DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Veradigm’s Breach Claims Under Scrutiny After Dark Web Leak

Posted on November 1, 2025November 2, 2025 by Dissent

Veradigm LLC is a health information technology company that provides software solutions to healthcare providers. On September 22, 2025, Veradigm filed breach notification letters with some state attorneys general.

According to the notice, Veradigm learned that an unauthorized party accessed some clients’ data on December 15, 2024. The clients’ data was located in a storage account that the attacker accessed after obtaining a credential from an attack on an unnamed Veradigm client.

Veradigm states it first became aware of the breach on July 1, 2025, through a third-party investigation of the client’s data breach. Although they were unaware of the incident until July 1, some impacted patients had already filed a class-action lawsuit against them on June 25, 2025.

According to Veradigm’s notification, the specific information impacted varied by individual, but included name, contact details, date of birth, health records data (such as diagnoses, medications, test results, and treatments), health insurance information, payment details, and limited identifiers, such as Social Security numbers or driver’s license numbers. The Goodrum v. Veradigm lawsuit in the Northern District of Illinois has reached a settlement that the court is likely to approve.

Nothing seemed unusual or particularly suspicious about Veradigm’s description of the incident until the day someone with knowledge of the unnamed client’s breach contacted DataBreaches to alert us that the unnamed client was Sunflower Medical Group, and if we looked at the Sunflower data tranche on Rhysida’s leak site, we would find Veradigm client data.

DataBreaches started researching the Sunflower Medical Group incident.

The Sunflower Medical Group Breach

On January 7, 2025, Sunflower Medical Group (“SMG”) in Kansas learned that an unauthorized third party may have accessed and obtained copies of specific files. An investigation confirmed that the breach occurred on or around December 15, 2024.

SMG is an independent group of primary care physicians comprising Sunflower Medical Group, Heartland Primary Care, and Women’s Clinic Associates. SMG notified HHS of the incident on March 7, 2025, and reported that 220,698 patients were impacted.

Following its own investigation, HHS closed its investigation with the following summary:

The covered entity (CE), Sunflower Medical group, reported that it experienced a cyberattack that compromised the protected health information (PHI) of approximately 220,968 individuals. The PHI involved names, dates of birth, addresses, social security and driver’s license numbers, claims information, diagnoses/conditions, lab results, medications, and other treatment information. The CE notified HHS, affected individuals, and the media. In its mitigation efforts, the CE deployed endpoint monitoring, implemented security enhancements, and retrained its workforce to better protect its electronic PHI. OCR provided the CE with technical assistance regarding the HIPAA Rules.

SMG’s notice did not inform patients that their information was leaked on the dark web. SMG did not mention that any non-SMG data had been mixed in with theirs in a dark web leak. But had it been?

Did SMG compare the SMG data tranche on Rhysida’s leak site with the data on its own servers? If they found non-SMG data on their own servers or in the data tranche, what did they do in response?

DataBreaches contacted SMG to ask, but received no reply.

Starting to Connect Some Dots

SMG’s notice did not mention Veradigm, and Veradigm’s notice did not mention SMG, but both entities mentioned a breach that occurred on December 15, 2024.  Did the Rhysida gang, who had added SMG to their dark web leak site on January 7, obtain some credential from SMG that enabled them to access a Veradigm storage account? That is what Veradigm’s notification and website notice would seem to claim, but is that accurate?

Veradigm’s notification to state attorneys general did not list the clients whose patients were impacted by the breach, nor did it specify the total number of affected patients. If Veradigm has notified HHS, it has not yet shown up due to the government shutdown. Reports filed with the state attorneys general of  Texas, South Carolina, Montana, and Massachusetts indicate that 65,270 residents of those states were affected. A report filed with California did not include any numbers.

Although available state numbers do not suggest that this was a big breach, the Goodrum v. Veradigm settlement proposal suggests that two million people may have been affected.

With the exception of SMG, Veradigm’s clients do not appear to have issued their own breach disclosures. However, some clients’ websites link directly to Veradigm’s breach notification, including Urology Associates of Mobile, Cabarrus Eye Center in North Carolina, Family Medical Group of Texarkana, and Peachtree Neurological (now known as Piedmont Physicians Group Peachtree Neurology).  Data from all four of those entities was found in the SMG data tranche on Rhysida’s leak site.

Examining the SMG Data Tranche

On January 7, the same day that SMG claims they learned of a breach, the Rhysida gang added SMG to its dark web leak site with proof of claims. They did not make any claims about the number of unique patients, but claimed to have more than 400,000 driver’s licenses, insurance cards, and social security numbers. There were 7.6 TB of data, comprising 5,288,062 files. An SQL database was more than 3 TB.

 

 Rhysida's listing for Sunflower Medical Group summarized the contents as described in the text. A 10-part data dump was linked after all of the data was dumped.
Rhysida’s listing claimed to have hundreds of thousands of files with personally identifiable information and an SQL database. Image: DataBreaches.net.

According to what Veradigm had written, a credential found in a client’s data breach was used to access a Veradigm storage account containing data on other Veradigm clients.  As Veradigm describes the incident, and as the settlement documents describe it, the storage account was presumably located on Veradigm’s server. So why was DataBreaches seeing data from Veradigm’s clients in the SMG tranche?

