DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.

Posted on October 24, 2025 by Dissent

Modernizing Medicine (“ModMed”) is a healthcare technology firm that provides Electronic Health Records (EHR) and practice management software to many HIPAA-covered entities.

ModMed recently announced that on July 29, it discovered unauthorized activity in some of its computer servers. The servers in question contained data from some of ModMed’s podiatry clients, and the data was accessed and exfiltrated between July 9 and July 10. ModMed notified its impacted providers on September 19 and then notified affected patients on October 17.

According to its notification letter, the types of information included full names, addresses, dates of birth, Social Security numbers, phone numbers, email addresses, health insurance information, medical record numbers, patient account numbers, dates of service, providers, practice names, billing and diagnostic codes, prescription and medication information, as well as diagnosis and treatment information.

No criminal group has claimed responsibility for the July attack as of this publication. However, someone recently attempted to sell data from what they claimed was a second attack on ModMed.

Spurious Claims of a Second Breach?

On October 20, a listing appeared on the Breachst[.]rs forum. The listing by a user called @phanes claimed a partial EHR database they had acquired contained the following fields:

billidentifier encounterid patient_account_no patient_name bill_assignee_name dob dos_start dos_end primary_biller_name referring_provider_name pos procedure_code procedure_position dx1 dx2 dx3 modifier units_charged total_charges ins_balance first_billed_date last_billed_date current_insurance current_insurance_uid policy_id insurance_plan group_no primary_insurance primary_insurance_uid secondary_insurance secondary_insurance_uid sex task_type_description batch_number business_unit type bill_follow_up_date bill_assignee_id bill_status balance_type billing_provider_npi provider_npi billed_ claim_submission_format submission_type rcm_status age_days_from_last_billed_date age_days_from_claim_status_change coverage_type rcm_vendor url specialty practice_name pod claim_identifier claim_status date_modified latest_claim_status_effective_date claim_id scrub_rule_fail_message scrub_fail_date firm_id payer_name ar_age_last_touch ar_bill_note_author last_touch_date note_text

The listing also claimed they had 1,003 records.

Listing on BREACHSTARS forum for "MODMED Cloud-Based EHR Partial DB"
Forum listing as it appeared on October 20, 2025. It was subsequently removed. Image: DataBreaches.net

That listing has since been removed, but the contents were also posted on a Telegram channel.

DataBreaches contacted phanes on Telegram to gather more information and request a data sample, which they provided.

After inspecting the data sample they gave us, DataBreaches emailed ModMed with some of the data and asked them to confirm whether they had been breached.

At the time DataBreaches first emailed ModMed, this site was unaware that ModMed had just disclosed the July breach. Once DataBreaches learned of their disclosure, DataBreaches went back to phanes to ask if their data was from that incident. They replied that the July attack was not their attack and that they had attacked ModMed on October 18.

DataBreaches emailed ModMed again, this time asking whether they had been the victim of a second attack on October 18.

The data sample phanes provided to DataBreaches did not contain all of the fields that ModMed had indicated were involved in the July breach. But the July breach reportedly affected an unspecified number of servers. Could phanes’s data have come from just one of those servers on a later date?

The Data Sample

The data sample provided to DataBreaches contained a significant amount of protected health information (PHI).  DataBreaches noted personal, medical, and health insurance information. All of the records in the sample involved billing for patients’ visits to podiatry services. For the first two records that DataBreaches inspected:

Record 1:

A female patient whose first and last name and full date of birth were listed had an appointment on May 5, 2023, with a named provider. From the visit’s diagnostic code, DataBreaches could determine that she has Type 2 Diabetes with deformities of fingers and/or toes. From the treatment code, DataBreaches could determine that she was given a custom-fabricated, therapeutic shoe insert for people with diabetes that was made from a physical model of her foot. DataBreaches could also determine that she has Medicaid coverage in Indiana. We also saw billing information and dates.

A Google search found a woman with her exact name in Fort Wayne, Indiana. The named provider is a podiatrist in Fort Wayne, Indiana.

Record 2:

A male patient whose first and last name and full date of birth were listed had an appointment on May 5, 2023, with a named provider and named referring physician. DataBreaches could determine from the diagnostic code that the patient has Meniere’s disease and was a patient at Atreus Medical in South Carolina, which specializes in ENT. He had insurance with Blue Cross and Blue Shield of South Carolina, and his claim was reportedly denied improperly and resubmitted.

A Google search found a man with his name and age in South Carolina. We also saw a match for him in the National Public Data leak.

The sample data appeared to be real, but was this really a second breach, as phanes claimed, or was phanes trying to sell data from the July breach? There was nothing in the sample to prove that it was newer than the July breach.

ModMed has yet to reply to either of DataBreaches’ emailed inquiries.

DataBreaches noticed that the listing was subsequently removed from the forum where it had appeared. When asked about the removal, phanes claimed the moderators had removed it and banned his account based on false doxing by others. Their explanation did not sound particularly credible. When a forum bans a user, their name usually appears with a strikethrough to indicate banned status. Phanes’s account appeared to have been deleted altogether, with no trace left of them or the post.

There is no evidence, then, of any second attack. But there is evidence that data from as many as 1,500 podiatry patient records are in the hands of someone who is trying to sell them. Will other ModMed patient data show up for sale at some point? Possibly, and anyone who received a notification letter from ModMed should take steps to protect themselves from becoming victims of medical identity theft or fraud.

 


Related:

  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
Category: Breach IncidentsCommentaries and AnalysesHackHealth DataSubcontractorU.S.

Post navigation

← Toys “R” Us Canada customers notified of breach of personal information
Two U.K. teenagers appear in court over Transport of London cyber attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.