utf9k A robot icon

A recap of the ManageMyHealth data breach so far

Media coverage has been a bit lacking so I've compiled what we know so far
Contents

Disclaimer

To be completely clear, I have no special insight or knowledge of the ManageMyHealth breach, nor am I affiliated with ManageMyHealth or any of the entities assisting them as this situation is investigated. This post is comprised of material that I have either directly observed or have attempted to personally verify to the best of my ability. That said, I am not a reporter nor a cybersecurity professional. As always, use your own good judgement when reading text on the internet written by strangers.

At 4:10am NZDT1 on the 31st December, a post went up on a certain forum advertising a 108GB data breach related to the New Zealand patient portal ManageMyHealth.

What is ManageMyHealth

ManageMyHealth is an online portal that primarily acts as an intermediary between patients and their GPs.

Patients have access to this portal via the iOS and Android apps, as well as via the ManageMyHealth website.

Patients can book appointments, exchange messages with GP staff, access their health records, and request repeat prescriptions among other functions.

On the GP side, they’re able to manage appointments, submit electronic prescriptions to pharmacies and host video consultations.

The value proposition of this sort of platform is that it consolidates all of the various actions and information that a patient might need into one place, while saving GPs from having to employ an entire software team to unlock these capabilities.

For the speed scrollers

There is zero indication or reason to believe that this breach extends to competitors of ManageMyHealth or partners of ManageMyHealth such as Health New Zealand – Te Whatu Ora. ManageMyHealth is a privately operated portal and they are responsible for the management and security of their own systems.

ManageMyHealth has a number of competitors in New Zealand such as myindici2 and Health3653 to name a few.

Since posting this article, I’ve been informed that GPs do not directly provide medical records to ManageMyHealth. Instead, they are uploaded via an external GP-facing interface, one of which is provided by Medtech Global. ManageMyHealth may have integrations with other practice management systems but I have no knowledge of that to state either way.

ManageMyHealth have previously announced that they have a partnership allowing them access to Medtech ALEX, which is likely the method used for syncing health documents from Medtech into their own systems.

As a side note, Medtech’s two main products are Medtech Evolution and Medtech Cloud. Evolution is an on-premise Practice Management Software (PMS) system, meaning that healthcare providers are responsible for hosting and running the software themselves. Cloud is a hosted PMS that is operated and updated by Medtech themselves.

As an additional side note, Medtech Global was originally founded by Vino Ramayah4 who sold the company to Acclivis Group and Advent Partners. During this sale, ManageMyHealth was spun out into a subsidiary of Cereus Health Group. Vino Ramayah is the sole owner of Cereus Health5 as well as Chief Executive of ManageMyHealth.

What is the ransom requested?

The forum post mentioned at the start of this article was posted by a user going by the name Kazu6, who has breached a number of entities in the past few months.

These sorts of forum posts are effectively a preorder notice. The contents of the breach may soon be available for prospective buyers to purchase if the ransom is not paid before the deadline is reached.

The total size of the breach is stated to be 108GB and is comprised of 428,337 files. There is no detail as to what exactly those files are, or which part of ManageMyHealth they have come from.

As an example, some breaches are complete database dumps of SQL databases. Other breaches are comprised of files such as PDFs. The post in question gives no explicit indication as to whether one or both of these data types are involved or yet another type.

The breach is also alleged to have happened on December 29th, although no timestamp or time is mentioned but we can probably safely assume this took place sometime on December 30th from New Zealand’s point of view.

Lastly, the ransom amount requested is $60,000. This is presumably in USD but is not explicitly stated.

There is also no indication on how the ransom price is calculated. One factor is likely that it’s better to request an amount that can be rationalised as “cheap” than it is to request a large amount that will never be paid.

As a point of comparison, UK-based CT Dent was breached by Kazu in early December with a ransom of $100,000 requested in exchange for 1,058,262 files totalling 7TB of data.

Lastly, but most importantly, attached to the forum post is a “sample” which is a set of files that are claimed to represent the larger breach. It is a common “courtesy” to share breach samples so that prospective buyers can validate what the seller is claiming to have in their possession.

We’ll come back to the sample later on.

What has ManageMyHealth claimed so far?

On a technical level, there would seem to be enough pieces of circumstantial evidence available to make an informed guess but for the purposes of this recap, we’ll stick to what has been officially confirmed.

At the time of writing, all of the official information that we know comes in the form of FAQS for Cyber Breach as well as three press releases. Annoyingly, the posts can’t be linked to directly so you’ll need to click the FAQ link above and then click “News & Updates” in the sidebar.

The only FAQ entry with technical substance is Item 5 which states the following:

  1. What does “accessed” mean and is that the same as “downloaded”

No. ‘Accessed’ means an unauthorised party may have viewed or opened files. ‘Downloaded’ means files were copied out of the environment. Independent forensics are being used to confirm what was accessed and what may have been downloaded.

For context, when the FAQ was first published, the term “Unauthorized Access” was being used in ManageMyHealth’s initial statements to the media. Given that, they appeared to make it a point to stress that “access” does not necessarily mean “downloaded”.

With the press releases, the first two were mostly acknowledging that ManageMyHealth had become aware of a cyber security incident “following notification from a partner”, that they had notified various New Zealand authorities and that they were engaging “independent international forensic consultants”.

With the January 3rd, 2026 update, the public got confirmation of two main facts:

We know that 6-7% of the approximately 1.8 million registered users have been affected by this incident.

as well as

The investigation has identified that one module, Health Documents, within the app was compromised, not the whole app.

That comprises all of the technical details that we officially know at the time of writing.

What has Kazu claimed so far?

Given that this breach took a day or two before it was acknowledged by ManageMyHealth, I figured it might be useful to reach out to Kazu and see if they would be able to give any details on the breach.

The idea here was that it would be a useful point of comparison against what is stated publicly, as well as when/if an official report is released as a result of any investigation which had not yet kicked off at the time.

Kazu had also proven to be somewhat forthcoming with information in regards to previous breaches so I contacted them on Telegram.

When asked about the nature of the breach, Kazu initially stated “you can ask MMH how they get breached” but after a little bit of convincing, they shared the following:

It's worth mentioning that Access Control is a very large category of problems so it doesn't really narrow things down a huge amount by itself.

Asked if they would be able to elaborate a bit more, Kazu stated that they couldn’t.

Well, it was worth a try

At this point, it’s important to remember that for Kazu, breaches are a business and part of that business involves perception.

There is only upside to having confusion regarding the scope and specifics of a breach, as it results in more pressure being placed on the victim to pay the ransom.

While I don’t personally think they would have any incentive to be entirely misleading, it is still worth taking this information with a grain of salt.

What was in the first sample set?

As mentioned earlier, attached to the forum post was a sample, in the form of a zip file.

Data breaches are not always guaranteed to be real, with some number of historical breaches being comprised of real data mixed with synthetic data7 or just being previously existing breaches mixed together repackaged as something “new”.

For that reason, combined with my parents being users of ManageMyHealth, I wanted to take a closer look at the claimed sample as there had been no reporting whatsoever on its existence, let alone their validity.

Before we continue, it’s worth noting that doing this knowingly is likely to be illegal8. At the time, I was not aware if these files were real, which probably doesn’t make it any less illegal.

Within the sample zip file was a number of documents which were all PDFs if I recall correctly.

There were a number of different document types such as typed referral letters, scanned letters from both GPs and patients, test results, hospital emergency department discharge summaries, patient health summaries and various other letters.

Present on most of the documents were full names, addresses, phone numbers, NHI numbers and all sorts of other personally identifiable information.

Two documents in particular stood out which were a molemap report and a Metacognition9 neuropsychological report.

Molemap Report

This report contained a bunch of pages that I didn’t pay much attention to but most striking were two photos on a particular page.

One photo was of the naked top of a man while the other was their underwear-covered bottom.

These were the only photos in the set that I recall seeing and they really drove it home that beyond the potential for identity fraud, who knows how many compromising and/or embarrassing photos that patients have submitted to their GPs in confidence.

Metacognition Neuropsychological Report

This report also stood out for the amount of non-medical information that it contained.

Without going into any identifying detail, it talked about a woman who had obtained a head injury and was struggling to cope with it, even acknowledging that she had some dark thoughts from time to time.

It gave a wide-ranging overview of her career, and most recently talked about how she thought she was valued, only for her employer to seemingly go behind her back in trying to find a replacement.

It also talked about her relationship status in a minor amount of detail.

The thing that got me here was that some of these reports, particularly the holistic ones, may have a range of information that is not medically relevant but would be attractive to scammers when they’re crafting campaigns.

Disposing of the sample

Given the questionable legality of the above, I’ll note that once I had gained enough confidence that the sample set appeared to be legitimate, I deleted it from my laptop and sent an email to Office of the Privacy Commissioner.

At the time of writing, I haven’t heard back from the Privacy Commissioner in regards to this email but this isn’t too surprising given how close it is to New Year’s Day still.

What was in the second sample set?

For a brief period of time, the sample set linked by Kazu in the forum post would get taken down and then reuploaded, only to get taken down again.

At one point, Kazu posted in their Telegram channel that they were having technical difficulties, although they didn’t elaborate further and later deleted the message.

Reading between the lines, a New Zealand authority may have successfully filed a takedown notice for the sample.

During this period, I took a closer look at Kazu’s other active10 breach, which was for Saudi Icon, a Saudi Arabian architecture firm.

This particular breach had been uploaded to MEGA which gives a web preview and visiting the link showed two zip files.

Thinking that they were both Saudi-Icon related, I downloaded both. Sure enough, one of them was a set of files that seemed architectural in nature but to my surprise, the second was a further set of 182 documents that appeared to be related to ManageMyHealth.

My guess would be that this second sample is either intended to be posted closer to the deadline or was prepared to send to ManageMyHealth.

I later confirmed with Kazu that this was a mistake and this second sample was not intended to be distributed in this fashion.

This sample also contained various letters and lab results as well as an ADHD assessment, another Metacognition neurological assessment, a Covid vaccination certificate, full medical histories for two patients and two scans of passports originally issued overseas.

Interestingly, it also contained a 2023 credit card statement for InLogic Technologies PVT LTD, who are based in India.

As a bit of background, InLogic are an “IT Solutions” company, providing a number of services such as software development, quality assurance testing, security auditing and other general types of consulting.

They are also owned by Vino Ramayah, the CEO of ManageMyHealth as the ultimate owner of its parent company Cereus Health Group5.

Having a credit card statement for an entirely different company also seems a little odd. At a guess, InLogic may be the development team who work on the various versions of ManageMyHealth11.

Disposing of the sample

As with the first sample set, I’ll note that once I had gained enough confidence that the sample set appeared to be legitimate, I deleted it from my laptop and sent another email to Office of the Privacy Commissioner.

At the time of writing, I haven’t heard back from the Privacy Commissioner in regards to this email and again, this isn’t too surprising given how close it is to New Year’s Day still.

How are the samples structured

Both samples were just a list of files with no folders.

The filenames were a mix of machine-generated and user-specified.

It appeared that whenever the files were uploaded, their filenames were kept intact instead of being overwritten with a machine-generated name.

For the filenames that were user-specified, they had no common format and were human-readable names like Report From That One Clinic.pdf.

For the filenames that were machine generated, they were generally Te Whatu Ora reports with a filename that was something like DSC0000088.pdf, DSC00000889.pdf and so on.

From memory, there were more user-specified filenames than machine-generated.

Given that, I would think that this isn’t a simple case of the breacher incrementing filenames one by one.

What was the likely cause of the breach?

A not-uncommon cause of data breaches is due to object storage systems being misconfigured such that they are publicly exposed to the internet for anyone to browse and download without requiring authorisation.

This is a popular theory as it was surprisingly easy to make objects public when using cloud services not that many years ago.

Nowadays, most cloud providers lock down object storage by default and you have to jump through a number of hoops to make something public.

Personally, it seems like a safe assumption that object storage was involved in some capacity given that both sample sets contained files.12

Before we go further, I will mention that there is still scope for the issue to not be related to object storage.

While we have not seen or heard that any databases were affected, either by confirmation from ManageMyHealth or by way of the sample sets containing SQL extracts, we can’t entirely remove it off the table as we don’t know what the full dataset contains.

The January 2nd, 2026 did state the following:

Preliminary investigation reveals no evidence at this stage that the core patient database was accessed, nor any evidence of data modification or destruction within our system, nor any access to user credentials.

This does not strictly rule out that any databases were accessed, just that there was no evidence of access at that stage of the investigation.

It’s highly unlikely that anyone would be storing the binary content of files in a database mind you but crazier things have happened.

Another possibility could be that the files were served at request time but I would mark this as unlikely due to the credit card statement present in the second sample set.

It goes without saying that having a medical records system store a credit card statement would be absurd and I can only assume it ended up there by way of someone testing out an interface for uploading files.

With all that out of the way, our two options would seem to be either a publicly accessible object storage or indirectly accessible object storage via the ManageMyHealth patient portal.

Back in the January 3rd, 2026 update, it was stated that

The investigation has identified that one module, Health Documents, within the app was compromised, not the whole app.

If we were looking at a publicly accessible object storage system, it would imply that there would be no need to breach the patient portal given no authentication would be required.

It’s possible that the breacher first targeted the patient portal only to discover the object storage was publicly accessible like an unlocked front door but personally, I’m going to rule it as less likely.

With that, we’re left with indirectly accessible object storage.

We know that the names of the files from the two samples are all over the place so the breacher wouldn’t have been able to just fetch objects by incrementing a filename (ie; AAA01.pdf, AAA02.pdf etc).

They would either need to have some sort of index that they could iterate through or they obtained access to a set of object storage credentials that had permission to both list and fetch objects.

Putting aside credentials, there could be a number of ways to obtain this index such as a vulnerable endpoint for listing documents for a given GP, a backoffice-type webpage or API for listing documents across the portal or something else entirely.

Hopefully we’ll get an official investigation report in time but I think there’s enough to make a fairly educated guess.


  1. As best as I can tell, timestamps on that forum reflect the Mumbai timezone, which is GMT +5:30 hours. The original forum founder was identified as living in India a number of years back by a cyber security firm who used OSINT methods. The timezone when registering a forum account also defaults to GMT +5:30 hours. ↩︎

  2. myIndici is the customer-facing name provided by Indici↩︎

  3. Health365 is the customer-facing portal provided by myPractice↩︎

  4. https://www.nzdoctor.co.nz/article/undoctored/medtech-global-pms-business-sold-and-manage-my-health-split-out ↩︎

  5. https://app.companiesoffice.govt.nz/companies/app/ui/pages/companies/6486912/shareholdings ↩︎ ↩︎

  6. Kazu is either an individual and/or a group. Both of these things may be true. There would appear to be a single user going by the username Kazu on Telegram. There may also be one or more members who work with Kazu as part of a larger group behind the scenes. In a November 2025 interview with databreaches.net, it was stated that Kazu is an individual who “had worked with a number of other individuals and groups over time, but had more recently gone out on his own.”. It is not explicitly stated if Kazu confirmed themselves to be a male so I will continue to refer to “Kazu” in a gender-neutral fashion. ↩︎

  7. By synthetic, I mean files and other data that looks real at a glance but is actually fake. It could be fake names in fake documents or real names in fake documents. ↩︎

  8. I’m not a lawyer but probably Privacy Act 2020? I’m not sure if New Zealand has an equivalent of the CFAA↩︎

  9. I assume this was the name of a healthcare provider but I can’t seem to find any obvious web presence for them. ↩︎

  10. Active here means that the ransom is still pending and the deadline has not been reached. I have no idea if there is an official term of art. ↩︎

  11. ManageMyHealth are a New Zealand company but they also spun up Australian and Indian versions of the software. ↩︎

  12. I promise I’m just being overly explicit so I don’t get sued for false claims. If I wasn’t writing this post on the public internet about a legally questionable topic, I would be a lot more snarky I’m sure. ↩︎