2,023+
Innovative Physical Therapy, a network of outpatient rehabilitation centers, has reported a data breach affecting at least 2,023 of its patients. The incident was a result of a supply chain compromise, where a third-party vendor providing practice management services was breached. The vendor discovered on August 25, 2025, that two of its employees' email accounts were compromised after they responded to phishing emails. The unauthorized access, which occurred in June 2025, exposed a significant amount of patient PII and PHI, including Social Security numbers and medical details. The breach has been reported to the U.S. Department of Health and Human Services.
T1566 - Phishing) targeting employees at the third-party vendor.T1195.002 - Compromise Software Supply Chain), where the vulnerability lay with a trusted partner rather than the primary organization.The attack followed a common pattern for supply chain breaches originating from email compromise:
T1078 - Valid Accounts) between June 25 and June 26, 2025.This incident highlights the critical importance of third-party risk management. An organization's security is only as strong as its weakest link, which often lies within its extended network of vendors and partners.
Detection relies on the vendor's ability to monitor for email account compromise:
| Type | Value | Description |
|---|---|---|
| log_source | Cloud email audit logs |
Monitoring for suspicious logins, impossible travel, and anomalous mailbox activity is essential. |
| user_account_pattern | Massive email access/download |
An account suddenly accessing or downloading hundreds of historical emails or attachments is a red flag for data mining. |
| event_id | New-InboxRule (PowerShell) |
The creation of forwarding rules to external email addresses is a classic TTP for data exfiltration from a compromised mailbox. |
For organizations like Innovative Physical Therapy, detection involves monitoring vendor relationships:
D3-VAM - Vendor Security Assessment.While not a traditional vulnerability, assessing the security posture of third-party vendors is a form of vulnerability management for the supply chain.
Requiring vendors to use MFA would have prevented the phishing attack from succeeding.
Mapped D3FEND Techniques:
Security awareness training at the vendor is a critical preventative control.
To prevent supply chain breaches like the one affecting Innovative Physical Therapy, organizations must implement a rigorous Vendor Security Assessment program. This goes beyond a simple pre-contract questionnaire. It requires mandating key security controls in vendor contracts, such as requiring MFA on all accounts, evidence of regular employee security training, and defined incident notification timelines. Organizations should also conduct their own due diligence, using external attack surface management (EASM) tools to assess a vendor's security posture. For a vendor handling PHI, evidence of a strong security program (like a SOC 2 Type II report or HITRUST certification) should be a non-negotiable requirement. This proactive approach ensures that vendors are not the weakest link in the security chain.
Data Loss Prevention (DLP) technology could have mitigated the impact of this breach. Even though the compromise happened at the vendor, Innovative Physical Therapy could have implemented cloud-based DLP on its own email tenant to monitor data sharing. A properly configured DLP policy would have detected and potentially blocked emails containing large volumes of patient PHI and SSNs from being sent to the vendor's domain in the first place, enforcing data minimization. At the vendor, a host or network DLP solution could have detected and blocked the exfiltration of this sensitive data from their environment, even after the email accounts were compromised. DLP acts as a crucial backstop to prevent sensitive data from leaving a trusted environment, regardless of how it was accessed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats