Telehealth & Supply-Chain Briefings: Hello Cake + MedicSolution

TL;DR

Two September 2025 health tech breaches, Hello Cake (telehealth) and MedicSolution (supply chain), highlighted the cost of cloud misconfigurations. Third-party risks now account for 40% of healthcare breaches, yet incident response remains a challenge across the space. For growth-stage health tech startups, these events are a wake-up call: your IR playbook must be tested, your vendors audited, and your compliance posture aligned with HIPAA. The question isn’t if you’ll face a breach, but if you’ll be ready!

👉 Download the HIPAA EXP Audit Guide to test your readiness.

Hello Cake Incident Brief

What Happened

On September 21, 2025, Hello Cake, a telehealth and prescription provider, published updated notices and state breach filings confirming a misconfigured cloud resource exposing files. Reports suggest unauthorized access may have occurred earlier in the year.

Data Types Reported

  • Names, dates of birth, addresses

  • In some notices: Social Security numbers and highly sensitive PII

Operational & Patient Risk (what to assume now)

  • Medical identity fraud

  • Targeted phishing campaigns using stolen info

  • Extortion by threatening to make stolen info public

  • Treat this as a High-priority if you have integrations or share data with Hello Cake

0–72 Hour Incident Response Checklist

  • Block unknown traffic to/from Hello Cake systems until remediation is confirmed

  • Rotate API keys, service accounts, and administrative passwords

  • Review your network and integration logs for abnormal events such as GET/DELETE events, large object downloads, after hour access, etc.

  • Configure outbound network connection rules to stop PHI exports to unvetted endpoints

Compliance & Legal

  • Confirm BAA incident response clauses, request breach report, and remediation plan

  • Prepare breach notification notices for HHS and patients.

  • Contact your legal team for PR and potential implications

👉 Curious where you stand? Book a 15-minute vCISO consultation to review your vendor security strategy.

MedicSolution Incident Brief

What Happened

In mid-September 2025, the KillSec ransomware group claimed responsibility for a breach at MedicSolution, a Brazilian healthcare software provider. Threat actors allege exfiltration of patient/provider data via a misconfigured cloud bucket. Extortion postings are active; forensics are ongoing.

Potential Data Impact

  • Patient and provider records

  • Clinical data sets (field lists not yet confirmed)

Downstream Risk

Because MedicSolution services multiple hospitals and clinics, this is a supply-chain event. This vendor breach can cascade across entire healthcare networks.

0–72 Hour Response Checklist

  • Inventory MedicSolution integrations

  • Review log events for MedicSolution linked systems

  • Rotate all service account and administrative credentials and tokens

  • Review outbound connections to/from MedicSolution IPs

Legal & Vendor Steps

  • Request forensic reports and breach impact

  • Invoke contractual incident clauses and indemnity agreements

👉 Download the HIPAA EXP Guide to validate your third-party risk controls.

Your Rapid Response Playbook

If you’re scaling and touching PHI even indirectly, follow these five must-dos today:

  1. Conduct HIPAA Risk & Gap Assessment

  2. Lock down access: least privilege + key rotations

  3. Monitor anomalies: outbound data comms, IAM failures, API irregularities

  4. Validate vendor security: request evidence on top of SOC 2 Reports

  5. Tabletop incident response exercises: include execs, legal, comms, and ops

What Growth-Stage Health Tech Orgs. Should Do Next

  • Map vendors + BAAs (update annually)

  • Audit tracking technologies for PHI exposure

  • Run phishing simulations & year-round training

  • Enforce data lifecycle management (retention, deletion, destruction)

  • Tie compliance to business outcomes (RTO/RPO, partner due diligence)

Health tech startups aren’t immune, they’re targets. Incident readiness is a growth strategy.

👉 Download the HIPAA EXP Audit Guide to uncover blind spots before attackers do.

FAQ

Are telehealth vendors like Hello Cake considered business associates?

Yes. If they process PHI, HIPAA rules apply and BAAs must be in place.

What’s the first step after discovering vendor exposure?

Review your BAAs, request breach update reports, review your logs for anomalies, block vendor integrations until the issue has been resolved.

Do I need to notify regulators if data access isn’t confirmed?

If there’s a reasonable belief PHI was exposed, HIPAA requires notification.

How do I prevent S3/bucket misconfiguration risks?

Enforce least privilege, rotate IAM keys, make buckets private, and use automated misconfiguration detection tools.

Let’s Talk

Do you think cloud misconfigurations are negligence or lack of expertise?

Share your thoughts!

L Trotter II

As Founder and CEO of Inherent Security, Larry Trotter II is responsible for defining the mission and vision of the company, ensuring execution aligns with the business purpose. Larry has transformed Inherent Security from a consultancy to a cybersecurity company through partnerships and expert acquisitions. Today the company leverages its healthcare and government expertise to accelerate compliance operation for clients.

Larry has provided services for 12 years across the private industry developing security strategies and managing security operations for Fortune 500 companies and healthcare organizations. He is influential business leader who can demonstrate the value proposition of security and its direct link to customers.

Larry graduated from Old Dominion University with a bachelor’s degree in Business Administration with a focus on IT and Networking. Larry has accumulated certifications such as the CISM, ISO27001 Lead Implementer, GCIA and others. He serves on the Board of Directors for the MIT Enterprise Forum DC and Baltimore.

https://www.inherentsecurity.com
Next
Next

5 ways to signal trust to providers before product demos.