Florida Physician Specialists Discloses Data Breach Exposing Sensitive Patient PII and PHI, Faces Legal Investigation

Florida Physician Specialists Breach Exposes Extensive Patient Data, Prompts Legal Probe

HIGH
May 4, 2026
4m read
Data BreachRegulatoryRansomware

Related Entities

Other

Florida Physician SpecialistsEdelson Lechtzin LLPEquifax

Full Report

Executive Summary

Florida Physician Specialists, a multi-specialty medical practice in Jacksonville, Florida, has disclosed a significant data breach that exposed a comprehensive range of patient Personal Identifiable Information (PII) and Protected Health Information (PHI). The network intrusion occurred in late November 2025, but a full investigation into the scope of exposed data was not completed until April 2026, with patient notifications following. The compromised data includes highly sensitive information like Social Security numbers, financial account details, and medical records. The lengthy delay in notification has triggered an investigation by a national class-action law firm, Edelson Lechtzin LLP, for potential data privacy violations.


Threat Overview

  • Victim: Florida Physician Specialists
  • Timeline:
    • November 27-29, 2025: Unauthorized third party hacks the network and accesses data.
    • Late November 2025: The intrusion is discovered and an investigation begins.
    • April 6, 2026: A comprehensive review determining the scope of exposed data is completed.
    • April 24, 2026: The practice begins mailing notification letters to affected individuals.
    • May 3, 2026: Edelson Lechtzin LLP announces an investigation into the breach.

Exposed Data Types:

  • Full Names
  • Social Security Numbers
  • Driver's License / State ID Numbers
  • Financial Account and Credit/Debit Card Information
  • Medical Information (PHI)
  • Health Insurance Policy Information

The incident highlights a common and troubling pattern in healthcare breaches: a long delay between the initial compromise, discovery, and eventual notification to the victims, leaving them unknowingly vulnerable for months.


Technical Analysis

The articles do not specify the attack vector, but the description of a network hack suggests common initial access methods in the healthcare sector, such as phishing, exploitation of a vulnerable external service (like VPN or RDP), or use of stolen credentials. The goal was clearly data exfiltration for the purpose of identity theft and fraud.

MITRE ATT&CK Techniques (Inferred)


Impact Assessment

The impact on patients is severe due to the comprehensive nature of the stolen data. This combination of PII, PHI, and financial information is a 'full package' for identity thieves and can be used to commit sophisticated fraud, open lines of credit, file fraudulent tax returns, or make fraudulent medical claims. The delay in notification exacerbated this risk by denying victims the opportunity to take protective measures for over four months. For Florida Physician Specialists, the breach will result in significant legal costs, potential regulatory fines under HIPAA, and a serious loss of patient trust.


IOCs — Directly from Articles

No specific Indicators of Compromise were mentioned in the source articles.


Detection & Response

  1. Reduce Dwell Time: The long period between the breach and full scoping indicates a need for better detection and response capabilities. Tools like EDR/XDR and network detection and response (NDR) are essential for quickly identifying and scoping a breach.
  2. Log Management: Centralized logging and active monitoring of access to sensitive data repositories are critical for detecting unauthorized access in a timely manner. This aligns with D3FEND's D3-LAM - Local Account Monitoring.
  3. Incident Response Plan: The delay suggests a possible deficiency in the incident response plan. IR plans must be comprehensive, well-documented, and regularly tested, with clear triggers for legal and public notification.

Mitigation

Healthcare organizations must implement robust security controls to protect patient data:

  1. Network Segmentation: Isolate critical systems, such as Electronic Health Record (EHR) databases, from the general business network to limit the impact of a breach.
  2. Multi-Factor Authentication (MFA): Enforce MFA on all remote access systems and for all accounts with access to PHI.
  3. Data Encryption: Ensure that all sensitive data is encrypted both at rest and in transit.
  4. Vulnerability Management: Implement a continuous vulnerability management program to identify and patch weaknesses in systems and applications, particularly those that are internet-facing. This is a core part of D3FEND's D3-SU - Software Update.

Timeline of Events

1
November 27, 2025
The network hack and data access period begins.
2
November 29, 2025
The network hack and data access period ends.
3
April 6, 2026
The internal investigation determining the scope of the breach is completed.
4
April 24, 2026
Florida Physician Specialists begins mailing notification letters.
5
May 3, 2026
A law firm announces it is investigating the breach and notification delay.
6
May 4, 2026
This article was published

MITRE ATT&CK Mitigations

Audit

M1047enterprise

Implement robust and continuous monitoring of access to patient data to drastically reduce the time to detect a breach.

Isolate EHR systems and other critical data stores from the general network to contain the blast radius of a potential compromise.

Enforce MFA for all access to sensitive systems, especially remote access, to protect against credential-based attacks.

Timeline of Events

1
November 27, 2025

The network hack and data access period begins.

2
November 29, 2025

The network hack and data access period ends.

3
April 6, 2026

The internal investigation determining the scope of the breach is completed.

4
April 24, 2026

Florida Physician Specialists begins mailing notification letters.

5
May 3, 2026

A law firm announces it is investigating the breach and notification delay.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachHealthcareHIPAAPIIPHIFlorida Physician Specialists

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.