353GB of Patient Data Reportedly Breached, Ransom Requested – DataBreaches.Net

On November 7, a hacker on a forum began offering what they claimed to be 353 GB of data from Doctor Alliance, a Texas-based vendor specializing in services for healthcare providers. The seller indicated the package consists of 1,240,640 files, cautioning potential buyers that “all your data will be sold” unless a ransom of $200,000 is paid by November 21, 2025.

Doctor Alliance operates from Texas and provides critical services, including the preparation, delivery, signing of healthcare documents, verification of patient billability, and real-time tracking of documents. As a business associate under HIPAA regulations, the organization carries specific liabilities concerning patient privacy and data security, necessitating a Business Associate Agreement (BAA) with any covered entities.

The forum listing included a sample consisting of a compressed archive containing 533 images of patient files, revealing significant amounts of sensitive personal and protected health information. The files contained data including patient names, dates of birth, addresses, phone numbers, email addresses, Medicare numbers, medical record numbers, diagnoses, treatment plans, medications, and other personally identifiable information. This level of data exposure highlights a serious breach of patient confidentiality that could have severe implications for both the organization and affected individuals.

On November 11, DataBreaches reached out to Doctor Alliance to ascertain whether they had confirmed the breach and whether the incident involved data encryption or merely exfiltration accompanied by a ransom demand. The organization responded by stating they could not verify the legitimacy of the breach based on the initial information available. They requested additional sample data for further investigation, leaving it unclear if they had yet examined the provided sample.

In collaboration with the seller, identified as “Kazu,” DataBreaches obtained a screenshot alleging unauthorized access to Doctor Alliance’s network. The accompanying investigation revealed a match with a person whose details were found through public records repositories. Kazu, though a newer username on the forum, revealed he had experience in hacking and ransom schemes, claiming to have exploited an unpatched vulnerability that Doctor Alliance had failed to address prior to the breach.

This incident exemplifies several potential tactics and techniques as outlined by the MITRE ATT&CK framework. Initial access may have been gained through exploiting an unpatched software vulnerability, followed by lateral movement within the network to exfiltrate sensitive information. The tactics suggest that persistence could also play a role, as Kazu implied a longer timeframe for migration across the network before executing a data dump. Furthermore, the ransom demand parameterizes the ongoing risk of data exposure.

As the investigation evolves, at least one law firm has already begun seeking plaintiffs for a class action lawsuit against Doctor Alliance, with litigation initiated in the Northern District of Texas. The case, which inaccurately cites the company as “Doctors Alliance LLC,” raises critical concerns about data handling practices and compliance with regulatory expectations in the healthcare industry. Despite requests for further information from DataBreaches, there’s been no response from Doctor Alliance since the latest communication.

This developing story serves as a reminder of the vulnerabilities that exist in healthcare organizations today, emphasizing the urgent need for rigorous cybersecurity measures to prevent unauthorized data access and potential breaches of sensitive patient information. Should more details surface, updates will be provided accordingly.

Source link