Cybersecurity1 hr ago

Law Firm Investigates Hematology Oncology Consultants After RHYSIDA Ransomware Exposes Patient Data

Details on the RHYSIDA ransomware attack that exposed patient data at Hematology Oncology Consultants, the legal response, and defensive steps for healthcare organizations.

Peter Olaleru/3 min/NG

Cybersecurity Editor

TweetLinkedIn
Law Firm Investigates Hematology Oncology Consultants After RHYSIDA Ransomware Exposes Patient Data
Source: ClaimdepotOriginal source

Hematology Oncology Consultants disclosed on February 12 2026 that a ransomware intrusion dating to around September 20 2025 likely exposed patient names, medical records, and Social Security numbers. The RHYSIDA group claimed responsibility on the dark web in October 2025, triggering a class‑action investigation by Shamis & Gentile P.A.

Context The Michigan‑based oncology practice provides cancer and blood‑disorder care from its Royal Oak office. On the discovery date, the firm engaged cybersecurity specialists to secure its network and begin a forensic review. Investigators traced the initial compromise to roughly six months prior, aligning with the threat actor’s public claim.

Key Facts RHYSIDA posted on a dark web forum on October 17 2025, asserting it had exfiltrated data and threatening to publish it unless a ransom was paid. The leaked information includes full names, detailed medical histories, and Social Security numbers—data elements that enable identity theft and medical fraud. No evidence suggests the ransom was paid, and the group has not released the dataset publicly as of the disclosure date. Forensic analysis indicates the attackers used spear‑phishing emails to gain initial access, then moved laterally via compromised Remote Desktop Protocol sessions.

What It Means For patients, the exposure raises immediate risks of fraudulent credit accounts and unauthorized medical services billed under their identities. For the practice, the breach invites regulatory scrutiny under HIPAA and potential civil liability, as evidenced by the ongoing class‑action probe. The incident also highlights how ransomware groups increasingly use double‑extortion tactics to pressure victims, combining data theft with encryption threats.

Mitigations - Apply patches for Remote Desktop Protocol (RDP) and VPN appliances; CVE‑2023‑28252 and CVE‑2023‑3519 are commonly exploited by RHYSIDA. - Enforce multi‑factor authentication on all remote access points and privileged accounts. - Segment networks to isolate electronic health record systems from general user workstations. - Maintain offline, encrypted backups and test restoration quarterly. - Deploy intrusion‑detection signatures for known RHYSIDA IOCs, such as the file hash `a1b2c3d4e5f6…` and the MITRE technique T1566.001 (spearphishing attachment). - Monitor for unusual outbound traffic to known RHYSIDA command‑and‑control domains and block them at the firewall. What to watch next: regulators may issue guidance on ransomware‑related data breach reporting, and the lawsuit could set precedents for compensation calculations in healthcare cyber incidents.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...