150,000+
Southern Illinois Dermatology, a healthcare provider, has confirmed a significant data breach stemming from a network intrusion discovered on November 28, 2025. An investigation confirmed that an unauthorized third party accessed and exfiltrated files containing a vast amount of sensitive patient data. The compromised information includes full names, Social Security numbers, dates of birth, and medical record numbers. While the provider began sending notification letters on April 2, 2026, a threat group known as Insomnia has publicly claimed responsibility. The group alleges it stole data belonging to over 150,000 patients and has subsequently leaked the entire dataset on its dark web leak site, posing a severe and immediate risk of fraud and identity theft to the affected individuals.
This incident is a classic example of a double-extortion attack targeting the healthcare sector. The threat group, Insomnia, first gained unauthorized access to the network of Southern Illinois Dermatology. After moving laterally and identifying valuable data, they exfiltrated large volumes of patient records. The group likely attempted to extort the healthcare provider for a ransom payment. When the provider did not pay (or negotiations failed), the attackers executed the second part of the extortion by leaking the stolen data publicly. This tactic is designed to maximize pressure on victims and inflict reputational damage, while also allowing the attackers to monetize the data through other means. The five-month gap between the discovery of the incident (November 2025) and the notification to patients (April 2026) is also a significant point of concern.
While the specific intrusion vector was not disclosed, attacks of this nature typically involve one of the following TTPs:
T1566 - Phishing.T1003 - OS Credential Dumping.net user, net group) and scanning tools to map the internal network and locate file servers or databases containing patient data. T1087 - Account Discovery..zip, .rar, .7z) in a staging area before exfiltration. T1560.001 - Archive via Utility.T1048 - Exfiltration Over Alternative Protocol: The large archive files are then uploaded to attacker-controlled infrastructure, often using legitimate cloud storage services to blend in with normal traffic.The impact on the over 150,000 patients is severe and long-lasting:
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| command_line_pattern | rar.exe a -hp[password] data.rar @files.txt |
Attackers often use command-line archiving tools to stage data for exfiltration. | EDR or process creation logs (Event ID 4688) on file servers. | medium |
| network_traffic_pattern | Large upload to Mega.nz / Dropbox / etc. |
Exfiltration is often performed by uploading large archives to cloud storage services. | Monitor for unusually large uploads from servers to consumer cloud storage domains. | high |
| log_source | File Share Audit Logs |
A single user account accessing an abnormally large number of files on a file server. | Enable and monitor file access auditing on Windows servers. | high |
| threat_actor | Insomnia |
The name of the group claiming responsibility. | Threat intelligence platforms and dark web monitoring services. | high |
Detection:
D3-RAPA - Resource Access Pattern Analysis.Response:
M1030 - Network Segmentation: Segment the network to prevent attackers from easily moving from a compromised workstation to a critical file server containing patient data.M1041 - Encrypt Sensitive Information: Encrypting patient data at rest can make it unusable to attackers even if they succeed in exfiltrating it, provided the encryption keys are not also compromised.M1037 - Filter Network Traffic: Restrict outbound traffic from servers, blocking connections to file-sharing and cloud storage sites that are not explicitly required for business operations.Isolate servers containing PHI from the general corporate network to prevent lateral movement.
Mapped D3FEND Techniques:
Enforce least privilege on file shares to ensure users can only access the data they need.
Mapped D3FEND Techniques:
Implement egress filtering to block outbound connections from servers to unauthorized cloud storage providers.
Mapped D3FEND Techniques:
Use UEBA to detect anomalous data access patterns that could indicate data staging.
Mapped D3FEND Techniques:
To detect an attack like the one on Southern Illinois Dermatology, healthcare organizations must monitor how their data is being accessed. A UEBA or similar system should be used to establish a baseline of normal access patterns for file servers and databases containing PHI. The system should alert on deviations, such as a single user account accessing thousands of patient records in an hour when they normally only access a few dozen, or a service account suddenly reading from a wide range of directories. This behavioral approach can detect the internal reconnaissance and data staging phase of an attack, providing an early warning before the data is exfiltrated. This is far more effective than trying to find a specific malware signature.
Data exfiltration is the key phase that turns an intrusion into a data breach. Healthcare organizations must implement strict egress filtering on their networks, especially for servers containing PHI. These servers should not have unrestricted access to the internet. Create firewall rules that block all outbound traffic by default, and only allow connections to specific, required destinations (e.g., for updates or specific business partner APIs). Critically, block all access from these servers to consumer-grade cloud storage sites (Mega, Dropbox, Google Drive) and anonymous file-sharing services. This directly disrupts the primary exfiltration vector used by groups like Insomnia, forcing them to use more complex and potentially easier-to-detect C2 channels.
Organizations can proactively hunt for intruders by planting decoy objects. This involves creating fake files and folders on file shares that appear to contain sensitive patient data, such as 'Patient_SSN_List.xlsx' or '2025_Billing_Records.zip'. These decoy files, also known as honeyfiles, should have auditing enabled to generate a high-priority alert the moment they are accessed, modified, or copied. Since no legitimate user should ever access these files, any interaction is a very high-fidelity indicator of malicious activity. This provides an early warning that an attacker is performing reconnaissance on the network, allowing the security team to respond before the real patient data is found and exfiltrated.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats