Telehealth & Supply-Chain Briefings: Hello Cake + MedicSolution
TL;DR
Two September 2025 health tech breaches, Hello Cake (telehealth) and MedicSolution (supply chain), highlighted the cost of cloud misconfigurations. Third-party risks now account for 40% of healthcare breaches, yet incident response remains a challenge across the space. For growth-stage health tech startups, these events are a wake-up call: your IR playbook must be tested, your vendors audited, and your compliance posture aligned with HIPAA. The question isn’t if you’ll face a breach, but if you’ll be ready!
👉 Download the HIPAA EXP Audit Guide to test your readiness.
Hello Cake Incident Brief
What Happened
On September 21, 2025, Hello Cake, a telehealth and prescription provider, published updated notices and state breach filings confirming a misconfigured cloud resource exposing files. Reports suggest unauthorized access may have occurred earlier in the year.
Data Types Reported
Names, dates of birth, addresses
In some notices: Social Security numbers and highly sensitive PII
Operational & Patient Risk (what to assume now)
Medical identity fraud
Targeted phishing campaigns using stolen info
Extortion by threatening to make stolen info public
Treat this as a High-priority if you have integrations or share data with Hello Cake
0–72 Hour Incident Response Checklist
Block unknown traffic to/from Hello Cake systems until remediation is confirmed
Rotate API keys, service accounts, and administrative passwords
Review your network and integration logs for abnormal events such as GET/DELETE events, large object downloads, after hour access, etc.
Configure outbound network connection rules to stop PHI exports to unvetted endpoints
Compliance & Legal
Confirm BAA incident response clauses, request breach report, and remediation plan
Prepare breach notification notices for HHS and patients.
Contact your legal team for PR and potential implications
👉 Curious where you stand? Book a 15-minute vCISO consultation to review your vendor security strategy.
MedicSolution Incident Brief
What Happened
In mid-September 2025, the KillSec ransomware group claimed responsibility for a breach at MedicSolution, a Brazilian healthcare software provider. Threat actors allege exfiltration of patient/provider data via a misconfigured cloud bucket. Extortion postings are active; forensics are ongoing.
Potential Data Impact
Patient and provider records
Clinical data sets (field lists not yet confirmed)
Downstream Risk
Because MedicSolution services multiple hospitals and clinics, this is a supply-chain event. This vendor breach can cascade across entire healthcare networks.
0–72 Hour Response Checklist
Inventory MedicSolution integrations
Review log events for MedicSolution linked systems
Rotate all service account and administrative credentials and tokens
Review outbound connections to/from MedicSolution IPs
Legal & Vendor Steps
Request forensic reports and breach impact
Invoke contractual incident clauses and indemnity agreements
👉 Download the HIPAA EXP Guide to validate your third-party risk controls.
Your Rapid Response Playbook
If you’re scaling and touching PHI even indirectly, follow these five must-dos today:
Conduct HIPAA Risk & Gap Assessment
Lock down access: least privilege + key rotations
Monitor anomalies: outbound data comms, IAM failures, API irregularities
Validate vendor security: request evidence on top of SOC 2 Reports
Tabletop incident response exercises: include execs, legal, comms, and ops
What Growth-Stage Health Tech Orgs. Should Do Next
Map vendors + BAAs (update annually)
Audit tracking technologies for PHI exposure
Run phishing simulations & year-round training
Enforce data lifecycle management (retention, deletion, destruction)
Tie compliance to business outcomes (RTO/RPO, partner due diligence)
Health tech startups aren’t immune, they’re targets. Incident readiness is a growth strategy.
👉 Download the HIPAA EXP Audit Guide to uncover blind spots before attackers do.
FAQ
Are telehealth vendors like Hello Cake considered business associates?
Yes. If they process PHI, HIPAA rules apply and BAAs must be in place.
What’s the first step after discovering vendor exposure?
Review your BAAs, request breach update reports, review your logs for anomalies, block vendor integrations until the issue has been resolved.
Do I need to notify regulators if data access isn’t confirmed?
If there’s a reasonable belief PHI was exposed, HIPAA requires notification.
How do I prevent S3/bucket misconfiguration risks?
Enforce least privilege, rotate IAM keys, make buckets private, and use automated misconfiguration detection tools.
Let’s Talk
Do you think cloud misconfigurations are negligence or lack of expertise?
Share your thoughts!