DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Proposed class action settlement in In re Netgain Technology litigation

Posted on June 20, 2025 by Dissent

There’s an update to the Netgain ransomware attack incident that was first reported in 2020 and thereafter.

CPT Group, Inc., announces a proposed class action settlement in In re Netgain Technology, LLC, Consumer Data Breach Litigation, Case No. 21-cv-1210 (SRN/LIB), United States District Court District of Minnesota.

What is this about? Plaintiffs allege that the data incident occurred between September 2020 and November 2020 when an unauthorized individual accessed Netgain Technology, LLC’s (“Netgain”) computer systems and accessed certain personal or health-related information, which Netgain stored on behalf of other businesses, including healthcare providers and accounting firms.

Who is affected? The Settlement Class consists of all individuals who reside in the United States and who potentially had their personal or health-related information disclosed to an unauthorized third party between September 2020 and November 2020 in the course of a databreach experienced by Netgain.

What does the Settlement provide? Netgain has agreed to pay $1,900,000.00 (the “Settlement Fund”) to settle the class action. Class Members who submit a valid claim may receive either: (a) payment for documented out of pocket losses of up to $5000, and/or payment of up to $75.00 for three hours of attested time spent attributable to the data breach subject to the maximum cap of $5,000 or (b) a flat cash payment equal to a pro rata share of all funds left in the Settlement Fund after the payment of notice and administration, documented loss claims, attorneys’ fees and expenses, and class representative service awards.

How do I file a claim? You must complete and submit a Claim Form, either online or via U.S. Mail by September 17, 2025. Claim Forms are available for download and online submission at www.NetgainClassActionSettlement.com.

Read more of the press release.  According to the complaint, at the time the complaint was filed, the known clients of Netgain included:

(1) Ramsey County, Minnesota, (2) Woodcreek Provider Services and MultiCare Health System, (3) Sandhill Medical Foundation, (4) Apply Valley Clinic/ Alina Health, (5) Neighborhood Healthcare, (6) San Diego Family Care, and its associate, Health Center Partners of Southern California, (7) Jackson Thornton, (8) SouthCare Carolina, (9) Crystal Practice Management, (10) SAC Health Systems, (11) LifeLong Medical Care, (12) Perkins & Co; (13) Barrett Business Services; (14) Nevada Orthopedic & Spine Center; and (15) Minnesota Community Care.

An entire section of the settlement agreement addresses security improvements Netgain commits to making:

2. SECURITY COMMITMENTS.

2.1 Netgain agrees to adopt, continue, and/or implement the following data security measures for a period of no less than 3 years from the Effective Date of this Agreement:

(a) Upgrade Edge firewalls to protect the environment from external sources and limiting traffic to only allowed ports and services. Enable Geo-blocking for Azure clients. Require external access to hosted environment to go through secure gateways.

(b) Ensure the underlying network is configured in a secure, scaleable manner with dedicated subnets, VLANs and VRF’s per client. Deploy core firewall technology in a blocklist methodology blocking undesired traffic. Ensure that DNS filtering and monitoring is deployed across the hosted environment.

(c) Deploy SentinelOne or similar platform across Netgain’s entire data environment along with 24/7 monitoring service.

(d) Ensure that discrete domains and administrative accounts are across client environments. Confirm that Multi-factor Authentication (MFA) is utilized in all hosting environments and monitoring and notification for all suspicious application activity.

(e) Backup services to offer data protection in the event of system corruption with Azure Site Recovery to leverage disaster recovery. Replicate data backups to multiple sites.

2.2 For a period of three (3) years, Netgain shall provide Class Counsel with an annual report attesting to Netgain’s compliance with the injunctive relief set forth above.

Class Counsel will be permitted to share the unredacted report, on a confidential basis, with a third-party expert of Class Counsel’s choosing (subject to approval by Netgain, which will not be unreasonably withheld), at Class Counsel’s expense, to verify Netgain’s compliance with the terms in this Section 2.

2.3 In the event that Class Counsel determines that Netgain is not in compliance with its obligations in Section 2.1, it shall provide Netgain with notice of the same.

Netgain will have 60 days from the date of that notice to cure any non-compliance. In the event that Class Counsel determines that Netgain remains not in compliance for more than 60 days following notice under this Section 2, Plaintiffs or Class Counsel shall have the right to bring a motion to enforce the Settlement Agreement in the Action or in a new, separate action and the prevailing party shall be entitled
to its attorneys’ fees and costs expended in relation to the claimed non-compliance and enforcement actions.

No related posts.

Category: Breach IncidentsCommentaries and Analyses

Post navigation

← Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay
Russia Expert Falls Prey to Elite Hackers Disguised as US Officials →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Cl0p cybercrime gang’s data exfiltration tool found vulnerable to RCE attacks
  • Kelly Benefits updates its 2024 data breach report: impacts 550,000 customers
  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban
  • 20 States Sue HHS to Stop Medicaid Data Sharing with ICE
  • Kids are making deepfakes of each other, and laws aren’t keeping up
  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report