Southern Illinois Dermatology Breach Exposes Data of Over 150,000 Patients

'Insomnia' Threat Group Leaks Data of 150,000+ Patients After Southern Illinois Dermatology Breach

HIGH
April 8, 2026
5m read
Data BreachThreat ActorRansomware

Impact Scope

People Affected

150,000+

Affected Companies

Southern Illinois Dermatology

Industries Affected

Healthcare

Related Entities

Threat Actors

Insomnia

Products & Tech

HIPAA

Other

Southern Illinois Dermatology

Full Report

Executive Summary

Southern Illinois Dermatology, a healthcare provider, has confirmed a significant data breach stemming from a network intrusion discovered on November 28, 2025. An investigation confirmed that an unauthorized third party accessed and exfiltrated files containing a vast amount of sensitive patient data. The compromised information includes full names, Social Security numbers, dates of birth, and medical record numbers. While the provider began sending notification letters on April 2, 2026, a threat group known as Insomnia has publicly claimed responsibility. The group alleges it stole data belonging to over 150,000 patients and has subsequently leaked the entire dataset on its dark web leak site, posing a severe and immediate risk of fraud and identity theft to the affected individuals.


Threat Overview

This incident is a classic example of a double-extortion attack targeting the healthcare sector. The threat group, Insomnia, first gained unauthorized access to the network of Southern Illinois Dermatology. After moving laterally and identifying valuable data, they exfiltrated large volumes of patient records. The group likely attempted to extort the healthcare provider for a ransom payment. When the provider did not pay (or negotiations failed), the attackers executed the second part of the extortion by leaking the stolen data publicly. This tactic is designed to maximize pressure on victims and inflict reputational damage, while also allowing the attackers to monetize the data through other means. The five-month gap between the discovery of the incident (November 2025) and the notification to patients (April 2026) is also a significant point of concern.


Technical Analysis

While the specific intrusion vector was not disclosed, attacks of this nature typically involve one of the following TTPs:

  • Initial Access: Exploitation of a vulnerability in an external-facing device (e.g., VPN, firewall) or a successful phishing attack against an employee. T1566 - Phishing.
  • Credential Access: Use of tools like Mimikatz to dump credentials from memory to escalate privileges. T1003 - OS Credential Dumping.
  • Discovery: Once on the network, the attackers would have used native Windows tools (net user, net group) and scanning tools to map the internal network and locate file servers or databases containing patient data. T1087 - Account Discovery.
  • Collection: Data is typically aggregated from multiple sources and compressed into large archive files (.zip, .rar, .7z) in a staging area before exfiltration. T1560.001 - Archive via Utility.
  • Exfiltration: T1048 - Exfiltration Over Alternative Protocol: The large archive files are then uploaded to attacker-controlled infrastructure, often using legitimate cloud storage services to blend in with normal traffic.

Impact Assessment

The impact on the over 150,000 patients is severe and long-lasting:

  • Identity Theft and Fraud: With full names, dates of birth, and Social Security numbers, criminals can open new lines of credit, file fraudulent tax returns, and commit other forms of identity theft.
  • Medical Fraud: Medical record numbers can be used to file fraudulent insurance claims or obtain prescription drugs.
  • Targeted Phishing: The leaked data enables highly convincing and personalized phishing attacks against the victims, using their personal and medical information to build trust.
  • Regulatory and Legal Consequences: Southern Illinois Dermatology faces significant regulatory scrutiny from the U.S. Department of Health and Human Services for a potential HIPAA violation. The breach will also likely result in costly class-action lawsuits from affected patients.
  • Reputational Damage: The public disclosure and data leak severely damage the provider's reputation and patient trust.

Cyber Observables for Detection

Type Value Description Context Confidence
command_line_pattern rar.exe a -hp[password] data.rar @files.txt Attackers often use command-line archiving tools to stage data for exfiltration. EDR or process creation logs (Event ID 4688) on file servers. medium
network_traffic_pattern Large upload to Mega.nz / Dropbox / etc. Exfiltration is often performed by uploading large archives to cloud storage services. Monitor for unusually large uploads from servers to consumer cloud storage domains. high
log_source File Share Audit Logs A single user account accessing an abnormally large number of files on a file server. Enable and monitor file access auditing on Windows servers. high
threat_actor Insomnia The name of the group claiming responsibility. Threat intelligence platforms and dark web monitoring services. high

Detection & Response

Detection:

  1. File Integrity Monitoring (FIM): Deploy FIM on critical file servers to detect the creation of large archive files, a key indicator of data staging.
  2. Data Loss Prevention (DLP): Network and endpoint DLP solutions can be configured to detect and block the unauthorized transfer of files containing large quantities of PII or PHI.
  3. User and Entity Behavior Analytics (UEBA): UEBA platforms can baseline normal user and service account activity and alert on deviations, such as an account suddenly accessing thousands of patient records. D3-RAPA - Resource Access Pattern Analysis.

