breach Exposes Resident Information via Emergency Notification System** Wabasha County, Minnesota, officials disclosed a data breach affecting its emergency notification system, OnSolve CodeRED, after a forensic investigation confirmed unauthorized access by an organized cybercriminal group. The incident, first reported to the county’s emergency management office in November, involved the potential exfiltration of user data, including names, addresses, email addresses, phone numbers, and passwords tied to the CodeRED platform. In a December 10 Facebook statement, the Wabasha County Sheriff’s Office revealed that the compromised system had been disabled and that the county is transitioning to an upgraded emergency notification system. While the investigation remains ongoing, officials urged residents who reused the exposed CodeRED password for other accounts to update their credentials immediately. The breach highlights vulnerabilities in third-party emergency alert systems, raising concerns about the security of sensitive resident data. Wabasha County Emergency Management Director Brenda Tomlinson is available for further inquiries at 651-565-3069 or via email.


South Country Health Alliance has 20.48% more incidents than the average of same-industry companies with at least one recorded incident.
South Country Health Alliance has 29.87% more incidents than the average of all companies with at least one recorded incident.
South Country Health Alliance reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
SCHA cyber incidents detection timeline including parent company and subsidiaries

South Country Health Alliance is a county-based purchasing health plan serving eight Minnesota counties - Brown, Dodge, Goodhue, Kanabec, Sibley, Steele, Wabasha and Waseca - in a joint effort to support accessible, quality health care through partnerships with community services and local providers for Minnesota Health Care Program enrollees.

Ardent Health is a leading provider of healthcare in communities across the country. With a focus on consumer-friendly processes and investments in innovative services and technologies, Ardent is passionate about making healthcare better and easier to access. Through its subsidiaries, Ardent owns an

From a single medical centre to a performance-driven healthcare enterprise spread across more than 400+ medical establishments, including 15 hospitals, 120 clinics and 307 pharmacies in GCC and growing, Aster DM Healthcare has transitioned into being the leading healthcare authority across the Middl

At Mercy Health, we understand that every family is a universe. A network of people who love, and support, and count on one other to be there. Everybody means the world to someone and we are committed to care for others so they can be there for the ones they love. With nearly 35,000 employees across

Adventist Health is a faith-inspired, nonprofit integrated health system serving more than 100 communities on the West Coast and Hawaii with over 440 sites of care. Founded on Adventist heritage and values, Adventist Health provides care in hospitals, clinics, home care agencies, hospice agencies, a

Trinity Health is one of the largest not-for-profit, Catholic health care systems in the nation. It is a family of 123,000 colleagues and nearly 27,000 physicians and clinicians caring for diverse communities across 26 states. Nationally recognized for care and experience, the Trinity Health system

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues – including more than 40,000 physicians, pharmacists,

OhioHealth is a nationally recognized, not-for-profit, faith-based health system of more than 35,000 associates, providers and volunteers. We lead with our mission to improve the health of those we serve throughout our 16 hospitals and 200+ urgent, primary and specialty care sites spanning 50 Ohio c

Det handler om liv. Om at bringe liv til verden og skabe livskvalitet. Om at redde liv og forbedre liv. Som medarbejder i Region Hovedstaden træder du ind i en verden af muligheder og mangfoldighed med plads til dine ambitioner. Du er en del af et stærkt fagligt miljø, hvor vi har fingeren på pulsen
Catholic Health Initiatives, a nonprofit, faith-based health system formed in 1996 through the consolidation of four Catholic health systems, expresses its mission each day by creating and nurturing healthy communities in the hundreds of sites across the nation where we provide care. One of the nati
.png)
In 2023, North Korea launched 1.3 million cyberattacks per day on South Korea. South Korea's new cybersecurity strategy makes a few...
South Dakota local governments have paid “thousands or even hundreds of thousands of dollars to remediate the risk” to their IT networks.
Accenture has appointed Richard Harrison as the new leader of its Cybersecurity practice in New Zealand.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of South Country Health Alliance is http://www.mnscha.org.
According to Rankiteo, South Country Health Alliance’s AI-generated cybersecurity score is 676, reflecting their Weak security posture.
According to Rankiteo, South Country Health Alliance currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, South Country Health Alliance is not certified under SOC 2 Type 1.
According to Rankiteo, South Country Health Alliance does not hold a SOC 2 Type 2 certification.
According to Rankiteo, South Country Health Alliance is not listed as GDPR compliant.
According to Rankiteo, South Country Health Alliance does not currently maintain PCI DSS compliance.
According to Rankiteo, South Country Health Alliance is not compliant with HIPAA regulations.
According to Rankiteo,South Country Health Alliance is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
South Country Health Alliance operates primarily in the Hospitals and Health Care industry.
South Country Health Alliance employs approximately 71 people worldwide.
South Country Health Alliance presently has no subsidiaries across any sectors.
South Country Health Alliance’s official LinkedIn profile has approximately 457 followers.
South Country Health Alliance is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, South Country Health Alliance does not have a profile on Crunchbase.
Yes, South Country Health Alliance maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/south-country-health-alliance.
As of December 12, 2025, Rankiteo reports that South Country Health Alliance has experienced 2 cybersecurity incidents.
South Country Health Alliance has an estimated 30,994 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with forensic investigation, and containment measures with compromised system disabled, and remediation measures with replacing with an improved emergency notification system, and communication strategy with public advisory via facebook and contact information for inquiries..
Title: South Country Health Alliance Email Account Breach
Description: Unauthorized access to an employee email account at South Country Health Alliance (SCHA) potentially compromising personal information including Social Security Numbers.
Date Detected: 2020-09-14
Date Publicly Disclosed: 2020-12-30
Type: Data Breach
Attack Vector: Email Compromise
Vulnerability Exploited: Unauthorized Access
Title: Wabasha County Emergency Notification System Data Breach
Description: A data breach related to Wabasha County's emergency notification system, OnSolve CodeRED, has potentially impacted residents' online security. An organized cybercriminal group claimed responsibility, and data including users' names, addresses, email addresses, phone numbers, and passwords may have been removed from the system.
Date Detected: 2023-11
Date Publicly Disclosed: 2023-12-10
Type: Data Breach
Threat Actor: Organized cybercriminal group
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email Account.

Data Compromised: Social security numbers
Systems Affected: Employee Email Account

Data Compromised: Users' names, addresses, email addresses, phone numbers, and passwords
Systems Affected: OnSolve CodeRED emergency notification system
Operational Impact: System disabled and being replaced
Brand Reputation Impact: Potential impact due to apology and public disclosure
Identity Theft Risk: High due to exposure of personally identifiable information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Social Security Numbers, and Personally identifiable information (PII).

Entity Name: South Country Health Alliance
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 66874

Entity Name: Wabasha County Emergency Management
Entity Type: Government
Industry: Public Safety/Emergency Management
Location: Wabasha, Minnesota, USA
Customers Affected: Residents using OnSolve CodeRED

Third Party Assistance: Forensic investigation
Containment Measures: Compromised system disabled
Remediation Measures: Replacing with an improved emergency notification system
Communication Strategy: Public advisory via Facebook and contact information for inquiries
Third-Party Assistance: The company involves third-party assistance in incident response through Forensic investigation.

Type of Data Compromised: Social security numbers
Number of Records Exposed: 66874
Sensitivity of Data: High

Type of Data Compromised: Personally identifiable information (PII)
Sensitivity of Data: High (names, addresses, email addresses, phone numbers, passwords)
Data Exfiltration: Data may have been removed from the system
Personally Identifiable Information: Names, addresses, email addresses, phone numbers, passwords
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Replacing with an improved emergency notification system.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by compromised system disabled.

Recommendations: Change passwords for any accounts using the same password as CodeRED
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Change passwords for any accounts using the same password as CodeRED.

Source: Maine Office of the Attorney General

Source: Wabasha County Sheriff's Office Facebook post
Date Accessed: 2023-12-10
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney General, and Source: Wabasha County Sheriff's Office Facebook postDate Accessed: 2023-12-10.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public advisory via Facebook and contact information for inquiries.

Stakeholder Advisories: Public advisory to change passwords and contact emergency management for inquiries
Customer Advisories: Strong encouragement to change passwords for any accounts using the same password as CodeRED
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Public advisory to change passwords and contact emergency management for inquiries and Strong encouragement to change passwords for any accounts using the same password as CodeRED.

Entry Point: Email Account

Corrective Actions: Replacing the compromised system with an improved emergency notification system
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Forensic investigation.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Replacing the compromised system with an improved emergency notification system.
Last Attacking Group: The attacking group in the last incident was an Organized cybercriminal group.
Most Recent Incident Detected: The most recent incident detected was on 2020-09-14.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-12-10.
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security Numbers, , Users' names, addresses, email addresses, phone numbers and and passwords.
Most Significant System Affected: The most significant system affected in an incident was Employee Email Account and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Forensic investigation.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Compromised system disabled.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Users' names, addresses, email addresses, phone numbers, and passwords and Social Security Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 742.0.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Change passwords for any accounts using the same password as CodeRED.
Most Recent Source: The most recent source of information about an incident are Wabasha County Sheriff's Office Facebook post and Maine Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Public advisory to change passwords and contact emergency management for inquiries, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Strong encouragement to change passwords for any accounts using the same password as CodeRED.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email Account.
.png)
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.
MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.
MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.