50,640
Rocky Mountain Associated Physicians (RMAP), a surgical and medical weight loss practice in Salt Lake City, Utah, has been hit by a devastating cyberattack affecting 50,640 patients. The incident involved a data breach and extortion attempt by a threat group named PEAR (Pure Extortion and Ransom). After RMAP presumably refused to pay the ransom, the PEAR group publicly leaked the entire stolen dataset on its dark web data leak site. The compromised information is exceptionally sensitive, containing a toxic combination of protected health information (PHI), personally identifiable information (PII), and financial data. For a subset of victims, the breach exposed credit/debit card numbers along with their PINs, a rare and highly damaging event. This incident represents a worst-case scenario for a healthcare data breach, with sensitive patient data now freely available to malicious actors.
The attack followed the double-extortion model common among modern ransomware groups, but with a focus on pure extortion rather than encryption.
The compromised data is extensive and includes:
While the initial access vector is unknown, common TTPs for healthcare breaches include:
T1190 - Exploit Public-Facing Application - Often via vulnerabilities in VPNs or other remote access solutions.T1566 - Phishing - Targeting employees with emails to steal credentials.T1213 - Data from Information Repositories - The core of the attack was accessing and stealing from the patient database.T1041 - Exfiltration Over C2 Channel - The attackers had to transfer a large database out of RMAP's network.T1490 - Inhibit System Recovery - While not explicitly stated, ransomware groups often delete backups to increase pressure on the victim.This is a catastrophic breach with severe consequences.
Hunting for this activity involves looking for signs of database compromise and exfiltration.
| Type | Value | Description |
|---|---|---|
| log_source | Database Audit Logs | Monitor for queries accessing large tables in their entirety, especially from non-standard application accounts or at unusual times. |
| network_traffic_pattern | Sustained Egress Traffic | Look for large, sustained outbound data flows from the database server to an external IP address. |
| file_path | C:\Windows\Temp\ |
Attackers often stage stolen data in temporary directories as compressed archives (.zip, .rar, .7z) before exfiltration. Monitor for large file creation in these locations. |
D3-FA: File Analysis.D3-NTA: Network Traffic Analysis.CRITICAL WARNING: Storing credit/debit card PINs is a gross violation of PCI-DSS compliance and general security best practices. No system should ever store PINs in a recoverable format.
M1030 - Network Segmentation.Isolate critical patient databases in a highly restricted network segment to prevent access from compromised parts of the network.
Encrypt Protected Health Information (PHI) and other sensitive data at rest to protect it in case of a breach.
Implement robust logging and monitoring of access to sensitive databases to detect and alert on anomalous activity.
Keep all systems, especially internet-facing ones, patched and up-to-date to prevent initial compromise.
The RMAP breach underscores the absolute necessity of Network Isolation for servers containing highly sensitive data like a patient database. This server should have been placed in a 'crown jewels' network segment, completely isolated from the general corporate network and the internet. Access to this segment should be controlled by a firewall with a default-deny policy. Only a specific, allow-listed application server should be permitted to communicate with the database server, and only on the required database port (e.g., TCP/1433 for SQL Server). No other traffic—RDP, SMB, HTTPS—should be allowed into or out of this segment. This strict isolation means that even if an attacker compromises a workstation on the front desk, they cannot directly access or even scan for the patient database, containing the breach and preventing data exfiltration.
While network controls are crucial, a defense-in-depth strategy requires data-centric protection. For the RMAP case, robust encryption of the data at rest is essential. This goes beyond simple disk encryption. The database itself should have been configured with Transparent Data Encryption (TDE) to encrypt the database files on disk. More importantly, specific columns containing the most sensitive data—Social Security numbers and financial information—should have been encrypted at the application level or using column-level database encryption. This means that even if an attacker managed to exfiltrate the database files, the most sensitive data would be unreadable without access to the separate encryption keys. The fact that PINs were stored in a recoverable format is a catastrophic failure; this data should never be stored at all, but if any sensitive data must be stored, it must be encrypted with strong, well-managed keys.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats