DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MNGI Digestive Health settles class action lawsuit stemming from BlackCat attack

Posted on June 24, 2025 by Dissent

MNGI Digestive Health, a multi-location gastroenterology practice in Minnesota, received preliminary court approval on May 7 to settle a class action lawsuit stemming from an August 2023 cyberattack.

The incident was first reported on DataBreaches on September 25, 2023, but had been discovered by MNGI on August 25, 2023, after the  BlackCat (AlphV) ransomware gang attacked MNGI on August 20 and exfiltrated what they claimed was more than 2 TB of files. Patient information included full names, dates of birth, passport numbers, drivers’ license or state identification numbers, medical information, health insurance information, payment card information, account numbers, and Social Security numbers.

The breach was particularly nasty, with BlackCat posting diatribes on its dark web leak site. As DataBreaches reported at the time, when MNGI did not pay, AlphV announced “TIME IS UP” and leaked more than 800 GB, and threatened them with more data leakage, spam, and harassment.

In October 2023, MNGI reported to HHS that the incident affected 767,670 patients. Individual notification letters were not sent out until July 2024, however.

Announcement of the settlement appeared on classaction.org:

The $2,838,749.62 MNGI Digestive Health settlement received preliminary court approval on May 7, 2025 and covers all individuals who received a notice regarding the data breach MNGI experienced on or around August 20, 2023.

As with all these settlements, there was no admission of any wrongdoing or liability by MNGI.

Those eligibile to file a claim can find eligibility information and filing instructions on the mngisettlement.com, the official settlement webssite.

As is this site’s practice in reporting on any settlement, Databreaches looked at the actual settlement agreement to see if there was any committment to improving security for patient data. Although it was not detailed, we spotted this provision:

Business Practices Changes & Confirmatory Discovery: Defendant has provided reasonable access to confidential confirmatory discovery regarding the number of Class Members and state of residence, the facts and circumstances of the Data Incident and Defendant’s response thereto, and the data security measures that have been made by Defendant since the Data Incident. The costs of the security measures to be implemented over the next three years are valued at two million and seven hundred thousand dollars ($2,700,000.00).

It is not clear whether that $2.7 million figure is significantly more than what MNGI had been investing prior to the prior breach or represents a significant increase in investment, but it seems to indicate that MNGI did commit to security enhancements.


Related:

  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • The Alliance That Wasn’t: A Critical Analysis of ReliaQuest’s Q3 2025 Ransomware Report
  • Heritage Provider Network $49.99M Class Action Settlement
  • Qilin Ransomware and the Ghost Bulletproof Hosting Conglomerate
  • Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches
Category: Breach IncidentsMalware

Post navigation

← Four REvil ransomware members released after time served on carding charges
Industry Letter – June 23, 2025: Impact to Financial Sector of Ongoing Global Conflicts →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.