Response:

  • Upon detecting suspicious activity, the immediate priority is to contain the threat by isolating the affected servers and blocking outbound C2/exfiltration traffic.
  • Preserve forensic evidence and engage an incident response firm to determine the scope of the breach.
  • If data has been exfiltrated, legal counsel must be engaged immediately to manage breach notification obligations under HIPAA and state laws.

Mitigation

  • Network Segmentation: M1030 - Network Segmentation: Segment the network to prevent attackers from easily moving from a compromised workstation to a critical file server containing patient data.
  • Least Privilege Access: Enforce the principle of least privilege. User accounts should only have access to the data they absolutely need to perform their jobs. Service accounts should have their permissions tightly restricted.
  • Data Encryption: M1041 - Encrypt Sensitive Information: Encrypting patient data at rest can make it unusable to attackers even if they succeed in exfiltrating it, provided the encryption keys are not also compromised.
  • Egress Traffic Filtering: M1037 - Filter Network Traffic: Restrict outbound traffic from servers, blocking connections to file-sharing and cloud storage sites that are not explicitly required for business operations.

Timeline of Events

1
November 28, 2025
Southern Illinois Dermatology discovers the data security incident.
2
April 2, 2026
The healthcare provider begins mailing notification letters to affected individuals.
3
April 8, 2026
The 'Insomnia' threat group's claim of responsibility and subsequent data leak are publicly reported.
4
April 8, 2026
This article was published

MITRE ATT&CK Mitigations

Isolate servers containing PHI from the general corporate network to prevent lateral movement.

Mapped D3FEND Techniques:

Enforce least privilege on file shares to ensure users can only access the data they need.

Mapped D3FEND Techniques:

Implement egress filtering to block outbound connections from servers to unauthorized cloud storage providers.

Mapped D3FEND Techniques:

Use UEBA to detect anomalous data access patterns that could indicate data staging.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect an attack like the one on Southern Illinois Dermatology, healthcare organizations must monitor how their data is being accessed. A UEBA or similar system should be used to establish a baseline of normal access patterns for file servers and databases containing PHI. The system should alert on deviations, such as a single user account accessing thousands of patient records in an hour when they normally only access a few dozen, or a service account suddenly reading from a wide range of directories. This behavioral approach can detect the internal reconnaissance and data staging phase of an attack, providing an early warning before the data is exfiltrated. This is far more effective than trying to find a specific malware signature.

Data exfiltration is the key phase that turns an intrusion into a data breach. Healthcare organizations must implement strict egress filtering on their networks, especially for servers containing PHI. These servers should not have unrestricted access to the internet. Create firewall rules that block all outbound traffic by default, and only allow connections to specific, required destinations (e.g., for updates or specific business partner APIs). Critically, block all access from these servers to consumer-grade cloud storage sites (Mega, Dropbox, Google Drive) and anonymous file-sharing services. This directly disrupts the primary exfiltration vector used by groups like Insomnia, forcing them to use more complex and potentially easier-to-detect C2 channels.

Organizations can proactively hunt for intruders by planting decoy objects. This involves creating fake files and folders on file shares that appear to contain sensitive patient data, such as 'Patient_SSN_List.xlsx' or '2025_Billing_Records.zip'. These decoy files, also known as honeyfiles, should have auditing enabled to generate a high-priority alert the moment they are accessed, modified, or copied. Since no legitimate user should ever access these files, any interaction is a very high-fidelity indicator of malicious activity. This provides an early warning that an attacker is performing reconnaissance on the network, allowing the security team to respond before the real patient data is found and exfiltrated.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data LeakDouble ExtortionHealthcareHIPAAPIIPHI

📢 Share This Article

Help others stay informed about cybersecurity threats