DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

No need to hack when it’s leaking: SavantCare edition

Posted on April 11, 2025April 11, 2025 by Dissent

Today’s concerning leak is brought to you by SavantCare. The leak was discovered by an independent researcher who first reported it on his blog yesterday. In his report, @JayeLTee states that he found exposed data that included data from SavantCare employee chats.  “Over two-thirds of the 308 users on the chat were for SavantCare, a Mental and Behaviour Health Clinic from the United States, and around 30 users were from OVLG (Oak View Law Group),” JayeLTee reported, noting that the chat was likely set up by Grmtech, a digital marketing and SEO company from India.

“It was difficult to get any total numbers,” he told DataBreaches. “It was 130k files, but those contained a lot of dupes. After some de-duplication, there appeared to be about 87,000 files.” Not all of the files were from SavantCare. He also estimated that there were 6 million chat messages, about 1.8 million of which appeared to be from SavantCare employees.

Some of what JayeLTee saw reportedly included:

CURES reports (Controlled Substance Utilization Review and Evaluation System), patient medical reports, patient registration forms related to ZocDoc check-ins, professional liability insurance certs, lab reports, insurance medication reviews, insurance cards, ROI (release of information) docs, recorded calls, resumes, and more.

JayeLTee also shared some files with DataBreaches that he did not include or report in his blog post. They included audio files of phone conversations between SavantCare staff and patients. Some were routine calls to create appointments or deal with prescriptions, but there were also some sensitive phone recordings concerning lawsuits or potential lawsuits against SavantCare by patients in the U.S. and by the family of a deceased employee in India. JayeLTee waited to publish his findings, as did this site, until the data had been secured.

Noting that neither SavantCare nor GRMTech responded substantively to his disclosure, DataBreaches reached out to SavantCare to seek more details. Having established that SavantCare states that they are a HIPAA covered entity, DataBreaches emailed them a number of questions about the exposed data and its lack of encryption, whether GRMTech had adequate logs to determine how many unauthorized IP addresses may have accessed the data, and whether any regulators or patients have been notified.

They have not replied to that email or to the second request emailed earlier this week.

DataBreaches also emailed some questions to GRMTech in India, but no reply has been received.  If SavantCare or GRMTech responds to DataBreaches’ inquiries, this post will be updated.


Related:

  • Two more entities have folded after ransomware attacks
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Government will 'robustly defend' compensation claims from Afghans put at risk by data breach
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
Category: ExposureHealth DataHIPAA

Post navigation

← In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks
Patient data leaked from cyberattack on Brunswick Medical Center →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.