Skip to main content

Black Market Value of Patient Data

  • Chapter
  • First Online:
Digital Marketplaces Unleashed

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    According to the OECD Privacy Guidelines: “any information relating to an identified or identifiable individual” [1].

  2. 2.

    A honeypot in a network that is set up with the purpose to attract attackers and study their behavior and techniques.

References

  1. OECD, “Exploring the Economics of Personal Data,” in OECD Digital Economy Papers, 2013.

    Google Scholar 

  2. D. Walker, “Research examines cost of stolen data, underground services’,” SC Magazine, 11 12 2014. [Online]. Available: http://www.scmagazine.com/news/prices-have-dropped-for-stolen-data-on-the-black-market/article/387945/. [Accessed 13 07 2016].

    Google Scholar 

  3. T. Zeller, “Black Market in Stolen Credit Card Data Thrives on Internet,” The New York Times, 2005.

    Google Scholar 

  4. H. Krügel-Brand, “Digitale Transformation: Zukunftsfragen,” Aerzteblatt, [Online]. Available: http://www.aerzteblatt.de/archiv/175605. [Accessed 13 07 2016].

    Google Scholar 

  5. N. Yaraghi, Hackers, phishers, and disappearing thumb drives: Lessons learned from major health cara data breaches, 2016.

    Google Scholar 

  6. Ponemon Institute, Fith Annual Benchmark Dtudy on Privacy & Security of Healthcare Data, 2015.

    Google Scholar 

  7. D. Bowman, Why health insurers are an enticing hack target [Q&A], Fierce Healthcare, 2015.

    Google Scholar 

  8. C. Humer und J. Finkle, Your medical record is worth more to hackers than your credit card, Reuters, 2014.

    Google Scholar 

  9. P. Institute, 2013 Cost of Data Breach Study: Global Analysis, 2013.

    Google Scholar 

  10. B. Filkins, Health Care Cyberthreat Report, SANS Institute, 2014.

    Google Scholar 

  11. R. Abelson und M. Goldstein, Anthem Hacking Points to Security Vulnerability of Health Care Industry, The New York Times, 2015.

    Google Scholar 

  12. F. Rashid, “Why hackers want your health care data most of all,” InfoWorld, 14 09 2015. [Online]. Available: http://www.infoworld.com/article/2983634/security/why-hackers-want-your-health-care-data-breaches-most-of-all.html. [Accessed 08 07 2016].

    Google Scholar 

  13. C. Terhune, UCLA Health System data breach affects 4.5 million patients, 2015.

    Google Scholar 

  14. ÄrzteZeitung, “Illegale Ausspähaktion: Massenhaft Patientendaten gestohlen,” 29 11 2013. [Online]. Available: http://www.aerztezeitung.de/praxis_wirtschaft/recht/article/850930/illegale-ausspaehaktion-massenhaft-patientendaten-gestohlen.html. [Accessed 31 07 2016].

    Google Scholar 

  15. Klinikum Mittelbaden, Datenschutz, Mittelbaden: Klinikum Mittelbaden, 2012.

    Google Scholar 

  16. WDR – Westfalen-Lippe-Nachrichten, “Bei Diebstahl auch Patientendaten verschwunden,” 31 05 2016. [Online]. Available: http://www1.wdr.de/nachrichten/westfalen-lippe/patientendaten-verschwunden-diebstahl-medizinische-geraete-berleburg-100.html. [Accessed 31 07 2016].

    Google Scholar 

  17. E. Demtröder, “Medizingeräte-Diebstahl: Helios spekuliert nicht über Motiv,” WAZ, [Online]. Available: http://www.derwesten.de/staedte/nachrichten-aus-bad-berleburg-bad-laasphe-und-erndtebrueck/medizingeraete-diebstahl-helios-spekuliert-nicht-ueber-motiv-aimp-id11842565.html. [Accessed 31 07 2016].

    Google Scholar 

  18. D. Seher, “Diebe stehlen tausende Patientenakten aus Klinik-Kellern,” WAZ, 08 02 2015. [Online]. Available: http://www.derwesten.de/politik/diebe-stehlen-tausende-patientenakten-aus-klinik-kellern-id10932347.html. [Accessed 28 07 2016].

    Google Scholar 

  19. H. Krüger-Brand, Archivierung von Patientenunterlagen: Arzt muss weg – Patientenakten weg?, Deutsches Ärzteblatt.

    Google Scholar 

  20. DeepDotWeb, New Breach: Healthcare Insurer Database of 9.3 M Records Being Sold, Deep Dot Web, 2016.

    Google Scholar 

  21. W. Ashford, “Ransomware makes up a quarter (and rising) of UK cyber attacks, finds research,” ComputerWeekly, 28 04 2016. [Online]. Available: http://www.computerweekly.com/news/450294545/Ransomware-makes-up-a-quarter-and-rising-of-UK-cyber-attacks-finds-research. [Accessed 01 08 2016].

    Google Scholar 

  22. D. Borchers, “Ransomware-Virus legt Krankenhaus lahm,” heise online, 02 12 2016. [Online]. Available: http://www.heise.de/newsticker/meldung/Ransomware-Virus-legt-Krankenhaus-lahm-3100418.html. . [Accessed 01 08 2016].

    Google Scholar 

  23. S. Gallagher, “Two more healthcare networks caught up in outbreak of hospital ransomware,” Ars Technica, 29 03 2016. [Online]. Available: http://arstechnica.com/security/2016/03/two-more-healthcare-networks-caught-up-in-outbreak-of-hospital-ransomware/. [Accessed 01 08 2016].

    Google Scholar 

  24. M. Smith, “Kansas Heart Hospital hit with ransomware; attackers demand two ransoms,” Network World, 22 05 2016. [Online]. Available: http://www.networkworld.com/article/3073495/security/kansas-heart-hospital-hit-with-ransomware-paid-but-attackers-demanded-2nd-ransom.html. . [Accessed 01 08 2016].

    Google Scholar 

  25. C. Sánchez, “La seguridad en los hospitales españoles: tu salud y tus datos, ¿en peligro?,” eldiario.es, 09 09 2015. [Online]. Available: http://wwwleldiario.es/hojaderouter/seguridad/hospitales-sanidad-seguridat_informatica-ciberataques-datos-privacidad_0_427657312.html. [Accessed 01 08 2016].

    Google Scholar 

  26. J. Carballo, “Les données de santé attirent les hackers,” Le Figaro, 13 02 2015. [Online]. Available: http://sante.lefigaro.fr/actualite/2015/02/13/23393-donnees-sante-attirent-hackers. [Accessed 01 08 2016].

    Google Scholar 

  27. N. Devillier, “Piratage de données médicakes; la France n’est pas prête,” Rue89, 05 04 2016. [Online]. Available: http://rue89.nouvelobs.com/2016/04/05/piratage-donnees-medicales-france-nest-prete-263632. [Accessed 01 08 2016].

    Google Scholar 

  28. FBI Cyber Division, Health Care Systems and Medical Devices at Risk for Increased Cyber Intrusion for Financial Gain, FBI Cyber Division, 2014.

    Google Scholar 

  29. D. Dissent, “655,000 patient records for sale on the dark net after hacking victims refuse extortion demands,” The Daily Dot, 27 01 2016. [Online]. Available: http://www.dailydot.com/layer8/655000-patient-records-dark-net/. [Accessed 03 08 2016].

    Google Scholar 

  30. DeepDotWeb, New Breach: 655000 Healthcare Records (Patients) Being Sold, Deep Dot Web, 2016.

    Google Scholar 

  31. D. Dissent, Lording it over the healthcare sector: health insurer database with 9.3 M entries up for sale, Office of Inadequate Security, 2016.

    Google Scholar 

  32. H. Gierow, “Security: Ransomware-Bosse verdienen 90.000 US-Dollar pro Jahr,” golem.de, 06 03 2016. [Online]. Available: http://www.golem.de/news/security-ransomware-bosse-verdienen-90-000-us-dollar-pro-jahr-1606-121292.html. [Accessed 04 08 2016].

    Google Scholar 

  33. J. Breithut, “Trojaner ‘Locky’: Erpresser-Software infiziert 17.000 deutsche Rechner an einem Tag,” SPIEGEL ONLINE, 19 02 2016. [Online]. Available: http://www.spiegel.de/netzwelt/gadgets/locky-17000-windows-rechner-in-deutschland-taeglich-infiziert-a-1078318.html. [Accessed 04 08 2016].

    Google Scholar 

  34. S. Gallagher, “Patients diverted to other hospitals after ransomware locks down key software,” Ars Technica, 17 02 2016. [Online]. Available: http://arstechnica.com/security/2016/02/la-hospital-latest-victim-of-targeted-crypto-ransomware-attack/. [Accessed 04 08 2016].

    Google Scholar 

  35. A. Blankstein, Eyes on celebrity records multiply, Los Angeles Times, 2008.

    Google Scholar 

  36. M. Neil, “Celebrity Medical Files Breached at UCLA,” ABA Journal, 04 07 2008. [Online]. Available: http://www.abajournal.com/news/article/celebrity_medical_files_breached_at_ucla/. [Accessed 31 07 2016].

    Google Scholar 

  37. A. Guerrilla, Tor’s Co-Creator: Your Medical Revords Have Bullseyes On Them, Deep Dot Web, 2016.

    Google Scholar 

  38. D. Nield, “Google Fit vs. Apple Health: Who’s Winning the Race?,” Read-Write, 24 03 2015. [Online]. Available: http://readwrite.com/2015/03/24/google-fit-vs-apple-health/. [Accessed 03 08 2016].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christina Czeschik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer-Verlag GmbH Germany

About this chapter

Cite this chapter

Czeschik, C. (2018). Black Market Value of Patient Data. In: Linnhoff-Popien, C., Schneider, R., Zaddach, M. (eds) Digital Marketplaces Unleashed. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49275-8_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49275-8_78

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49274-1

  • Online ISBN: 978-3-662-49275-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics