SimonMed Imaging

SimonMed Imaging

SimonMed Imaging, a U.S.-based medical imaging provider with 170 centers across 11 states and $500M+ annual revenue, suffered a **Medusa ransomware attack** between **January 21–February 5, 2025**. Hackers gained unauthorized network access for three weeks, exfiltrating **212 GB of sensitive data**, including **patient full names, ID scans, medical reports (MRI/CT/PET scans, X-rays, mammograms), payment details, account balances, and raw imaging files**. The **Medusa ransomware group** demanded **$1M ransom** (plus $10K/day for delays) and leaked sample data as proof, including spreadsheets with patient details and financial records. While SimonMed claimed no evidence of fraud/identity theft (as of October 10), the breach exposed **1.2M+ individuals**, risking long-term identity theft, financial fraud, and reputational damage. The company implemented containment measures (MFA, EDR, vendor access restrictions) and offered free **Experian identity theft protection** to victims. The attack was likely resolved via ransom payment, as SimonMed was later **removed from Medusa’s leak site**. The incident aligns with Medusa’s history of targeting **critical infrastructure**, per FBI/CISA warnings.

Source: https://www.bleepingcomputer.com/news/security/simonmed-says-12-million-patients-impacted-in-january-data-breach/

TPRM report: https://www.rankiteo.com/company/simonmed-imaging

"id": "sim1402114101425",
"linkid": "simonmed-imaging",
"type": "Ransomware",
"date": "1/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': '1.2 million individuals',
                        'industry': 'Healthcare (Medical Imaging & Radiology)',
                        'location': 'United States (11 states)',
                        'name': 'SimonMed Imaging',
                        'size': '170 medical centers, >$500M annual revenue',
                        'type': 'Private Company'}],
 'attack_vector': 'Third-party vendor compromise leading to unauthorized '
                  'network access',
 'customer_advisories': 'Free identity theft protection (Experian) offered',
 'data_breach': {'data_exfiltration': 'Yes (212 GB of data stolen, samples '
                                      'leaked)',
                 'file_types_exposed': ['ID scans',
                                        'Spreadsheets',
                                        'Medical reports',
                                        'Raw scan files'],
                 'number_of_records_exposed': '1.2 million',
                 'personally_identifiable_information': 'Yes (full names, ID '
                                                        'scans, patient '
                                                        'details)',
                 'sensitivity_of_data': 'High (medical, financial, and '
                                        'personally identifiable information)',
                 'type_of_data_compromised': ['Personally Identifiable '
                                              'Information (PII)',
                                              'Protected Health Information '
                                              '(PHI)',
                                              'Financial data (payment '
                                              'details, account balances)',
                                              'Medical records (reports, raw '
                                              'scans)']},
 'date_detected': '2025-01-27',
 'date_publicly_disclosed': '2025-10-10',
 'description': 'U.S. medical imaging provider SimonMed Imaging experienced a '
                'data breach exposing sensitive information of over 1.2 '
                'million individuals. The breach involved unauthorized access '
                "to the company's network between January 21 and February 5, "
                '2025. The Medusa ransomware group claimed responsibility, '
                'demanding a $1 million ransom and leaking sample data, '
                'including ID scans, patient details, payment information, and '
                'medical reports. SimonMed took containment measures, notified '
                'law enforcement, and offered identity theft protection '
                'services to affected individuals.',
 'impact': {'brand_reputation_impact': 'Potential reputational damage due to '
                                       'exposure of sensitive medical and '
                                       'financial data',
            'data_compromised': ['Full names',
                                 'ID scans',
                                 'Patient details',
                                 'Payment details',
                                 'Account balances',
                                 'Medical reports',
                                 'Raw scans'],
            'identity_theft_risk': 'High (offered identity theft protection '
                                   'services to 1.2M individuals)',
            'operational_impact': 'Disruption due to containment measures '
                                  '(e.g., restricted traffic, vendor access '
                                  'removal)',
            'payment_information_risk': 'Yes (payment details and account '
                                        'balances exposed)'},
 'initial_access_broker': {'data_sold_on_dark_web': 'Likely (Medusa leaked '
                                                    'samples, but full dataset '
                                                    'status unclear)',
                           'entry_point': 'Third-party vendor compromise',
                           'high_value_targets': ['Patient data',
                                                  'Financial records',
                                                  'Medical imaging files']},
 'investigation_status': 'Completed (as of public disclosure on October 10, '
                         '2025)',
 'motivation': 'Financial gain (ransom demand)',
 'post_incident_analysis': {'corrective_actions': ['Implemented MFA',
                                                   'Added EDR monitoring',
                                                   'Restricted vendor access',
                                                   'Traffic filtering to '
                                                   'trusted connections'],
                            'root_causes': 'Third-party vendor security '
                                           'incident leading to unauthorized '
                                           'network access'},
 'ransomware': {'data_exfiltration': 'Yes (212 GB)',
                'ransom_demanded': '$1,000,000 (plus $10,000 for one-day '
                                   'extension)',
                'ransom_paid': "Likely (SimonMed no longer listed on Medusa's "
                               'leak site, suggesting negotiation/payment)',
                'ransomware_strain': 'Medusa'},
 'references': [{'source': 'KELA'},
                {'source': 'FBI, CISA, and MS-ISAC Joint Advisory (March '
                           '2025)'}],
 'regulatory_compliance': {'regulatory_notifications': 'Authorities notified '
                                                       '(breach notice '
                                                       'shared)'},
 'response': {'communication_strategy': ['Public breach notice issued (October '
                                         '10, 2025)',
                                         'Free identity theft protection '
                                         '(Experian) offered to affected '
                                         'individuals'],
              'containment_measures': ['Password resets',
                                       'Multifactor authentication (MFA) '
                                       'implementation',
                                       'Endpoint Detection and Response (EDR) '
                                       'monitoring added',
                                       "Removed third-party vendors' direct "
                                       'system access',
                                       'Restricted inbound/outbound traffic to '
                                       'trusted connections'],
              'enhanced_monitoring': 'EDR monitoring added',
              'incident_response_plan_activated': 'Yes',
              'law_enforcement_notified': 'Yes',
              'third_party_assistance': 'Data security and privacy '
                                        'professionals engaged'},
 'stakeholder_advisories': 'Breach notice issued to affected individuals',
 'threat_actor': 'Medusa Ransomware Group',
 'title': 'SimonMed Imaging Data Breach',
 'type': ['Data Breach', 'Ransomware Attack']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.