SimonMed says 1.2 million patients impacted in January data breach
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。好的,首先我得通读整篇文章,抓住主要内容。 文章讲的是SimonMed Imaging公司发生了数据泄露事件,影响了超过120万人。他们是一家美国的医疗成像服务提供商,运营着大约170个医疗中心。黑客在1月21日至2月5日之间入侵了他们的系统,进行了三周的未经授权访问。公司是在1月27日通过供应商得知这一事件的,并立即采取措施应对,比如重置密码、增加多因素认证等。 泄露的数据可能包括患者姓名、支付信息、医疗报告等敏感内容。虽然公司没有明确说明具体泄露了什么数据,但考虑到他们存储的信息类型,可能会有很多敏感信息。Medusa勒索软件声称窃取了212GB的数据,并公开了部分信息作为证据。最终SimonMed可能支付了赎金,因为现在不在Medusa的数据泄露网站上了。 总结一下,重点包括:公司名称、数据泄露人数、黑客入侵时间、应对措施、泄露数据类型以及与Medusa勒索软件的关系。这些是关键点。 现在需要把这些信息浓缩到100字以内。确保涵盖主要事件:数据泄露、受影响人数、黑客入侵时间、应对措施和结果。 可能会这样写:“美国医疗成像公司SimonMed Imaging发生数据泄露,超120万人受影响。黑客于1月21日至2月5日入侵其系统,获取敏感信息。公司迅速采取措施应对,并确认未发现数据滥用迹象。Medusa勒索软件声称窃取大量数据并索要赎金。” 这样应该符合要求。 </think> 美国医疗成像公司SimonMed Imaging发生数据泄露,超120万人受影响。黑客于1月21日至2月5日入侵其系统,获取敏感信息。公司迅速采取措施应对,并确认未发现数据滥用迹象。Medusa勒索软件声称窃取大量数据并索要赎金。 2025-10-13 20:15:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:125 收藏

SimonMed says 1.2 million patients impacted in January data breach

U.S. medical imaging provider SimonMed Imaging is notifying more than 1.2 million individuals of a data breach that exposed their sensitive information.

SimonMed Imaging is an outpatient medical imaging and radiology services provider, including MRI and CT scans, X-ray, ultrasound, mammography, PET, nuclear medicine, bone density, and interventional radiology procedures.

The radiology company operates about 170 medical centers 11 U.S. states, and has an annual revenue of more than $500 million.

Three weeks of unauthorized access

According to the notice shared with the authorities, hackers compromised SimonMed's systems and had access to the company network at the beginning of the year between January 21 and February 5.

SimonMed learned about the breach on January 27, from one of its vendors, who alerted "that they were experiencing a security incident." After starting an investigation, the medical company confirmed the next day suspicious activity on its network.

“Upon discovering we were the victim of a criminal attack, we immediately began an investigation and took steps to contain the situation,", the company states.

The action taken included resetting passwords, multifactor authentication, adding endpoint detection and response (EDR) monitoring, removing third-party vendors' direct access to systems within SimonMed’s environment and its associated tools, and restricted inbound and outbound traffic to trusted connections

The company also notified law enforcement and the services of data security and privacy professionals.

SimonMed did not publicly share exactly what information was stolen by the attackers besides their full names, but considering the types of data medical imaging firms store on their systems, it may include highly sensitive information.

Still, the company underlined that it has no evidence that the accessed information has been misused to conduct fraud or identity theft as of October 10, the day the notice was circulated.

Letter recipients are offered a free-of-charge subscription to identity theft services through Experian.

Medusa claimed the attack

Medusa ransomware announced SimonMed Imaging on its extortion portal on February 7 claiming that it had stolen 212 GB of data.

The hackers also leaked some data, as proof of the attack, consisting of ID scans, spreadsheets with patient details, payment details, and account balances, medical reports, and raw scans.

At the time, the threat actors demanded a ransom payment of $1million and $10,000 for one-day extension before publishing all the stolen files.

Medusa's claim of SimonMed Imaging breach
Medusa's claim of SimonMed Imaging breach
Source: KELA

Currently, SimonMed Imaging is no longer listed on Medusa ransomware's data leak site. This typically suggests that the company negotiated a ransom and paid the hackers.

The Medusa ransomware-as-a-service (RaaS) operation launched in 2023 and gained its infamy with attacks such as the one on the Minneapolis Public Schools (MPS). The gang also targeted Toyota Financial Services.

A joint advisory by the FBI, CISA, and MS-ISAC from March 2025 warned about Medusa ransomware activity, noting that the threat group had impacted over 300 critical infrastructure organizations in the United States.

Picus BAS Summit

The Security Validation Event of the Year: The Picus BAS Summit

Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.

Don't miss the event that will shape the future of your security strategy


文章来源: https://www.bleepingcomputer.com/news/security/simonmed-says-12-million-patients-impacted-in-january-data-breach/
如有侵权请联系:admin#unsafe.sh