{"id":22065,"date":"2026-02-07T09:00:00","date_gmt":"2026-02-07T08:00:00","guid":{"rendered":"https:\/\/ig.technology\/index.php\/2026\/02\/07\/apollomd-cyberattack-exposed-data-from-626000-patients-nine-months-later-victims-are-just-finding-out\/"},"modified":"2026-02-07T09:00:00","modified_gmt":"2026-02-07T08:00:00","slug":"apollomd-cyberattack-exposed-data-from-626000-patients-nine-months-later-victims-are-just-finding-out","status":"publish","type":"post","link":"https:\/\/ig.technology\/index.php\/2026\/02\/07\/apollomd-cyberattack-exposed-data-from-626000-patients-nine-months-later-victims-are-just-finding-out\/","title":{"rendered":"ApolloMD Cyberattack Exposed Data from 626,000 Patients \u2014 Nine Months Later, Victims Are Just Finding Out","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>A May 2025 ransomware attack on ApolloMD Business Services \u2014 a Georgia-based healthcare management company serving over 125 physician practices across 18 states \u2014 has now officially been confirmed to have exposed the sensitive personal and medical information of <strong>626,540 individuals<\/strong>. The full scope of the breach only reached the U.S. Department of Health and Human Services breach portal in February 2026, nearly nine months after the initial attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Was Stolen<\/h2>\n\n\n\n<p>Between May 22 and May 23, 2025, unauthorized attackers gained access to ApolloMD&#8217;s IT systems and made off with files containing both personally identifiable information (PII) and protected health information (PHI). The exposed data includes names, addresses, dates of birth, diagnosis information, provider names, dates of service, treatment information, and health insurance data. For a subset of individuals, Social Security numbers were also compromised.<\/p>\n\n\n\n<p>The Qilin ransomware group claimed responsibility for the attack in June 2025, stating they had exfiltrated approximately 238 GB of data. Qilin has been one of the most active ransomware groups of the past year, having targeted hundreds of organizations globally including the UK&#8217;s National Health Service.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Nine-Month Gap That Left Victims Exposed<\/h2>\n\n\n\n<p>ApolloMD began notifying affected physicians and practices between July and September 2025. Individual patients started receiving notification letters on September 17, 2025 \u2014 four months after the attack. However, the full 626,540-person count was not officially reported to HHS until February 2, 2026.<\/p>\n\n\n\n<p>That nine-month window of uncertainty is not just troubling \u2014 it is potentially catastrophic for victims. During that time, anyone affected could have had fraudulent medical claims filed on their behalf, had prescriptions written using their identity, or had their tax returns stolen using their Social Security numbers. Credit monitoring, which ApolloMD is offering to those whose SSNs were exposed, only catches financial fraud after it occurs. It does nothing to prevent medical identity theft.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Healthcare: The Softest Target in Cybersecurity<\/h2>\n\n\n\n<p>The ApolloMD breach is not an isolated incident \u2014 it is part of a systemic pattern. The healthcare sector continues to be one of the most heavily targeted industries because it combines high-value sensitive data with legacy infrastructure, constrained security budgets, and organizations that cannot afford operational downtime. Until the industry collectively invests in robust, proactive cybersecurity \u2014 and regulators enforce faster and more transparent breach notification standards \u2014 patients will continue to be the ones who pay the price.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-vivid-red-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.linkedin.com\/news\/story\/apollomd-cyberattack-exposed-data-from-626000-people-8376954\" target=\"_blank\" rel=\"noopener noreferrer\" style=\"border-radius:8px;padding:14px 32px\">&#128279; Read Original Article<\/a><\/div>\n<\/div>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"<p>A May 2025 ransomware attack on ApolloMD Business Services \u2014 a Georgia-based healthcare management company serving over 125 physician practices across 18 states \u2014 has now officially been confirmed to have exposed the sensitive personal and medical information of 626,540 individuals. The full scope of the breach only reached the U.S. Department of Health and Human Services breach portal in February 2026, nearly nine months after the initial attack. What Was Stolen Between May 22 and May 23, 2025, unauthorized attackers gained access to ApolloMD&#8217;s IT systems and made off with files containing both personally identifiable information (PII) and protected health information (PHI). The exposed data includes names, addresses, dates of birth, diagnosis information, provider names, dates of service, treatment information, and health insurance data. For a subset of individuals, Social Security numbers were also compromised. The Qilin ransomware group claimed responsibility for the attack in June 2025, stating they had exfiltrated approximately 238 GB of data. Qilin has been one of the most active ransomware groups of the past year, having targeted hundreds of organizations globally including the UK&#8217;s National Health Service. A Nine-Month Gap That Left Victims Exposed ApolloMD began notifying affected physicians and practices between July and September 2025. Individual patients started receiving notification letters on September 17, 2025 \u2014 four months after the attack. However, the full 626,540-person count was not officially reported to HHS until February 2, 2026. That nine-month window of uncertainty is not just troubling \u2014 it is potentially catastrophic for victims. During that time, anyone affected could have had fraudulent medical claims filed on their behalf, had prescriptions written using their identity, or had their tax returns stolen using their Social Security numbers. Credit monitoring, which ApolloMD is offering to those whose SSNs were exposed, only catches financial fraud after it occurs. It does nothing to prevent medical identity theft. Healthcare: The Softest Target in Cybersecurity The ApolloMD breach is not an isolated incident \u2014 it is part of a systemic pattern. The healthcare sector continues to be one of the most heavily targeted industries because it combines high-value sensitive data with legacy infrastructure, constrained security budgets, and organizations that cannot afford operational downtime. Until the industry collectively invests in robust, proactive cybersecurity \u2014 and regulators enforce faster and more transparent breach notification standards \u2014 patients will continue to be the ones who pay the price.<\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":1,"featured_media":22064,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[114,19],"tags":[],"class_list":["post-22065","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-attacks","category-cyber-security"],"aioseo_notices":[],"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/posts\/22065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/comments?post=22065"}],"version-history":[{"count":0,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/posts\/22065\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/media\/22064"}],"wp:attachment":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/media?parent=22065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/categories?post=22065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/tags?post=22065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}