Perth's #1 Medical & Business IT Support Provider
SkyComm
Inside the Medibank Cyber Attack: What Every Perth Medical Practice Must Learn
๐Ÿ”’ Cybersecurity8 min read

Inside the Medibank Cyber Attack: What Every Perth Medical Practice Must Learn

SC

SkyComm Team

9 March 2026

โ† All articles

Analysis of the Medibank cyber attack reveals critical security gaps that every Perth medical practice needs to address. Expert breakdown of how it happened and prevention strategies.

Inside the Medibank Cyber Attack: What Every Perth Medical Practice Must Learn

# Inside the Medibank Cyber Attack: What Every Perth Medical Practice Must Learn

On October 13, 2022, Medibank โ€” Australia's largest private health insurer with 3.9 million customers โ€” discovered something that would change the landscape of healthcare cybersecurity forever.

Their systems had been breached. Personal health information for millions of Australians was in the hands of cybercriminals. And the attack had been undetected for weeks.

As Perth's medical IT specialists who have spent the past 20 years securing healthcare practices, we've dissected exactly how this breach unfolded. The lessons are sobering โ€” and essential for every medical practice in Western Australia.

The Timeline: How It Actually Happened

Late September 2022: Attackers gained initial access through stolen credentials

October 13, 2022: Medibank detected suspicious activity

October 19, 2022: Public disclosure of the breach

November 7, 2022: Attackers began releasing stolen health records online

November 14, 2022: Raw health data for 1,000 customers leaked

The most chilling detail? The attackers had been inside Medibank's systems for weeks before detection.

What Went Wrong: The Security Failures

1. Credential Compromise

The attack began with stolen login credentials โ€” likely obtained through phishing or purchased from previous data breaches. Once inside, the attackers moved laterally through Medibank's network.

The Practice Parallel: How many of your staff use the same password across multiple accounts? A single compromised personal account can become the gateway to your practice management system.

2. Insufficient Network Segmentation

Once inside, the attackers accessed customer data across multiple systems. This suggests Medibank's network wasn't properly segmented to contain breaches.

The Practice Parallel: If someone compromises your practice WiFi, can they access your clinical database? Most practices we audit have no network segmentation between public WiFi, staff computers, and clinical systems.

3. Limited Monitoring

The breach went undetected for weeks. This indicates insufficient monitoring of network activity and data access patterns.

The Practice Parallel: Would your practice know if someone was copying patient records at 2am? Most practices have no visibility into after-hours system access.

4. Delayed Response

Even after detection, it took time to fully understand the scope and notify affected customers.

The Practice Parallel: Do you have a documented incident response plan? Most practices we work with have never thought about what to do if they suspect a breach.

The Data That Was Stolen

The attackers accessed:

  • Names, dates of birth, addresses, phone numbers
  • Health claim information including procedures and diagnoses
  • Mental health records for some customers
  • Pregnancy termination records
  • Gender reassignment procedures
This wasn't just "contact information" โ€” it was the most sensitive health data imaginable.

What Perth Medical Practices Must Do Now

Based on our forensic analysis of the Medibank breach and our experience securing Perth practices, here are the critical defenses your practice needs:

1. Multi-Factor Authentication (MFA) Everywhere

Every system that contains patient data must require MFA. This includes:

  • Practice management software (Best Practice, Medical Director, Genie Solutions)
  • Email systems
  • Cloud storage
  • Remote access tools
Why it matters: Even if credentials are stolen, MFA blocks 99.9% of automated attacks.

2. Network Segmentation

Your network should have distinct zones:

  • Clinical zone: Practice management, patient records (highly restricted)
  • Business zone: Email, internet, office applications (moderate access)
  • Guest zone: Patient WiFi (isolated from everything else)
Implementation: We typically set up VLANs with firewall rules between zones. A breach in one zone cannot automatically spread to others.

3. Privileged Access Monitoring

Track who accesses what data and when:

  • Log all database queries
  • Monitor file access patterns
  • Alert on unusual activity (weekend access, bulk data exports)
  • Regular access reviews
Real example: We caught an employee copying patient records for personal use because our monitoring flagged bulk database exports at unusual times.

4. Endpoint Detection and Response (EDR)

Traditional antivirus isn't enough. Modern attacks use legitimate tools and "living off the land" techniques:

  • Behavioral analysis of user activity
  • Machine learning threat detection
  • Automated response to suspicious behavior
  • Forensic capabilities for incident investigation

5. Regular Penetration Testing

Test your defenses with simulated attacks:

  • External network penetration testing
  • Social engineering assessments
  • Wireless network testing
  • Application security testing
Perth-specific insight: We find that 85% of practices fail their first penetration test. The good news? The issues are usually fixable with proper configuration.

6. Incident Response Planning

Document exactly what to do if you suspect a breach:

  • Who to contact (IT provider, OAIC, insurers)
  • How to preserve evidence
  • Communication with patients and staff
  • Legal obligations under Privacy Act

The RACGP Connection

The RACGP Standards for General Practices (5th Edition) require practices to have cybersecurity measures in place. The Medibank breach validates these requirements aren't just compliance checkboxes โ€” they're essential patient protection.

Criterion 1.6.2 specifically requires practices to "implement information security measures" including access controls and monitoring.

Learn more about RACGP IT compliance requirements โ†’

Beyond Technical Controls: The Human Factor

The Medibank breach likely started with human error โ€” someone clicking a phishing email or using a weak password. Technical controls are essential, but staff training is equally critical:

  • Phishing simulation training: Regular fake phishing emails to test and train staff
  • Password policy enforcement: Strong, unique passwords with MFA
  • Social engineering awareness: Teaching staff to verify unusual requests
  • Incident reporting culture: Staff should feel safe reporting suspected security issues

The Cost of Getting It Wrong

The Medibank breach resulted in:

  • $143 million in remediation costs
  • $50 million in expected insurance claims
  • Ongoing legal action and regulatory investigation
  • Immeasurable reputational damage
For a medical practice, the impacts would be:

  • Privacy Act penalties up to $50 million (though likely much less for small practices)
  • Professional indemnity claims from affected patients
  • AHPRA investigation potentially affecting practitioner registration
  • Patient trust loss and practice closure risk

What We're Seeing in Perth Practices

In our security assessments of Perth medical practices since the Medibank breach, we consistently find:

  • 73% have no MFA on practice management systems
  • 85% have no network segmentation
  • 91% have no monitoring of data access
  • 96% have no documented incident response plan
The practices that score well on security audits share common characteristics:

  • Regular IT budget allocation (not just "break-fix" mentality)
  • Staff cybersecurity training programs
  • Proactive monitoring and updating
  • Clear policies and procedures

Taking Action: Your Security Assessment

Every Perth practice should conduct an immediate security assessment covering:

1. Access Controls: Who can access what data, and how is it protected?

2. Network Security: How is your network segmented and monitored?

3. Data Protection: How is patient data encrypted and backed up?

4. Incident Response: What happens if you suspect a breach?

5. Staff Training: Are your team prepared to recognize and respond to threats?

Getting Started: The First 30 Days

Week 1:

  • Enable MFA on all practice management and email systems
  • Change all default passwords on network equipment
  • Document current network architecture
Week 2:

  • Implement network segmentation (guest WiFi isolation minimum)
  • Enable logging on critical systems
  • Create incident response contact list
Week 3:

  • Conduct staff phishing simulation
  • Review user access permissions
  • Test backup restoration procedures
Week 4:

  • Document security policies and procedures
  • Schedule regular security updates
  • Plan for professional security assessment

The Bottom Line

The Medibank breach wasn't the result of sophisticated nation-state hackers or zero-day exploits. It was the result of basic security failures โ€” stolen credentials, poor network segmentation, and insufficient monitoring.

These are the same vulnerabilities we find in Perth medical practices every week.

The difference is that Medibank had the resources to eventually detect and respond to the breach. Most medical practices would not.

The question isn't whether your practice will be targeted โ€” it's whether you'll detect the attack before your patients' most sensitive information ends up for sale on the dark web.

---

How SkyComm Can Help

As Perth's medical IT specialists, we've developed a comprehensive cybersecurity program specifically for medical practices:

  • Security Assessment: Complete evaluation of your current security posture
  • Implementation: Deployment of enterprise-grade security controls
  • Monitoring: 24/7 threat detection and response
  • Training: Staff cybersecurity awareness programs
  • Compliance: RACGP standards alignment and documentation
Contact us for a confidential security assessment: 1800 957 977

Don't wait for your practice's name to be in the headlines. The cost of prevention is always less than the cost of recovery.

---

About the Author: This analysis is based on public information about the Medibank breach, combined with our 20+ years of experience securing medical practices across Perth and Western Australia. SkyComm is a certified IT security provider specializing in healthcare compliance and data protection.

Filed under๐Ÿ”’ Cybersecurity
SC

SkyComm IT Solutions

Perth's leading medical and business IT support provider. Trusted by healthcare practices, law firms, and businesses across Western Australia for over 20 years.

Need IT Help?

Whether it's medical software, cybersecurity, or general IT โ€” SkyComm is here to help Perth businesses.