ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

WPS Health Insurance is based in Madison, Wis., and is deeply committed to Wisconsin and its citizens. One of the largest health benefits providers in the state, WPS remains not-for-profit and offers health plans to the public and private sectors. WPS offers Preferred Provider Organization (PPO) health plans for individuals and groups, including high-deductible health plan (HDHP) options that allow the use of Health Savings Accounts (HSAs). WPS also has Medicare supplement plans available for individuals who are eligible for Medicare. WPS contracts with health care providers across the state to provide comprehensive provider networks that include the physicians, specialists, clinics, and hospitals that our customers know and trust. We also offer national networks to cover out-of-state health care needs.

WPS Health Insurance A.I CyberSecurity Scoring

WHI

Company Details

Linkedin ID:

wps-health-insurance

Employees number:

1,215

Number of followers:

8,437

NAICS:

524

Industry Type:

Insurance

Homepage:

wpshealth.com

IP Addresses:

4

Company ID:

WPS_1185165

Scan Status:

Completed

AI scoreWHI Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/wps-health-insurance.jpeg
WHI Insurance
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreWHI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/wps-health-insurance.jpeg
WHI Insurance
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

WHI Company CyberSecurity News & History

Past Incidents
8
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Wisconsin Physicians Service Insurance Corporation (WPS)Vulnerability8545/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The notification from CMS revealed that due to a security vulnerability in the MOVEit software, unauthorized third parties gained access to the personal information (PII) of 946,801 Medicare beneficiaries. The breach occurred between May 27 and May 31, 2023, and impacted data related to Medicare claims management and CMS audits. The breach was reported to CMS on July 8, and affected individuals are being notified of the potential compromise of their PII.

Wisconsin Physicians Service Insurance Corporation (WPS)Vulnerability8545/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Centers for Medicare & Medicaid Services (CMS) and WPS announced a security breach stemming from a vulnerability in the MOVEit software by Progress Software. Unauthorized access was gained to PII of Medicare beneficiaries, affecting Medicare claim management and CMS audits of healthcare providers. This incident, which took place between May 27 and May 31, 2023, compromised personal data for 946,801 individuals.

Wisconsin Physicians Service Insurance Corporation (WPS)Vulnerability8545/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: WPS, in conjunction with the CMS, is notifying individuals of a data breach due to a vulnerability in the MOVEit software developed by Progress Software. This breach occurred between May 27 and May 31, 2023, and compromised the PII of Medicare beneficiaries. The exposed data was collected for managing Medicare claims and supporting CMS audits of healthcare providers. This affected PII includes individuals who are not Medicare beneficiaries but have received healthcare services. A total of 946,801 people were notified of the potential leak of their personal information.

Wisconsin Physicians Service Insurance Corporation (WPS)Vulnerability8545/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A security breach occurred involving the MOVEit software used by WPS for handling Medicare administrative services, resulting in unauthorized access to personal information. The breach, dating from May 27 to May 31, 2023, compromised the protected health information (PHI) of Medicare beneficiaries managed for claim purposes and personal identifiable information (PII) supporting CMS audits. Notifications were issued to the affected 946,801 individuals after WPS informed CMS of the breach on July 8.

Wisconsin Physicians Service Insurance CorporationVulnerability8545/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: WPS, a contractor for the Centers for Medicare & Medicaid Services (CMS), experienced a data breach due to a vulnerability in the MOVEit software used for transferring files. This incident, occurring between May 27 and May 31, 2023, potentially compromised the personally identifiable information (PII) of Medicare beneficiaries, related to Medicare claims management, and PII supporting CMS audits of healthcare providers. Approximately 946,801 individuals are affected and notifications are being sent to those whose information was at risk. The breach was disclosed to CMS on July 8, following the discovery of the unauthorized access to personal data.

Wisconsin Physicians Service Insurance Corporation (WPS)Vulnerability8545/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: WPS, in connection with its Medicare administrative services, reported a security breach due to a vulnerability in the MOVEit software provided by Progress Software. This incident potentially compromised the protected health information (PHI) of 946,801 Medicare beneficiaries, including data essential for managing Medicare claims and supporting CMS audits. Unauthorized access occurred between May 27 and May 31, 2023, was discovered later, and notifications to affected individuals commenced following the breach acknowledgment.

Wisconsin Physicians Service Insurance Corporation (WPS)Vulnerability10045/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A security vulnerability in the MOVEit software, developed by Progress Software and used by WPS to transfer files in the provision of services to CMS, led to unauthorized access of personal information. Between May 27 and May 31, 2023, personally identifiable information (PII) of Medicare beneficiaries—collected for managing Medicare claims and CMS audits of healthcare providers—was compromised, affecting up to 946,801 individuals. WPS discovered and reported the breach to CMS, initiating notifications to the impacted parties.

Wisconsin Physicians Service Insurance Corporation (WPS)Vulnerability10046/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: WPS, working with CMS, has begun notifying nearly a million individuals affected by a breach concerning their protected health information. This was due to a security flaw in MOVEit software developed by Progress Software, leading to unauthorized access of Medicare beneficiary PII during file transfers for Medicare claim management and CMS healthcare provider audits. The breach occurred from May 27 to 31, 2023, with WPS informing CMS on July 8. 946,801 Medicare recipients are receiving notifications of this compromise of their personal data.

Wisconsin Physicians Service Insurance Corporation (WPS)
Vulnerability
Severity: 85
Impact: 4
Seen: 5/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The notification from CMS revealed that due to a security vulnerability in the MOVEit software, unauthorized third parties gained access to the personal information (PII) of 946,801 Medicare beneficiaries. The breach occurred between May 27 and May 31, 2023, and impacted data related to Medicare claims management and CMS audits. The breach was reported to CMS on July 8, and affected individuals are being notified of the potential compromise of their PII.

Wisconsin Physicians Service Insurance Corporation (WPS)
Vulnerability
Severity: 85
Impact: 4
Seen: 5/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The Centers for Medicare & Medicaid Services (CMS) and WPS announced a security breach stemming from a vulnerability in the MOVEit software by Progress Software. Unauthorized access was gained to PII of Medicare beneficiaries, affecting Medicare claim management and CMS audits of healthcare providers. This incident, which took place between May 27 and May 31, 2023, compromised personal data for 946,801 individuals.

Wisconsin Physicians Service Insurance Corporation (WPS)
Vulnerability
Severity: 85
Impact: 4
Seen: 5/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: WPS, in conjunction with the CMS, is notifying individuals of a data breach due to a vulnerability in the MOVEit software developed by Progress Software. This breach occurred between May 27 and May 31, 2023, and compromised the PII of Medicare beneficiaries. The exposed data was collected for managing Medicare claims and supporting CMS audits of healthcare providers. This affected PII includes individuals who are not Medicare beneficiaries but have received healthcare services. A total of 946,801 people were notified of the potential leak of their personal information.

Wisconsin Physicians Service Insurance Corporation (WPS)
Vulnerability
Severity: 85
Impact: 4
Seen: 5/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A security breach occurred involving the MOVEit software used by WPS for handling Medicare administrative services, resulting in unauthorized access to personal information. The breach, dating from May 27 to May 31, 2023, compromised the protected health information (PHI) of Medicare beneficiaries managed for claim purposes and personal identifiable information (PII) supporting CMS audits. Notifications were issued to the affected 946,801 individuals after WPS informed CMS of the breach on July 8.

Wisconsin Physicians Service Insurance Corporation
Vulnerability
Severity: 85
Impact: 4
Seen: 5/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: WPS, a contractor for the Centers for Medicare & Medicaid Services (CMS), experienced a data breach due to a vulnerability in the MOVEit software used for transferring files. This incident, occurring between May 27 and May 31, 2023, potentially compromised the personally identifiable information (PII) of Medicare beneficiaries, related to Medicare claims management, and PII supporting CMS audits of healthcare providers. Approximately 946,801 individuals are affected and notifications are being sent to those whose information was at risk. The breach was disclosed to CMS on July 8, following the discovery of the unauthorized access to personal data.

Wisconsin Physicians Service Insurance Corporation (WPS)
Vulnerability
Severity: 85
Impact: 4
Seen: 5/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: WPS, in connection with its Medicare administrative services, reported a security breach due to a vulnerability in the MOVEit software provided by Progress Software. This incident potentially compromised the protected health information (PHI) of 946,801 Medicare beneficiaries, including data essential for managing Medicare claims and supporting CMS audits. Unauthorized access occurred between May 27 and May 31, 2023, was discovered later, and notifications to affected individuals commenced following the breach acknowledgment.

Wisconsin Physicians Service Insurance Corporation (WPS)
Vulnerability
Severity: 100
Impact: 4
Seen: 5/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A security vulnerability in the MOVEit software, developed by Progress Software and used by WPS to transfer files in the provision of services to CMS, led to unauthorized access of personal information. Between May 27 and May 31, 2023, personally identifiable information (PII) of Medicare beneficiaries—collected for managing Medicare claims and CMS audits of healthcare providers—was compromised, affecting up to 946,801 individuals. WPS discovered and reported the breach to CMS, initiating notifications to the impacted parties.

Wisconsin Physicians Service Insurance Corporation (WPS)
Vulnerability
Severity: 100
Impact: 4
Seen: 6/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: WPS, working with CMS, has begun notifying nearly a million individuals affected by a breach concerning their protected health information. This was due to a security flaw in MOVEit software developed by Progress Software, leading to unauthorized access of Medicare beneficiary PII during file transfers for Medicare claim management and CMS healthcare provider audits. The breach occurred from May 27 to 31, 2023, with WPS informing CMS on July 8. 946,801 Medicare recipients are receiving notifications of this compromise of their personal data.

Ailogo

WHI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for WHI

Incidents vs Insurance Industry Average (This Year)

No incidents recorded for WPS Health Insurance in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for WPS Health Insurance in 2025.

Incident Types WHI vs Insurance Industry Avg (This Year)

No incidents recorded for WPS Health Insurance in 2025.

Incident History — WHI (X = Date, Y = Severity)

WHI cyber incidents detection timeline including parent company and subsidiaries

WHI Company Subsidiaries

SubsidiaryImage

WPS Health Insurance is based in Madison, Wis., and is deeply committed to Wisconsin and its citizens. One of the largest health benefits providers in the state, WPS remains not-for-profit and offers health plans to the public and private sectors. WPS offers Preferred Provider Organization (PPO) health plans for individuals and groups, including high-deductible health plan (HDHP) options that allow the use of Health Savings Accounts (HSAs). WPS also has Medicare supplement plans available for individuals who are eligible for Medicare. WPS contracts with health care providers across the state to provide comprehensive provider networks that include the physicians, specialists, clinics, and hospitals that our customers know and trust. We also offer national networks to cover out-of-state health care needs.

Loading...
similarCompanies

WHI Similar Companies

Humana

Humana will never ask, nor require a candidate to provide money for work equipment and network access during the application process. If you become aware of any instances where you as a candidate are asked to provide information and do not believe it is a legitimate request from Humana or affiliate,

Allstate

At Allstate, we're advocates for peace of mind and a good life. And that comes through in everything we do. From building innovative teams that truly understand our customers' needs, to challenging each other to develop our careers in a meaningful way, and finally to the incredible results we're a

A Porto é mais que uma seguradora, é um ecossistema de soluções de serviços de proteção com tecnologia embarcada, para melhorar e facilitar a experiência do cliente. Com mais de 70 anos de mercado, a atuação da companhia se concentra hoje em quatro pilares estratégicos de negócio: Seguros, Saúde, Pr

State Farm

At State Farm®, our mission is to help people manage the risks of everyday life, recover from the unexpected, and realize their dreams. We are passionate and driven to create possibilities, and we’re serious about helping customers by providing solutions for all of life’s moments. Like a good neighb

China Pacific Insurance Company

China Pacific Life Insurance Co., Ltd (CPIC Life in short) was formed on the basis of life insurance business of China Pacific Insurance Co., Ltd., which was founded on May 13th 1991, and is held by CPIC Group. The company was incorporated in November 11, 2001, headquartered in Shanghai and register

HUB International

Hi, we’re HUB. We advise businesses and individuals on how to reach their goals. When you partner with us, you’re at the center of a vast network of risk, insurance, employee benefits, retirement and wealth management specialists that bring clarity to a changing world with tailored solutions and un

American International Group, Inc. (NYSE: AIG) is a leading global insurance organization. AIG provides insurance solutions that help businesses and individuals in approximately 190 countries and jurisdictions protect their assets and manage risks through AIG operations and network partners. Additi

FWD Insurance

FWD Group (1828.HK) is a pan-Asian life and health insurance business that serves approximately 34 million customers across 10 markets, including BRI Life in Indonesia. FWD’s customer-led and tech-enabled approach aims to deliver innovative propositions, easy-to-understand products and a simpler ins

China Life Insurance Co.Ltd

China Life Insurance (Group) Company, headquartered in Beijing, is a large state-owned financial and insurance company. Its predecessor,PICC was founded in 1949 and the PICC (Life) Co.,Ltd was set up in 1996 after its separation from the former PICC. In 1999, it was renamed China Life Insurance Comp

newsone

WHI CyberSecurity News

October 20, 2025 01:38 PM
WPS—A Health Solutions Company and HealthX Ventures Announce Strategic Partnership

MADISON, Wis.--(BUSINESS WIRE)--#DigitalHealth--WPS, a long-standing provider of health insurance and government services, is excited to announce a...

March 23, 2025 07:00 AM
Health Care: Cyber Attacks, Worrying Trends and Solutions

Cyber threats against hospitals are surging. What steps are being taken by the health-care sector to address the increasing impacts of cyber attacks?

March 19, 2025 07:00 AM
The Biggest Healthcare Data Breaches of 2024

In 2024, there were 14 data breaches involving more than 1 million healthcare records, including the biggest healthcare data breach of all time.

October 24, 2024 07:00 AM
Over 940,000 Medicare Beneficiaries Impacted by Data Breach

The Centers for Medicare & Medicaid Services (“CMS”) and its contractor, Wisconsin Physicians Service Insurance Corporation (“WPS”),...

September 25, 2024 07:00 AM
CMS Confirms 3.1 Million Individuals Affected by MOVEit Hack on Wisconsin Physicians Service

The Department of Health and Human Services (HHS) Centers for Medicare and Medicaid Services (CMS) has reported a data breach to the HHS...

September 23, 2024 07:00 AM
Cybersecurity Awareness Month: Maintain Your Online Safety

Our devices offer so many benefits and have become such an integral part of our lives that we often forget how much easier they make it for...

September 10, 2024 07:00 AM
Medicare Data Breach Impacts Almost 1 Million Subscribers

After the Medicare data breach, you can continue to use your existing Medicare card; beneficiaries with compromised Medicare Beneficiary...

September 08, 2024 07:00 AM
900,000 Americans on Medicare Warned of Data Breach

Nearly 1 million Medicare beneficiaries might have had their sensitive information compromised last year.

September 06, 2024 07:00 AM
More than 3 million Medicare users had information leaked in MOVEit breach

Updated Sept. 10 to reflect new information from CMS and WPS reflecting increases in the number of people affected and the number of states...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

WHI CyberSecurity History Information

Official Website of WPS Health Insurance

The official website of WPS Health Insurance is https://www.wpshealth.com.

WPS Health Insurance’s AI-Generated Cybersecurity Score

According to Rankiteo, WPS Health Insurance’s AI-generated cybersecurity score is 742, reflecting their Moderate security posture.

How many security badges does WPS Health Insurance’ have ?

According to Rankiteo, WPS Health Insurance currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does WPS Health Insurance have SOC 2 Type 1 certification ?

According to Rankiteo, WPS Health Insurance is not certified under SOC 2 Type 1.

Does WPS Health Insurance have SOC 2 Type 2 certification ?

According to Rankiteo, WPS Health Insurance does not hold a SOC 2 Type 2 certification.

Does WPS Health Insurance comply with GDPR ?

According to Rankiteo, WPS Health Insurance is not listed as GDPR compliant.

Does WPS Health Insurance have PCI DSS certification ?

According to Rankiteo, WPS Health Insurance does not currently maintain PCI DSS compliance.

Does WPS Health Insurance comply with HIPAA ?

According to Rankiteo, WPS Health Insurance is not compliant with HIPAA regulations.

Does WPS Health Insurance have ISO 27001 certification ?

According to Rankiteo,WPS Health Insurance is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of WPS Health Insurance

WPS Health Insurance operates primarily in the Insurance industry.

Number of Employees at WPS Health Insurance

WPS Health Insurance employs approximately 1,215 people worldwide.

Subsidiaries Owned by WPS Health Insurance

WPS Health Insurance presently has no subsidiaries across any sectors.

WPS Health Insurance’s LinkedIn Followers

WPS Health Insurance’s official LinkedIn profile has approximately 8,437 followers.

NAICS Classification of WPS Health Insurance

WPS Health Insurance is classified under the NAICS code 524, which corresponds to Insurance Carriers and Related Activities.

WPS Health Insurance’s Presence on Crunchbase

No, WPS Health Insurance does not have a profile on Crunchbase.

WPS Health Insurance’s Presence on LinkedIn

Yes, WPS Health Insurance maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/wps-health-insurance.

Cybersecurity Incidents Involving WPS Health Insurance

As of November 28, 2025, Rankiteo reports that WPS Health Insurance has experienced 8 cybersecurity incidents.

Number of Peer and Competitor Companies

WPS Health Insurance has an estimated 14,860 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at WPS Health Insurance ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does WPS Health Insurance detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notifications sent to affected individuals, and communication strategy with notifying affected individuals, and communication strategy with notifications to affected individuals, and communication strategy with notifying affected individuals, and communication strategy with notifications to impacted parties..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: CMS and WPS Security Breach

Description: A security breach affecting the personal information of Medicare beneficiaries due to a vulnerability in the MOVEit software by Progress Software.

Date Detected: 2023-05-27

Type: Data Breach

Attack Vector: Software Vulnerability

Vulnerability Exploited: MOVEit Software Vulnerability

Incident : Data Breach

Title: WPS Data Breach

Description: WPS, a contractor for the Centers for Medicare & Medicaid Services (CMS), experienced a data breach due to a vulnerability in the MOVEit software used for transferring files. This incident, occurring between May 27 and May 31, 2023, potentially compromised the personally identifiable information (PII) of Medicare beneficiaries, related to Medicare claims management, and PII supporting CMS audits of healthcare providers. Approximately 946,801 individuals are affected and notifications are being sent to those whose information was at risk. The breach was disclosed to CMS on July 8, following the discovery of the unauthorized access to personal data.

Date Detected: 2023-07-08

Date Publicly Disclosed: 2023-07-08

Type: Data Breach

Attack Vector: Vulnerability Exploitation

Vulnerability Exploited: MOVEit software vulnerability

Incident : Data Breach

Title: Data Breach at WPS Affecting Medicare Beneficiaries

Description: WPS, in conjunction with the CMS, is notifying individuals of a data breach due to a vulnerability in the MOVEit software developed by Progress Software. This breach occurred between May 27 and May 31, 2023, and compromised the PII of Medicare beneficiaries. The exposed data was collected for managing Medicare claims and supporting CMS audits of healthcare providers. This affected PII includes individuals who are not Medicare beneficiaries but have received healthcare services. A total of 946,801 people were notified of the potential leak of their personal information.

Date Detected: 2023-05-27

Type: Data Breach

Attack Vector: Software Vulnerability

Vulnerability Exploited: MOVEit software vulnerability

Incident : Data Breach

Title: CMS Medicare Beneficiaries Data Breach

Description: Unauthorized third parties gained access to the personal information (PII) of 946,801 Medicare beneficiaries due to a security vulnerability in the MOVEit software.

Date Detected: 2023-07-08

Type: Data Breach

Attack Vector: Software Vulnerability

Vulnerability Exploited: MOVEit software vulnerability

Threat Actor: Unauthorized third parties

Incident : Security Breach

Title: MOVEit Software Breach

Description: A security breach occurred involving the MOVEit software used by WPS for handling Medicare administrative services, resulting in unauthorized access to personal information.

Date Detected: 2023-05-27

Date Publicly Disclosed: 2023-07-08

Type: Security Breach

Incident : Data Breach

Title: WPS Medicare Administrative Services Security Breach

Description: WPS, in connection with its Medicare administrative services, reported a security breach due to a vulnerability in the MOVEit software provided by Progress Software. This incident potentially compromised the protected health information (PHI) of 946,801 Medicare beneficiaries, including data essential for managing Medicare claims and supporting CMS audits. Unauthorized access occurred between May 27 and May 31, 2023, was discovered later, and notifications to affected individuals commenced following the breach acknowledgment.

Type: Data Breach

Attack Vector: Software Vulnerability

Vulnerability Exploited: MOVEit software vulnerability

Incident : Data Breach

Title: Medicare Beneficiary PII Breach via MOVEit Software

Description: WPS, working with CMS, has begun notifying nearly a million individuals affected by a breach concerning their protected health information. This was due to a security flaw in MOVEit software developed by Progress Software, leading to unauthorized access of Medicare beneficiary PII during file transfers for Medicare claim management and CMS healthcare provider audits. The breach occurred from May 27 to 31, 2023, with WPS informing CMS on July 8. 946,801 Medicare recipients are receiving notifications of this compromise of their personal data.

Date Detected: 2023-07-08

Type: Data Breach

Attack Vector: Unauthorized Access

Vulnerability Exploited: Security flaw in MOVEit software

Incident : Data Breach

Title: MOVEit Software Vulnerability Leads to Unauthorized Access of Medicare Beneficiaries' PII

Description: A security vulnerability in the MOVEit software, developed by Progress Software and used by WPS to transfer files in the provision of services to CMS, led to unauthorized access of personal information. Between May 27 and May 31, 2023, personally identifiable information (PII) of Medicare beneficiaries—collected for managing Medicare claims and CMS audits of healthcare providers—was compromised, affecting up to 946,801 individuals. WPS discovered and reported the breach to CMS, initiating notifications to the impacted parties.

Type: Data Breach

Attack Vector: Software Vulnerability

Vulnerability Exploited: MOVEit software vulnerability

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Security flaw in MOVEit software.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach WPS000091024

Data Compromised: Personal Information of Medicare Beneficiaries

Systems Affected: Medicare Claim Management and CMS Audits

Incident : Data Breach WPS001103024

Data Compromised: PII of Medicare beneficiaries

Incident : Data Breach WPS001032825

Data Compromised: Pii

Incident : Data Breach WPS001040125

Data Compromised: PII of Medicare beneficiaries

Incident : Security Breach WPS001040625

Data Compromised: Phi, Pii

Incident : Data Breach WPS001040725

Data Compromised: Protected health information (phi), Medicare claims data, Cms audit data

Systems Affected: MOVEit software

Incident : Data Breach WPS001041025

Data Compromised: PII

Systems Affected: MOVEit software

Incident : Data Breach WPS001041225

Data Compromised: Personally Identifiable Information (PII)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, PII, PII, PII, Phi, Pii, , Protected Health Information (Phi), Medicare Claims Data, Cms Audit Data, , PII and PII.

Which entities were affected by each incident ?

Incident : Data Breach WPS000091024

Entity Name: Centers for Medicare & Medicaid Services (CMS)

Entity Type: Government Agency

Industry: Healthcare

Customers Affected: 946801

Incident : Data Breach WPS000091024

Entity Name: WPS

Entity Type: Organization

Industry: Healthcare

Incident : Data Breach WPS001103024

Entity Name: WPS

Entity Type: Contractor

Industry: Healthcare

Customers Affected: 946,801

Incident : Data Breach WPS001032825

Entity Name: WPS

Entity Type: Company

Industry: Healthcare

Customers Affected: 946,801

Incident : Data Breach WPS001040125

Entity Name: Centers for Medicare & Medicaid Services (CMS)

Entity Type: Government Agency

Industry: Healthcare

Location: United States

Customers Affected: 946,801 Medicare beneficiaries

Incident : Security Breach WPS001040625

Entity Name: WPS

Entity Type: Organization

Industry: Healthcare

Customers Affected: 946801

Incident : Data Breach WPS001040725

Entity Name: WPS

Entity Type: Organization

Industry: Healthcare

Customers Affected: 946801

Incident : Data Breach WPS001041025

Entity Name: WPS

Entity Type: Healthcare

Industry: Healthcare

Customers Affected: 946801

Incident : Data Breach WPS001041225

Entity Name: WPS

Entity Type: Company

Industry: Healthcare

Customers Affected: 946,801

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach WPS001103024

Communication Strategy: Notifications sent to affected individuals

Incident : Data Breach WPS001040125

Communication Strategy: Notifying affected individuals

Incident : Data Breach WPS001040725

Communication Strategy: Notifications to affected individuals

Incident : Data Breach WPS001041025

Communication Strategy: Notifying affected individuals

Incident : Data Breach WPS001041225

Communication Strategy: Notifications to impacted parties

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach WPS000091024

Type of Data Compromised: Personal Information

Number of Records Exposed: 946801

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : Data Breach WPS001103024

Type of Data Compromised: PII

Number of Records Exposed: 946,801

Sensitivity of Data: High

Personally Identifiable Information: Medicare claims management, PII supporting CMS audits of healthcare providers

Incident : Data Breach WPS001032825

Type of Data Compromised: PII

Number of Records Exposed: 946,801

Incident : Data Breach WPS001040125

Type of Data Compromised: PII

Number of Records Exposed: 946,801

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : Security Breach WPS001040625

Type of Data Compromised: Phi, Pii

Number of Records Exposed: 946801

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : Data Breach WPS001040725

Type of Data Compromised: Protected health information (phi), Medicare claims data, Cms audit data

Number of Records Exposed: 946801

Sensitivity of Data: High

Incident : Data Breach WPS001041025

Type of Data Compromised: PII

Number of Records Exposed: 946801

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : Data Breach WPS001041225

Type of Data Compromised: PII

Number of Records Exposed: 946,801

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach WPS001041225

Regulatory Notifications: Reported to CMS

References

Where can I find more information about each incident ?

Incident : Data Breach WPS001040125

Source: CMS Notification

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CMS Notification.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notifications sent to affected individuals, Notifying affected individuals, Notifications To Affected Individuals, Notifying affected individuals and Notifications to impacted parties.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach WPS001103024

Customer Advisories: Notifications sent to affected individuals

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notifications sent to affected individuals.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach WPS001041025

Entry Point: Security flaw in MOVEit software

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach WPS001041025

Root Causes: Security flaw in MOVEit software

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unauthorized third parties.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023-05-27.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-07-08.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Personal Information of Medicare Beneficiaries, PII of Medicare beneficiaries, PII, , PII of Medicare beneficiaries, PHI, PII, , Protected Health Information (PHI), Medicare claims data, CMS audit data, , PII and Personally Identifiable Information (PII).

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was MOVEit software and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were PHI, Personally Identifiable Information (PII), Protected Health Information (PHI), CMS audit data, Medicare claims data, PII of Medicare beneficiaries, Personal Information of Medicare Beneficiaries and PII.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 3.8M.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is CMS Notification.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Notifications sent to affected individuals.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Security flaw in MOVEit software.

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=wps-health-insurance' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge