Utah Surgical Practice Data Leaked by 'PEAR' Ransomware; 50,000 Patients' SSNs and Financial Info Exposed

Rocky Mountain Associated Physicians Suffers Data Breach; PEAR Ransomware Group Leaks Data of 50,640 Patients

CRITICAL
April 14, 2026
8m read
RansomwareData BreachThreat Actor

Impact Scope

People Affected

50,640

Industries Affected

Healthcare

Geographic Impact

United States (local)

Related Entities

Threat Actors

PEAR (Pure Extortion and Ransom)

Products & Tech

Other

Rocky Mountain Associated Physicians (RMAP)

Full Report

Executive Summary

Rocky Mountain Associated Physicians (RMAP), a surgical and medical weight loss practice in Salt Lake City, Utah, has been hit by a devastating cyberattack affecting 50,640 patients. The incident involved a data breach and extortion attempt by a threat group named PEAR (Pure Extortion and Ransom). After RMAP presumably refused to pay the ransom, the PEAR group publicly leaked the entire stolen dataset on its dark web data leak site. The compromised information is exceptionally sensitive, containing a toxic combination of protected health information (PHI), personally identifiable information (PII), and financial data. For a subset of victims, the breach exposed credit/debit card numbers along with their PINs, a rare and highly damaging event. This incident represents a worst-case scenario for a healthcare data breach, with sensitive patient data now freely available to malicious actors.

Threat Overview

The attack followed the double-extortion model common among modern ransomware groups, but with a focus on pure extortion rather than encryption.

  1. Intrusion and Data Theft: The PEAR group gained unauthorized access to RMAP's network and, over time, located and exfiltrated the primary patient database.
  2. Extortion: The group contacted RMAP, demanding a ransom payment in exchange for not leaking the stolen data.
  3. Data Leak: When the ransom was not paid, PEAR published RMAP's name on its data leak site and then publicly released the stolen data for anyone to download.

The compromised data is extensive and includes:

  • Patient names, dates of birth, contact information
  • Social Security numbers
  • Medical record numbers
  • Detailed diagnosis and treatment information (PHI)
  • Debit or credit card numbers with associated PINs (for a subset of patients)

Technical Analysis

While the initial access vector is unknown, common TTPs for healthcare breaches include:

Impact Assessment

This is a catastrophic breach with severe consequences.

  • Extreme Patient Risk: The 50,640 patients are now at an immediate and extremely high risk of financial fraud, medical identity theft, and targeted social engineering scams. The combination of SSN, PHI, and financial data is a goldmine for criminals.
  • Regulatory Penalties: RMAP faces substantial fines under HIPAA. The public leaking of data and the exposure of financial info with PINs will likely be seen as aggravating factors by regulators.
  • Class-Action Lawsuits: The practice will almost certainly face costly class-action lawsuits from the affected patients.
  • Reputational Obliteration: For a medical practice, patient trust is everything. A breach of this magnitude, resulting in the public release of the most sensitive data imaginable, could be an existential event for the organization.
  • PCI-DSS Violations: The storage and subsequent breach of card numbers with PINs is a severe violation of the Payment Card Industry Data Security Standard (PCI-DSS) and will result in heavy fines from payment card brands.

Cyber Observables for Detection

Hunting for this activity involves looking for signs of database compromise and exfiltration.

Type Value Description
log_source Database Audit Logs Monitor for queries accessing large tables in their entirety, especially from non-standard application accounts or at unusual times.
network_traffic_pattern Sustained Egress Traffic Look for large, sustained outbound data flows from the database server to an external IP address.
file_path C:\Windows\Temp\ Attackers often stage stolen data in temporary directories as compressed archives (.zip, .rar, .7z) before exfiltration. Monitor for large file creation in these locations.

Detection & Response

  • D3FEND: File Analysis: Implement file integrity monitoring and analysis on critical servers. Configure it to alert on the creation of large archive files in unusual locations, as this is a common data staging technique. This relates to D3-FA: File Analysis.
  • D3FEND: Network Traffic Analysis: Use DLP and network analysis tools to detect the exfiltration of structured data (like SSNs and credit card numbers) and to alert on anomalous traffic volumes from sensitive internal servers to the internet. This is a core use case for D3-NTA: Network Traffic Analysis.
  • Assume Breach Mentality: Regularly conduct threat hunts within the network, assuming an attacker is already present. Hunt for signs of lateral movement, credential dumping, and data staging.

Mitigation

CRITICAL WARNING: Storing credit/debit card PINs is a gross violation of PCI-DSS compliance and general security best practices. No system should ever store PINs in a recoverable format.

  • PCI-DSS Compliance: Do not store sensitive authentication data post-authorization. This includes PINs, CVV codes, and full magnetic stripe data. This is a fundamental and non-negotiable security requirement.
  • Data Encryption: All sensitive data (PHI, PII, financial) must be encrypted both at rest (in the database) and in transit (over the network). This is a requirement under HIPAA.
  • Network Segmentation: Isolate the patient database server in a highly restricted network segment. Only specific, authorized application servers should be ableto communicate with it. This is a key part of M1030 - Network Segmentation.
  • Backup and Recovery: Maintain immutable, offline backups of critical data. While this wouldn't have prevented the data leak, it is essential for recovery from the encryption phase of a ransomware attack.

Timeline of Events

1
February 2, 2026
RMAP's forensic investigation into the breach concludes.
2
April 14, 2026
This article was published

MITRE ATT&CK Mitigations

Isolate critical patient databases in a highly restricted network segment to prevent access from compromised parts of the network.

Encrypt Protected Health Information (PHI) and other sensitive data at rest to protect it in case of a breach.

Audit

M1047enterprise

Implement robust logging and monitoring of access to sensitive databases to detect and alert on anomalous activity.

Keep all systems, especially internet-facing ones, patched and up-to-date to prevent initial compromise.

D3FEND Defensive Countermeasures

The RMAP breach underscores the absolute necessity of Network Isolation for servers containing highly sensitive data like a patient database. This server should have been placed in a 'crown jewels' network segment, completely isolated from the general corporate network and the internet. Access to this segment should be controlled by a firewall with a default-deny policy. Only a specific, allow-listed application server should be permitted to communicate with the database server, and only on the required database port (e.g., TCP/1433 for SQL Server). No other traffic—RDP, SMB, HTTPS—should be allowed into or out of this segment. This strict isolation means that even if an attacker compromises a workstation on the front desk, they cannot directly access or even scan for the patient database, containing the breach and preventing data exfiltration.

While network controls are crucial, a defense-in-depth strategy requires data-centric protection. For the RMAP case, robust encryption of the data at rest is essential. This goes beyond simple disk encryption. The database itself should have been configured with Transparent Data Encryption (TDE) to encrypt the database files on disk. More importantly, specific columns containing the most sensitive data—Social Security numbers and financial information—should have been encrypted at the application level or using column-level database encryption. This means that even if an attacker managed to exfiltrate the database files, the most sensitive data would be unreadable without access to the separate encryption keys. The fact that PINs were stored in a recoverable format is a catastrophic failure; this data should never be stored at all, but if any sensitive data must be stored, it must be encrypted with strong, well-managed keys.

Sources & References

PEAR Ransomware Group Leaks Utah Clinic PHI After Failed Extortion Attempt
HealthITSecurity (healthitsecurity.com) April 14, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareData BreachPEARHealthcareHIPAAPIIPHIExtortion

📢 Share This Article

Help others stay informed about cybersecurity threats