HIGH SEVERITYMedical

Florida Lung Data Breach

Florida Lung, Asthma & Sleep Specialists Breach (2025): Patient SSN & Home Address Exposed

Pulmonary, sleep, and respiratory care practice.

Verified by ObscureIQ Intelligence

7.5Severity
26KRecords
4Fields
2025Year

ObscureIQ Breach Intelligence Scores
10.8
Breach Risk Index
27
Data Value
40
Market Recency
251
days
Since Breach

Risk Interpretation

High risk of identity theft, medical fraud, and privacy harm. Specialty-care affiliation also improves the credibility of treatment and billing scams.

🎯 Impact & Downstream Threats

The institutional impact on Florida Lung, Asthma & Sleep Specialists is meaningful given the practice's size and the breadth of stolen patient data referenced by the threat actor. Federal HIPAA notification obligations, an active Office for Civil Rights review, Florida attorney-general filings, and emerging class-action litigation discussions are all underway. Rhysida's public claim and threatened publication of stolen data, including reported claims of access to Social Security numbers, medical

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat
Full identity theft & synthetic identity fraud

📋 Breach Intelligence

EntityFlorida Lung (Florida Lung, Asthma & Sleep Specialists)
OrganizationHealthcare Provider • USA
Breach Date2025-05-20
DBC Added2025-08-19
Added Date2025-08-19
Records~26K (25,680 records)
Attack VectorUnknown
Threat ActorRhysida
SourceDataBreach.com / ObscureIQ
SensitivityStandard
Breach ID529.0
StatusConfirmed

📝 Executive Summary

Florida Lung, Asthma & Sleep Specialists, a Florida-based pulmonary and sleep-medicine practice operating five offices across the greater Orlando area, suffered a ransomware attack in May 2025 carried out by the Rhysida ransomware-as-a-service group. Rhysida claimed responsibility on May 20, 2025 by listing FLASS on its dark-web leak site and demanded a ransom of approximately six Bitcoin, worth approximately $639,000 at the time. The threat actor threatened to publish stolen patient data including Social Security numbers, medical records, and passport information. FLASS reported the breach to the FBI and to the U.S. Department of Health and Human Services on July 9, 2025.

The breach affected approximately 10,000 individuals per the formal HHS notification, with breach-tracking services indexing approximately 26,000 records that may reflect the broader stolen archive. Compromised fields included names, dates of birth, contact information, Social Security numbers, home addresses, email addresses, phone numbers, and limited medical and billing information. As a pulmonary, asthma, and sleep medicine practice, the underlying records exfiltrated by the attackers also include sleep-study results, pulmonary-function tests, respiratory diagnoses, and treatment histories typical of a specialty respiratory practice.

For affected patients, the practical risk profile combines identity-fraud exposure with respiratory-care-specific risks. The combination of name, address, and Social Security number is a strong base for synthetic identity fraud and fraudulent credit applications. Inclusion in the dataset confirms a pulmonary or sleep-disorder care relationship and may reference specific diagnoses such as sleep apnea, COPD, or asthma management, which can support medical-themed phishing referencing real treatments or insurance claims. Patients with sleep apnea diagnoses are a particular concern because such diagnoses can affect commercial driver's license and FAA medical certification status, raising additional employment and licensing-related risk. Affected individuals should freeze credit at all three U.S. bureaus, monitor health-insurance statements, and treat unsolicited contact referencing FLASS, sleep studies, or respiratory care with caution.

🏢 About Florida Lung

Florida Lung, Asthma & Sleep Specialists (FLASS) is a U.S.-based pulmonary, asthma, and sleep medicine specialty practice operating five offices across the greater Orlando area in central Florida, with locations in Orlando, Winter Garden, Lake Nona, Poinciana, and Kissimmee. The practice provides pulmonary medicine, asthma management, and sleep-disorder diagnosis and treatment to a regional patient population in Orange, Osceola, and Polk counties. As a HIPAA-regulated specialty medical practice, FLASS maintains substantial volumes of protected health information including patient identity, insurance, billing, appointment, diagnostic, and treatment records, alongside sleep-study results, pulmonary-function test data, and respiratory-condition diagnoses.

Healthcare provider | Pulmonary and respiratory care | Specialty clinic network | USA
Healthcare ProviderUSAfloridalungdoctors.com

🗂 Why They Hold Your Data

Pulmonary care providers collect patient identity, contact, insurance, billing, appointment, and treatment records across respiratory and clinical care workflows.

📰 Recent Developments

Florida Lung, Asthma & Sleep Specialists experienced a network intrusion in May 2025 that was first identified through dark-web monitoring on May 20, 2025 when the Rhysida ransomware-as-a-service group claimed responsibility on its dark-web leak site. Rhysida demanded a ransom of approximately six Bitcoin, worth approximately $639,000 at the time, threatening to publish stolen patient data if payment was not made. FLASS reported the breach to the FBI and to the U.S. Department of Health and Human Services on July 9, 2025, and began notifying affected patients. The practice has not extensively detailed whether it paid the ransom. Class-action investigations by U.S. plaintiff law firms began organizing in mid-2025. Rhysida has been an active threat actor in the U.S. healthcare sector throughout 2025, with confirmed victims also including Cookeville Regional Medical Center, Heart South Cardiovascular Group, MedStar Health, MACT Health Board, and Spindletop Center.

🔍 Data Points Exposed

4 verified field types:
Social Security Number
Email
Phone Number
Home Address

Exposure Categories

CredentialsSSN
LocationPHYS ADDR

Canonical Fields

email_address, phone_number, physical_address:home, ssn

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~26K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: florida-lung-2025

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Florida Lung
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom