Analysis of the Medibank cyber attack reveals critical security gaps that every Perth medical practice needs to address. Expert breakdown of how it happened and prevention strategies.

# Inside the Medibank Cyber Attack: What Every Perth Medical Practice Must Learn
On October 13, 2022, Medibank โ Australia's largest private health insurer with 3.9 million customers โ discovered something that would change the landscape of healthcare cybersecurity forever.
Their systems had been breached. Personal health information for millions of Australians was in the hands of cybercriminals. And the attack had been undetected for weeks.
As Perth's medical IT specialists who have spent the past 20 years securing healthcare practices, we've dissected exactly how this breach unfolded. The lessons are sobering โ and essential for every medical practice in Western Australia.
The Timeline: How It Actually Happened
Late September 2022: Attackers gained initial access through stolen credentials
October 13, 2022: Medibank detected suspicious activity
October 19, 2022: Public disclosure of the breach
November 7, 2022: Attackers began releasing stolen health records online
November 14, 2022: Raw health data for 1,000 customers leaked
The most chilling detail? The attackers had been inside Medibank's systems for weeks before detection.
What Went Wrong: The Security Failures
1. Credential Compromise
The attack began with stolen login credentials โ likely obtained through phishing or purchased from previous data breaches. Once inside, the attackers moved laterally through Medibank's network.
The Practice Parallel: How many of your staff use the same password across multiple accounts? A single compromised personal account can become the gateway to your practice management system.
2. Insufficient Network Segmentation
Once inside, the attackers accessed customer data across multiple systems. This suggests Medibank's network wasn't properly segmented to contain breaches.
The Practice Parallel: If someone compromises your practice WiFi, can they access your clinical database? Most practices we audit have no network segmentation between public WiFi, staff computers, and clinical systems.
3. Limited Monitoring
The breach went undetected for weeks. This indicates insufficient monitoring of network activity and data access patterns.
The Practice Parallel: Would your practice know if someone was copying patient records at 2am? Most practices have no visibility into after-hours system access.
4. Delayed Response
Even after detection, it took time to fully understand the scope and notify affected customers.
The Practice Parallel: Do you have a documented incident response plan? Most practices we work with have never thought about what to do if they suspect a breach.
The Data That Was Stolen
The attackers accessed:
- Names, dates of birth, addresses, phone numbers
- Health claim information including procedures and diagnoses
- Mental health records for some customers
- Pregnancy termination records
- Gender reassignment procedures
What Perth Medical Practices Must Do Now
Based on our forensic analysis of the Medibank breach and our experience securing Perth practices, here are the critical defenses your practice needs:
1. Multi-Factor Authentication (MFA) Everywhere
Every system that contains patient data must require MFA. This includes:
- Practice management software (Best Practice, Medical Director, Genie Solutions)
- Email systems
- Cloud storage
- Remote access tools
2. Network Segmentation
Your network should have distinct zones:
- Clinical zone: Practice management, patient records (highly restricted)
- Business zone: Email, internet, office applications (moderate access)
- Guest zone: Patient WiFi (isolated from everything else)
3. Privileged Access Monitoring
Track who accesses what data and when:
- Log all database queries
- Monitor file access patterns
- Alert on unusual activity (weekend access, bulk data exports)
- Regular access reviews
4. Endpoint Detection and Response (EDR)
Traditional antivirus isn't enough. Modern attacks use legitimate tools and "living off the land" techniques:
- Behavioral analysis of user activity
- Machine learning threat detection
- Automated response to suspicious behavior
- Forensic capabilities for incident investigation
5. Regular Penetration Testing
Test your defenses with simulated attacks:
- External network penetration testing
- Social engineering assessments
- Wireless network testing
- Application security testing
6. Incident Response Planning
Document exactly what to do if you suspect a breach:
- Who to contact (IT provider, OAIC, insurers)
- How to preserve evidence
- Communication with patients and staff
- Legal obligations under Privacy Act
The RACGP Connection
The RACGP Standards for General Practices (5th Edition) require practices to have cybersecurity measures in place. The Medibank breach validates these requirements aren't just compliance checkboxes โ they're essential patient protection.
Criterion 1.6.2 specifically requires practices to "implement information security measures" including access controls and monitoring.
Learn more about RACGP IT compliance requirements โ
Beyond Technical Controls: The Human Factor
The Medibank breach likely started with human error โ someone clicking a phishing email or using a weak password. Technical controls are essential, but staff training is equally critical:
- Phishing simulation training: Regular fake phishing emails to test and train staff
- Password policy enforcement: Strong, unique passwords with MFA
- Social engineering awareness: Teaching staff to verify unusual requests
- Incident reporting culture: Staff should feel safe reporting suspected security issues
The Cost of Getting It Wrong
The Medibank breach resulted in:
- $143 million in remediation costs
- $50 million in expected insurance claims
- Ongoing legal action and regulatory investigation
- Immeasurable reputational damage
- Privacy Act penalties up to $50 million (though likely much less for small practices)
- Professional indemnity claims from affected patients
- AHPRA investigation potentially affecting practitioner registration
- Patient trust loss and practice closure risk
What We're Seeing in Perth Practices
In our security assessments of Perth medical practices since the Medibank breach, we consistently find:
- 73% have no MFA on practice management systems
- 85% have no network segmentation
- 91% have no monitoring of data access
- 96% have no documented incident response plan
- Regular IT budget allocation (not just "break-fix" mentality)
- Staff cybersecurity training programs
- Proactive monitoring and updating
- Clear policies and procedures
Taking Action: Your Security Assessment
Every Perth practice should conduct an immediate security assessment covering:
1. Access Controls: Who can access what data, and how is it protected?
2. Network Security: How is your network segmented and monitored?
3. Data Protection: How is patient data encrypted and backed up?
4. Incident Response: What happens if you suspect a breach?
5. Staff Training: Are your team prepared to recognize and respond to threats?
Getting Started: The First 30 Days
Week 1:
- Enable MFA on all practice management and email systems
- Change all default passwords on network equipment
- Document current network architecture
- Implement network segmentation (guest WiFi isolation minimum)
- Enable logging on critical systems
- Create incident response contact list
- Conduct staff phishing simulation
- Review user access permissions
- Test backup restoration procedures
- Document security policies and procedures
- Schedule regular security updates
- Plan for professional security assessment
The Bottom Line
The Medibank breach wasn't the result of sophisticated nation-state hackers or zero-day exploits. It was the result of basic security failures โ stolen credentials, poor network segmentation, and insufficient monitoring.
These are the same vulnerabilities we find in Perth medical practices every week.
The difference is that Medibank had the resources to eventually detect and respond to the breach. Most medical practices would not.
The question isn't whether your practice will be targeted โ it's whether you'll detect the attack before your patients' most sensitive information ends up for sale on the dark web.
---
How SkyComm Can Help
As Perth's medical IT specialists, we've developed a comprehensive cybersecurity program specifically for medical practices:
- Security Assessment: Complete evaluation of your current security posture
- Implementation: Deployment of enterprise-grade security controls
- Monitoring: 24/7 threat detection and response
- Training: Staff cybersecurity awareness programs
- Compliance: RACGP standards alignment and documentation
Don't wait for your practice's name to be in the headlines. The cost of prevention is always less than the cost of recovery.
---
About the Author: This analysis is based on public information about the Medibank breach, combined with our 20+ years of experience securing medical practices across Perth and Western Australia. SkyComm is a certified IT security provider specializing in healthcare compliance and data protection.
SkyComm IT Solutions
Perth's leading medical and business IT support provider. Trusted by healthcare practices, law firms, and businesses across Western Australia for over 20 years.



