Law Firm Launches Investigation into Southern Illinois Dermatology After 160,000‑Record Data Breach Disclosed Five Months Late
Southern Illinois Dermatology exposed 160,000 patient records in a Nov 2025 breach, delayed notification until Apr 2026, prompting a law‑firm investigation.

TL;DR
Southern Illinois Dermatology exposed 160,000 patients’ data in a November 2025 breach but waited until April 2026 to notify them, prompting a law‑firm investigation.
Context On November 28, 2025 an unauthorized party gained access to the dermatology clinic’s network. The intrusion remained undetected for several months, during which attackers copied files containing personal and medical information. Southern Illinois Dermatology did not begin notifying affected individuals until April 2, 2026, a delay that may violate state breach‑notification laws and federal HIPAA requirements.
Key Facts - The breach exposed 160,000 records, including full names, addresses, dates of birth, Social Security numbers, telephone numbers, email addresses, person numbers, and medical record numbers. - Investigators have not disclosed the exact attack vector, but early indicators suggest the use of valid credentials to move laterally within the network (MITRE ATT&CK T1078). - Some forensic clues point to possible ransomware activity, though no encryption or extortion demand has been confirmed. - The five‑month gap between intrusion and notification exceeds the 60‑day window required under Illinois’ Personal Information Protection Act and the 30‑day HIPAA breach‑notification rule. - Schubert Jonckheer & Kolbe LLP is conducting the investigation on behalf of potentially affected individuals.
What It Means Patients whose data was copied face heightened risk of identity theft, fraudulent medical claims, and phishing attacks that leverage the stolen details. The clinic may incur regulatory fines, class‑action settlements, and costs for credit‑monitoring services. The delayed notification also erodes trust and could trigger stricter oversight from the Illinois Attorney General’s office and HHS’ Office for Civil Rights.
Mitigations Organizations should enforce multi‑factor authentication on all remote access points to reduce reliance on passwords alone (CISA Advisory AA22-257A). Regularly review and prune privileged accounts, and enable logging of successful and failed logins to detect anomalous use (MITRE ATT&CK T1087). Apply network segmentation so that a compromise in one zone does not grant access to patient databases. Deploy endpoint detection and response (EDR) tools with signatures for credential‑dumping and lateral movement techniques. Finally, test breach‑response plans quarterly to ensure notification timelines meet legal requirements.
What to watch next Monitor the law firm’s findings for any disclosed vulnerability or threat‑actor attribution, and watch for potential penalties or settlement announcements from state and federal regulators.
Continue reading
More in this thread
Cloudsmith Lands $72M to Tackle AI‑Driven Software Supply Chain Risks
Peter Olaleru
Vercel Breach Traced to Compromised AI Tool, Limited Customer Impact Confirmed
Peter Olaleru
Southern Illinois Dermatology Breach Exposes 160,000 Records After Five‑Month Notification Delay
Peter Olaleru
Conversation
Reader notes
Loading comments...