DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

From bad to worse: Doctor Alliance hacked again by same threat actor

Posted on November 18, 2025November 18, 2025 by Dissent

On November 12, DataBreaches reported that Doctor Alliance had allegedly been hacked by a threat actor who listed the data for sale on a clearnet forum. At the time, “Kazu” claimed to have 353 GB of data and had given Doctor Alliance a November 21 deadline to pay $200,000 or the data would be sold to others.

As previously noted, Kazu told DataBreaches that he had exploited an older vulnerability that Doctor Alliance had not patched. When emailed about his claims, a spokesperson for Doctor Alliance told DataBreaches that they were investigating the claims but had not confirmed anything. They did not respond to subsequent inquiries when DataBreaches sent them sample files and a screenshot allegedly demonstrating Kazu had access.

Although they failed to provide any further statement to DataBreaches, Doctor Alliance apparently responded to others’ inquiries by acknowledging that they had recently identified unauthorized access involving a single client account. “The issue was contained immediately, impacted systems were secured and the vulnerability was corrected the same day. We are currently working with independent security experts to complete a thorough analysis of the incident. At this stage, we have not verified the claims or numbers circulating online,” they informed ISMG.

Their lack of confirmation or denial did not stop personal injury law firms from seeking plaintiffs for class action litigation or from filing lawsuits already. By now, four potential class action lawsuits have been filed in federal court in the Northern District of Texas.

But Doctor Alliance has an even bigger problem now.  It appears Kazu has hacked them again.

The Second Hack

On Kazu’s Telegram channel, he wrote:

After seeing Vivek Kushalnagar Srinivas, the CEO of Doctor Alliance, proudly announce that the company had “fixed the vulnerability” on the same day our first message was published — we decided to dig deeper.

We decide to search and exploit more vulnerabilities in their system .

This time, we managed to extract a total of approximately 5 million files, including:

3,740,129 signed documents from all PGs (917 GB)

1,240,640 unsigned files (353 GB)

Total: nearly 1.27 terabytes of stolen data.

A check of Kazu’s original forum listing shows that the listing was updated to reflect those numbers. The deadline for Doctor Alliance to respond to them has been revised to November 25, but now the amount is no longer $200,000 but $500,000, as shown below:

Dump Date: 2025Record : 4,980,769 Files Total Size: 1.27 TB Ransom: 500 000$ " contact us on signal to negociate this ransom or all your data will be sold "
Updated listing by Kazu on clear net forum. Image and redaction: DataBreaches.net

In an online chat, Kazu informed DataBreaches that the second attack was launched over the past weekend when employees were not working. He reportedly tried to dump all the files in just 5-7 hours using all his servers. Doctor Alliance employees reportedly did not detect the breach until Monday. As before, Kazu emailed the firm with samples of the data he had acquired.

As far as DataBreaches knows, Doctor Alliance has not responded directly to Kazu nor attempted to negotiate either after the first attack nor this second one that Kazu claims.

DataBreaches asked Kazu whether the second attack involved the same vulnerability as the first attack. He responded that it did, and that he was able to gain access using an account with high privileges. When asked where/how he acquired the credentials, Kazu responded that Doctor Alliance reuses some admin passwords across multiple admin accounts, and he was able to find one by looking at infostealer logs. DataBreaches is unable to attempt to verify those claims.

More Than 1 Million Patients Affected?

Doctor Alliance has many clients, each with many patients. If Kazu exfiltrated more than 5 million records, even if there were many duplicates or multiple files for any one patient, this breach likely impacted a significant number of patients’ sensitive protected health information and personal information.

DataBreaches did not include screenshots of purported patient records in the previous post, but because Doctor Alliance has neither confirmed nor denied that they are real, we are posting a few here to show readers what the data tranche looks like. Kazu provided DataBreaches with an expanded sample of more than 100GB of files. As before, DataBreaches was able to spot-check and find real people with the names, addresses, and dates of birth as the patient records in the tranche.

To give readers a sense of how much protected health information has been compromised, consider two redacted screenshots below. Each one represents a unique patient. The first screenshot is the first page of a multi-page .pdf record for a New Mexico patient with Stage 4 rectal cancer. In addition to her name, date of birth, address, phone number, medical record number, and information on the healthcare provider, the cover sheets lists her primary and secondary diagnoses as well as significant medical details, cognitive status, mood, and patient risk profile.

 

MedRec1
Home health certification and plan of care for a female patient in New Mexico; Page 1 of the record for the patient, who has Stage 4 rectal cancer. Image redacted by DataBreaches.net.

The second screenshot, below, certifies that a Massachusetts patient has a terminal diagnosis of Alzheimer’s Disease and likely has six months or less to live. Such certification is required to make the patient eligible for hospice care.

Medrec3r
Certification that a patient doesn’t have long to live so that they can get hospice care. Image: DataBreaches.net

Many of the reports in the data Kazu provided to this site were for home health care for occupational therapy, physical therapy,  visiting nurse services, or hospice services. All of the files examined by DataBreaches contained personal and protected health information.

HIPAA Concerns

Doctor Alliance is a firm with a presence in both the U.S. and India. According to what Kazu claims, the majority of employees are in India, but if Doctor Alliance is doing business in the U.S. and providing services involving electronic billing transactions, then they should have business associate agreements (BAA) in place with HIPAA-covered entities, and they need to comply with HIPAA and HITECH notification requirements.

DataBreaches does not know exactly how many HIPAA-covered entities Doctor Alliance has had over the past six years or so (considering the dates of some of the medical records), but they may have thousands of notifications to make to former or current clients, and if their BAA calls for it, they may have hundreds of thousands — or more — individual notifications to be sent to affected patients.

But apart from any regulatory notification requirements that they may be subject to and other incident response costs that may or may not be covered by any insurance, there is the issue of whether their network is secure enough at this point for clients to trust.

From what Kazu shared with DataBreaches, the CEO of Doctor Alliance appears to have been informed by Availity that the payment platform would “reenable the blocked users and connections associated with Company after you complete a full breach assessment of Company’s affected systems (“Breach Assessment”).” Availity’s communication includes a very specific and detailed list of questions about the entity’s security, incident response, and required attestation that the network is now clean. In light of the second attack after Doctor Alliance claimed the vulnerability was corrected the same day as the first attack, it appears that Doctor Alliance did not have a full understanding of their security issues. Could Kazu successfully compromise them again? One hopes not, but it would be understandable for Doctor Alliance’s clients to be seriously concerned at this point.

DataBreaches emailed Doctor Alliance earlier today to ask for an update and response to the second breach, but has received no reply. DataBreaches also emailed Availity to ask if their alleged communication to the CEO  represents a routine incident response for them, and if they are aware of the second claimed attack. No reply was immediately available.

As this post was about to be published, Kazu contacted this site to say he was about to leak all the data, so there may be another update soon.

Category: Commentaries and AnalysesHackHealth DataHIPAAOf NoteU.S.

Post navigation

← Surveillance tech provider Protei was hacked, its data stolen, and its website defaced

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • From bad to worse: Doctor Alliance hacked again by same threat actor
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.