3.1 million
QualDerm Partners, a management services provider for dermatology practices, has announced a massive data breach impacting more than 3.1 million patients. The incident was discovered on December 24, 2025, after an unauthorized party gained access to the company's network for a two-day period. During this intrusion, the attackers successfully exfiltrated a comprehensive set of both personally identifiable information (PII) and protected health information (PHI). The stolen data includes everything from patient demographics to detailed medical treatment information and health insurance data. The breach represents a severe violation of patient privacy and exposes a massive number of individuals to significant risks, including identity theft, medical fraud, and highly targeted phishing attacks.
Attack Type: Data Breach (PII and PHI) Victim: QualDerm Partners Timeline: Discovered December 24, 2025 (occurred over a two-day period prior) Impact: Over 3.1 million individuals Data Stolen:
This incident is a classic example of a "smash-and-grab" healthcare data breach, where attackers gain access to a network, locate sensitive patient data repositories, and exfiltrate as much as possible in a short timeframe. The combination of PII and PHI is particularly potent for criminals, as it can be used for a wide range of fraudulent activities, from filing fake insurance claims to creating synthetic identities.
The threat actor's TTPs are not specified, but the scenario is common in the healthcare sector. Attackers often gain initial access through:
T1566.001 - Spearphishing Attachment).T1190 - Exploit Public-Facing Application).Once inside, the attackers likely performed reconnaissance to locate the Electronic Health Record (EHR) database or other patient data stores. The ability to exfiltrate data for 3.1 million patients suggests they gained privileged access to a central data repository. The exfiltration itself (T1048 - Exfiltration Over Alternative Protocol) was likely done over an encrypted channel to evade simple network monitoring.
Detecting this type of activity requires vigilant monitoring of both network and data access.
Protecting PHI requires a security posture that assumes a breach will occur.
Encrypting PHI at rest is a fundamental HIPAA requirement and the last line of defense, rendering stolen data unreadable.
Mapped D3FEND Techniques:
Isolating EHR systems and patient databases prevents attackers from easily accessing them after an initial compromise elsewhere in the network.
Mapped D3FEND Techniques:
Strictly enforce the principle of least privilege to ensure no single account has access to the entire patient database.
To detect a breach like the one at QualDerm, organizations must implement User Data Transfer Analysis, typically through a Data Loss Prevention (DLP) solution. This technique involves inspecting outbound network traffic for content matching sensitive data patterns (e.g., formats for medical record numbers, SSNs). For a healthcare provider, a DLP policy should be configured to block and alert on any attempt to transfer large volumes of files containing PHI outside the network perimeter. The system should be tuned to differentiate between legitimate, authorized data sharing (e.g., to a partner clearinghouse) and a massive, anomalous exfiltration to an unknown IP address. This provides a critical, automated control to block data theft in real-time.
The ability of attackers to exfiltrate 3.1 million patient records suggests that the data repository was likely accessible from broader parts of the network. A core defensive strategy is to place the EHR database and other PHI stores into a highly isolated network segment (an 'enclave'). Firewall rules must enforce a 'default-deny' stance, allowing traffic only from specific application servers over required ports. There should be no direct access from user subnets, the internet, or even general server VLANs. This microsegmentation strategy contains the blast radius of an initial compromise. If an employee's workstation is compromised, the attacker cannot pivot directly to the patient database, forcing them through chokepoints that can be more easily monitored.
While a preventative control, encryption at rest is the ultimate safeguard if all other defenses fail. For QualDerm, this means the database files containing the 3.1 million patient records should have been encrypted using technologies like Transparent Data Encryption (TDE). This encrypts the data on the storage media itself. Crucially, the encryption keys must be stored and managed separately from the database server, ideally in a Hardware Security Module (HSM). If the attackers exfiltrated the encrypted database files but did not manage to also steal the encryption keys, the data would be rendered completely useless to them. This control transforms a catastrophic PII/PHI breach into a much less severe system compromise, significantly reducing regulatory fines and patient harm.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats