New Zealand's 'Manage My Health' Portal Breached; Data of 120,000 Patients Held for Ransom

Manage My Health Patient Portal in New Zealand Suffers Data Breach, Attacker Demands Ransom for 126,000 Users' Data

HIGH
January 13, 2026
January 23, 2026
4m read
Data BreachRansomwareCyberattack

Impact Scope

People Affected

up to 126,000

Industries Affected

Healthcare

Geographic Impact

New Zealand (national)

Related Entities(initial)

Threat Actors

Kazu

Organizations

Ministry of Health (New Zealand)Health NZ (Te Whatu Ora)New Zealand Police

Full Report(when first published)

Executive Summary

Manage My Health, New Zealand's largest and privately operated patient portal, has suffered a major data breach affecting the sensitive health information of up to 126,000 individuals. The company detected unauthorized access on December 30, 2025, and has been responding to the incident into January 2026. A threat actor named Kazu has claimed responsibility, demanding a $60,000 ransom and threatening to sell the stolen data, which includes over 428,000 files containing lab results, referrals, and clinical correspondence. The breach was traced to a vulnerability in the portal's "Health Documents" module. The New Zealand government has launched an urgent review, and the company has obtained a court injunction to prevent the sharing of the stolen data.

Threat Overview

This is a classic healthcare data breach and extortion incident, made more severe by the highly sensitive nature of the stolen information.

  • Victim: Manage My Health, a patient portal used by ~1.8 million New Zealanders.
  • Attacker: An individual or group using the alias "Kazu."
  • Impact: Up to 126,000 users (6-7% of the user base) affected. Over 428,000 files exfiltrated.
  • Data Stolen: Sensitive Protected Health Information (PHI), including lab results, clinical referrals, and medical correspondence.
  • Attacker's Actions: Exfiltrated data, posted samples on a cybercrime forum, and demanded a $60,000 ransom.
  • Vector: A vulnerability in the "Health Documents" module of the Manage My Health application.

Technical Analysis

While the specific vulnerability is not detailed, the attack targeted a distinct module within the application, suggesting a flaw like an Insecure Direct Object Reference (IDOR), a path traversal, or an access control bypass within that part of the code.

Potential MITRE ATT&CK Techniques

Impact Assessment

  • For Patients: The exposure of highly personal and sensitive medical information can lead to extreme distress, embarrassment, and potential discrimination. It also puts them at risk for highly targeted phishing or blackmail schemes.
  • For Manage My Health: The company faces severe reputational damage, loss of trust from both patients and healthcare providers, and significant legal and regulatory scrutiny. The costs of forensic investigation, remediation, and potential fines will be substantial.
  • For the NZ Healthcare System: Although the public health system (Health NZ) was not directly breached, the incident erodes public trust in digital health initiatives. It highlights the security risks associated with a federated model where private companies handle public health data.

Detection & Response

Manage My Health's response appears to follow a standard, albeit reactive, playbook.

  • Detection: The company became aware of the unauthorized access on December 30, 2025. The method of detection was not specified.
  • Containment: The company identified and closed the security gaps that allowed the intrusion.
  • Communication: The breach was disclosed publicly on January 1, 2026. The company is communicating with affected individuals and has engaged with government agencies.
  • Legal Action: Obtaining a High Court injunction is a proactive step to legally bar the distribution of the stolen data, though its practical effectiveness against an anonymous attacker is limited. It does, however, create legal jeopardy for anyone in New Zealand who might access or share the data.

Mitigation

  • Secure Software Development Lifecycle (SSDLC): The breach originating in a specific application module points to a potential failure in the development process. Implementing an SSDLC with mandatory security code reviews, static (SAST), and dynamic (DAST) application security testing can identify and fix such vulnerabilities before deployment. (D3FEND: D3-SAST: Static Application Security Testing)
  • Access Control Audits: Regularly audit and test access control mechanisms to ensure that users can only access their own information. Vulnerabilities like IDOR are common in multi-tenant applications and must be a primary focus of testing.
  • Data-at-Rest Encryption: While not specified if it failed, ensuring all stored PHI is strongly encrypted at rest is a fundamental requirement for any healthcare application. (D3FEND: D3-FE: File Encryption)
  • Network Segmentation: The 'Health Documents' module, handling sensitive files, could have been placed in a more isolated and monitored network segment to limit the blast radius of a potential compromise.

Timeline of Events

1
December 30, 2025
Manage My Health becomes aware of unauthorized access. Attacker releases a sample of stolen data.
2
January 1, 2026
Manage My Health publicly discloses the breach.
3
January 8, 2026
The New Zealand government announces an urgent review of the incident (approximate date).
4
January 13, 2026
This article was published

Article Updates

January 23, 2026

Manage My Health warns customers of follow-on phishing and spam attacks exploiting data stolen in the late 2025 breach, increasing risk to affected individuals.

MITRE ATT&CK Mitigations

Implementing secure coding practices and conducting rigorous application security testing can prevent the vulnerabilities that lead to such breaches.

Mapped D3FEND Techniques:

Enforcing strict access controls within the application to ensure users can only access their own data is critical for multi-tenant platforms.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Logging and monitoring access to sensitive documents can help detect anomalous activity, such as a single user accessing thousands of documents.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The breach originating in the 'Health Documents' module strongly suggests an application-level vulnerability, such as an Insecure Direct Object Reference (IDOR) or broken access control. To prevent such incidents, organizations like Manage My Health must integrate Dynamic Application Security Testing (DAST) into their development and testing lifecycle. A DAST scanner should be configured to run against the live, running application in a staging environment. It should be given user credentials to test the application from an authenticated perspective, where it can crawl all functionalities, including the document upload/download features. The DAST tool can automatically test for flaws where a user (e.g., user A) can manipulate API requests to access documents belonging to another user (user B). This automated testing can catch critical access control flaws before the code ever reaches production, directly mitigating the type of vulnerability likely exploited by 'Kazu'.

A powerful detective control for this scenario is Authorization Event Thresholding. The Manage My Health application should be instrumented to log every document access event, including the user ID and the document ID. A security monitoring system can then analyze these logs in real-time. A rule should be created to alert if a single user account accesses an abnormally high number of unique documents within a short timeframe. For example, a threshold could be set to 'alert if one user accesses more than 50 unique health documents in one hour'. A normal user would never exhibit this behavior. This is a classic pattern for data exfiltration where an attacker has found a way to iterate through and download records. This high-fidelity, low-noise alert would have signaled the breach in progress, allowing the security team to lock the malicious account and shut down the attack before 428,000 files were stolen.

Sources & References(when first published)

12th January – Threat Intelligence Report
Check Point Research (research.checkpoint.com) January 12, 2026
ManageMyHealth data breach - Wikipedia
Wikipedia (en.wikipedia.org) January 12, 2026
126,000 affected by IT hack on patient portal Manage My Health
Healthcare IT News (healthcareitnews.com) January 12, 2026
New Zealand Orders Review of Manage My Health Breach
Infosecurity Magazine (infosecurity-magazine.com) January 12, 2026
Data breach compromises New Zealand's ManageMyHealth portal
SC Magazine (scmagazine.com) January 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

HealthcarePatient DataPHIRansomwareNew Zealand

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading