Knowledge Breach Notification
,
Knowledge Safety
,
Fraud Administration & Cybercrime
Kazu Calls for $200K Ransom, Begins Leaking 1.2M Stolen Affected person Information

Kazu, a relative newcomer amongst cybercrime gangs, is threatening to publish 353 gigabytes of information allegedly stolen in latest weeks from Physician Alliance, a Texas-based firm that gives doc and billing administration expertise and providers to doctor practices. The assault seems to be the gang’s first in North America.
See Additionally: OnDemand | Rework API Safety with Unmatched Discovery and Protection
Physician Alliance in an announcement to Data Safety Media Group on Friday stated the agency is working with unbiased safety specialists to research Kazu’s claims of getting exfiltrated 1.2 million Physician Alliance shopper data. Kazu is demanding Physician Alliance pay a $200,000 ransom to cease the gang from publishing the stolen information on the darkish internet.
Leaked Physician Alliance shopper information to this point contains sufferers title, date of start, handle, telephone quantity, e-mail handle, Medicare quantity, medical document quantity, main and secondary diagnoses, remedy plans, drugs and dosages, and supplier data, in accordance to one in all three proposed federal class motion lawsuits filed this week towards the corporate associated to the hack.
Along with these lawsuits – which search monetary damages and allege claims together with negligence – a number of different legislation companies in latest days have additionally issued public statements saying they, too, are investigating the Physician Alliance information breach for potential class motion litigation.
In Physician Alliance’s assertion to ISMG, the corporate stated it’s digging into the info theft claims.
“Physician Alliance lately recognized unauthorized entry involving a single shopper account,” Physician Alliance stated in its assertion to ISMG.
“The difficulty was contained instantly, impacted techniques had been secured and the vulnerability was corrected the identical day. We’re at present working with unbiased safety specialists to finish an intensive evaluation of the incident. At this stage, we’ve got not verified the claims or numbers circulating on-line.”
Physician Alliance didn’t remark particularly on Kazu’s calls for.
Knowledge Theft-Centered
Kazu seems to be a relative newcomer to cybercrime, some specialists advised ISMG.
“Taking a look at its extortion website, the group accelerated information dump exercise within the June to July 2025 timeframe however intel experiences make point out of Kazu related information dumps and discussion board postings again in spring of 2025 within the March-April timeframe,” stated John Dwyer, deputy CTO and head of ARC Labs at safety agency Binary Protection.
Regardless of the group’s latest emergence, Kazu has already leaked information from authorities, army and healthcare organizations, stated risk researcher Jade Brown of safety agency Bitdefender in a report issued Thursday. Nearly all of Kazu’s practically three dozen victims to this point are primarily based in Southeast Asia, Center East and South America, Brown stated.
Thus far, the group’s different victims embrace the Nationwide Civil Service Fee of Colombia and Defensoría del Pueblo de Colombia, in accordance with risk intelligence monitoring web site Ransomware.dwell.
The Physician Alliance hack could point out Kazu only recently prolonged its assaults to North America, Dwyer stated.
“Whereas we have no concrete information on exploits used, primarily based on the info and referenced names on Kazu’s website, there seems to be a robust give attention to internet portals and web-enabled providers,” Dwyer stated.
“It is a sturdy indication that this group made use of an exploit in an internet utility or webhosting platform to realize unauthorized entry to the info straight from an internet utility, relatively than getting access to inner techniques and stealing information from an inner file server,” he stated.
To keep away from turning into one in all Kazu’s subsequent victims, he stated, “now’s nearly as good as a time as ever to establish and handle any points on internet-facing internet functions with identified vulnerabilities. It additionally could be a good time to push all efforts concerning multifactor authentication on web-enabled portals.”
Kazu’s assaults seem like centered on information theft extortion, and never ransomware encryption, Dwyer stated. Encryption malware is a typical indicator researchers use for cybercrime group attribution.
“We don’t have any stable proof that Kazu is a rebrand of one other extortion primarily based group. I couldn’t discover any rebranding data or affiliations of Kazu with any identified group,” he stated.
“At this level, Kazu is being tracked as a model new relatively than an apparent rebrand or splinter off from a identified ransomware group, which will change over time however that’s the information we’ve got now.”









