Florida Physician Specialists, a multi-specialty medical practice in Jacksonville, Florida, has disclosed a significant data breach that exposed a comprehensive range of patient Personal Identifiable Information (PII) and Protected Health Information (PHI). The network intrusion occurred in late November 2025, but a full investigation into the scope of exposed data was not completed until April 2026, with patient notifications following. The compromised data includes highly sensitive information like Social Security numbers, financial account details, and medical records. The lengthy delay in notification has triggered an investigation by a national class-action law firm, Edelson Lechtzin LLP, for potential data privacy violations.
Exposed Data Types:
The incident highlights a common and troubling pattern in healthcare breaches: a long delay between the initial compromise, discovery, and eventual notification to the victims, leaving them unknowingly vulnerable for months.
The articles do not specify the attack vector, but the description of a network hack suggests common initial access methods in the healthcare sector, such as phishing, exploitation of a vulnerable external service (like VPN or RDP), or use of stolen credentials. The goal was clearly data exfiltration for the purpose of identity theft and fraud.
T1200 - Phishing: A likely initial access vector targeting healthcare staff.T1213 - Data from Information Repositories: The attacker accessed and exfiltrated data from patient record databases or file servers.T1003 - OS Credential Dumping: After gaining initial access, attackers often dump credentials to move laterally and access sensitive data stores.T1041 - Exfiltration Over C2 Channel: The exfiltration of a wide range of data types suggests a sustained connection to an external server.The impact on patients is severe due to the comprehensive nature of the stolen data. This combination of PII, PHI, and financial information is a 'full package' for identity thieves and can be used to commit sophisticated fraud, open lines of credit, file fraudulent tax returns, or make fraudulent medical claims. The delay in notification exacerbated this risk by denying victims the opportunity to take protective measures for over four months. For Florida Physician Specialists, the breach will result in significant legal costs, potential regulatory fines under HIPAA, and a serious loss of patient trust.
No specific Indicators of Compromise were mentioned in the source articles.
D3-LAM - Local Account Monitoring.Healthcare organizations must implement robust security controls to protect patient data:
D3-SU - Software Update.Implement robust and continuous monitoring of access to patient data to drastically reduce the time to detect a breach.
Isolate EHR systems and other critical data stores from the general network to contain the blast radius of a potential compromise.
Enforce MFA for all access to sensitive systems, especially remote access, to protect against credential-based attacks.
The network hack and data access period begins.
The network hack and data access period ends.
The internal investigation determining the scope of the breach is completed.
Florida Physician Specialists begins mailing notification letters.
A law firm announces it is investigating the breach and notification delay.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.