Georgia healthcare company data breach impacts more than 620,000

A cyberattack last year on a prominent Georgia-based healthcare company leaked the sensitive information of 626,540 people, according to a new filing with the U.S. Department of Health and Human Services.

ApolloMD notified customers of a data breach in September but provided federal regulators with the full number of victims on Tuesday. The company is a medical group that provides multispecialty physician services to more than 100 hospitals. They have more than 125 practices across 18 states and treat about 4 million patients each year. 

The company told victims in September about the breach, and said an investigation revealed hackers were in ApolloMD’s IT environment between May 22 and May 23.

While inside, the hackers accessed information for people treated by ApolloMD’s affiliated physicians and practices — including names, dates of birth, addresses, diagnoses, dates of service, treatments, health insurance data and Social Security numbers. 

The attack was claimed by the Qilin ransomware gang in June 2025. The group has targeted the healthcare industry repeatedly since emerging several years ago, causing outages at hospitals across several states last year and in the U.K. in 2024.

Cisco Talos published a study finding that the gang published the information of about 40 victims per month last year.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Next Post

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

Related Posts

[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate

Most security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress. Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to do more with less. This
Read More