up to 126,000
Manage My Health, New Zealand's largest and privately operated patient portal, has suffered a major data breach affecting the sensitive health information of up to 126,000 individuals. The company detected unauthorized access on December 30, 2025, and has been responding to the incident into January 2026. A threat actor named Kazu has claimed responsibility, demanding a $60,000 ransom and threatening to sell the stolen data, which includes over 428,000 files containing lab results, referrals, and clinical correspondence. The breach was traced to a vulnerability in the portal's "Health Documents" module. The New Zealand government has launched an urgent review, and the company has obtained a court injunction to prevent the sharing of the stolen data.
This is a classic healthcare data breach and extortion incident, made more severe by the highly sensitive nature of the stolen information.
While the specific vulnerability is not detailed, the attack targeted a distinct module within the application, suggesting a flaw like an Insecure Direct Object Reference (IDOR), a path traversal, or an access control bypass within that part of the code.
Manage My Health's response appears to follow a standard, albeit reactive, playbook.
D3-SAST: Static Application Security Testing)D3-FE: File Encryption)Manage My Health warns customers of follow-on phishing and spam attacks exploiting data stolen in the late 2025 breach, increasing risk to affected individuals.
Implementing secure coding practices and conducting rigorous application security testing can prevent the vulnerabilities that lead to such breaches.
Enforcing strict access controls within the application to ensure users can only access their own data is critical for multi-tenant platforms.
Mapped D3FEND Techniques:
The breach originating in the 'Health Documents' module strongly suggests an application-level vulnerability, such as an Insecure Direct Object Reference (IDOR) or broken access control. To prevent such incidents, organizations like Manage My Health must integrate Dynamic Application Security Testing (DAST) into their development and testing lifecycle. A DAST scanner should be configured to run against the live, running application in a staging environment. It should be given user credentials to test the application from an authenticated perspective, where it can crawl all functionalities, including the document upload/download features. The DAST tool can automatically test for flaws where a user (e.g., user A) can manipulate API requests to access documents belonging to another user (user B). This automated testing can catch critical access control flaws before the code ever reaches production, directly mitigating the type of vulnerability likely exploited by 'Kazu'.
A powerful detective control for this scenario is Authorization Event Thresholding. The Manage My Health application should be instrumented to log every document access event, including the user ID and the document ID. A security monitoring system can then analyze these logs in real-time. A rule should be created to alert if a single user account accesses an abnormally high number of unique documents within a short timeframe. For example, a threshold could be set to 'alert if one user accesses more than 50 unique health documents in one hour'. A normal user would never exhibit this behavior. This is a classic pattern for data exfiltration where an attacker has found a way to iterate through and download records. This high-fidelity, low-noise alert would have signaled the breach in progress, allowing the security team to lock the malicious account and shut down the attack before 428,000 files were stolen.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats