The Update: The incident, which began in late January 2025, involved unauthorised access to SimonMed's network for approximately two weeks. The Medusa ransomware group, which claimed responsibility on February 7, allegedly stole over 212 GB of data and demanded a $1 million ransom. The compromised information is extensive, including patient names, addresses, social security numbers, driver's license numbers, financial details, and a wide range of sensitive medical information such as diagnoses, treatments, and medications.
"Upon discovering we were the victim of a criminal attack, we immediately began an investigation and took steps to contain the situation," SimonMed stated.
SimonMed began notifying affected individuals on October 10, nearly nine months after the initial intrusion. The company has stated it has no evidence the compromised information has been used for fraud, and is offering identity theft protection services to those affected. The breach was initiated through a compromised third-party vendor, highlighting the persistent threat of supply chain attacks in the healthcare sector.
Why it Matters: This breach is the second-largest ransomware-related incident in the US healthcare sector this year, demonstrating the relentless targeting of medical providers by cybercriminals. The exposure of such a vast and detailed dataset creates a significant risk of identity theft, sophisticated phishing campaigns, and other fraudulent activities for the 1.27 million affected patients.
The nine-month delay between the breach and public notification raises serious questions about transparency and the effectiveness of breach disclosure regulations. For the broader healthcare industry, this incident serves as a stark reminder of the critical need for robust third-party risk management and comprehensive security measures to protect against supply chain vulnerabilities.