Was the client data actually on SMG’s server and not Veradigm’s server?  Or had Rhysida mistakenly combined data from two separate breaches into one tranche?

There was no evidence that Rhysida found any credentials or used them to access Veradigm client data. To the contrary, the Veradigm client data found on SMG’s server was in plain text with no access control at all. Nor did DataBreaches consider it likely that Rhysida would have combined Veradigm client data with SMG data. If there had been a separate breach, Rhysida would have been more likely to try to extort Veradigm directly, but Veradigm has not suggested anything like that.

Veradigm’s version of the incident was no longer making sense.

What Veradigm Clients Had Data on SMG’s Server?

Inspection of one part of the 10-part SMG tranche uncovered data from the following entities:

  • Neighborhood Health Center (formerly Northwest Buffalo CHC)
  • Urology Associates of Mobile (UAMPA)
  • Family Medical Group of Texarkana
  • Peachtree Neurological Clinic  (now known as Piedmont Physicians Group Peachtree Neurological)
  • Virginia Ear, Nose & Throat Associates (Virginia ENT)
  • Cabarrus Eye Center
  • North Buncombe Family Medicine, P.A.
  • Clinton County Medical Center
  • Corona-Temecula Orthopaedic
  • Northeast Orthopedic Clinic
  • Genesis Healthcare Partners (now known as Unio Specialty Care)
  • Advanced Health & Wellness (Advance Care Health System, Rogue Valley Health & Wellness)
  • Premier Primary Care
  • Thomaston Medical Clinic

Seven folders, listed under  the “/data” directory, included folders for Cabarrus Eye Center, Corona-Temecula Orthopaedic, North Buncombe Family, Northeast Orthopedic Clinic, Ntierfiles, and Sunflower Medical Group.  The Ntierfiles folder comprised hundreds of collection notices sent by Genesis Health Partners to patients.

Directory listing shows six different medical practices that includes SMG.
Seven folders for six entities were all at the same hierarchical level. Image: DataBreaches.net

DataBreaches observed that SMG was on the same hierarchical level as the other entities, and three of those entities have posted links on their websites to Veradigm’s breach notification.

If those were the only non-SMG entities found in the SMG tranche, it could support a claim of a storage account; however, this part of the /data directory was not the only data from other non-SMG entities. In another part of the tranche, DataBreaches found folders with what might be employees’ names. Some of the folders with what could be employees’ names included data on other medical practices or groups that seemed unrelated to SMG.

Folder names “Anila,” “ChrisM,” “Saranam,” and “Sudarsan” contained files related to other medical groups. Image: DataBreaches.net

 

Folders called "Saranam" and "Sudarsan" contained files from medical practices in other states.
Folders for other medical entities that appear to be Veradigm clients were found in a different part of the data tranche. Image: DataBreaches.net

In the folder named “Anila,” there were files from patients in Mississippi.

In the folder named “Saranam,” DataBreaches noted files from Advanced Health & Wellness, Family Medical Group, Premier Primary Care, and Thomaston Medical Clinic. Family Medical Group was one of the clients that has posted a link on its website to Veradigm’s breach notification.

In the folder called “Sudarsan,” there were files from Peachtree Neurological, Virginia Ear Nose & Throat, Buffalo Community Health, and Urology Associates of Mobile. Peachtree Neurological and Urology Associates are Veradigm clients that have also publicly linked to Veradigm’s breach notice.

Data in various folders appears to contradict a claim that the client data was in one storage account on Veradigm’s server.

There were even more files from numerous other entities in a folder called “ChrisM,” as illustrated in the screengrab below.

 A listing of folders under the " Chris" folder.
The “ChrisM” folder contained a lot of data from medical practices that appeared unrelated to SMG. Image: DataBreaches.net

There was data from CHI hospitals in Minnesota and North Dakota, Mercy Clinics in Iowa, Physician Enterprise in Centerville and three states, patients in Baudette and Breckenridge, Minnesota, and the Physician Network in Nebraska. Were these entities all clients of Veradigm? DataBreaches is not sure, but it seems unlikely that they data are linked to Sunflower Medical Group.

A search of Google found that Veradigm (formerly known as Allscript) had employees with some of the names we found, but without last names, it was impossible to verify fully.

Unanswered Questions

DataBreaches emailed Veradigm five times between September 30 and October 31 to request clarification of their claims in their breach notification.  In our last email, we provided them with a list of suspected Veradigm clients found in the SMG tranche and the screengrab of the “ChrisM” folder and asked them to please confirm or deny whether the entities were Veradigm clients.

DataBreaches also repeated a question about where the storage account was hosted — on their server or on SMG’s server.

Veradigm did not reply to any of the questions.

DataBreaches cannot be sure that Veradigm clients’ data was on SMG’s server, but the SMG data tranche raises a lot of questions.

As noted previously, SMG did not notify patients that their data was leaked on the dark web. Veradigm has also failed to inform its clients’ patients that their information has been leaked on the dark web.

If Veradigm of SMG replies to the inquiries, this post will be updated.

Category: Breach IncidentsHackHealth DataHIPAAOf NoteSubcontractorU.S.

Post navigation

← Russian Police Bust Suspected Meduza Infostealer Developers
University of Pennsylvania says it wasn’t hacked after a vulgar email was sent to campus community. They were wrong (1) →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.