CRITICAL SEVERITYMedical

Doctor Alliance Data Breach

Doctor Alliance Healthcare Billing Platform Breach (2025): 387K Patient SSN & Contact Records Exposed

Healthcare billing and collections management company.

Verified by ObscureIQ Intelligence

8.0Severity
387KRecords
4Fields
2025Year

ObscureIQ Breach Intelligence Scores
24.0
Breach Risk Index
25
Data Value
60
Market Recency
133
days
Since Breach

Risk Interpretation

Severe risk of identity theft, medical fraud, billing abuse, and provider impersonation. Document and workflow data can also expose treatment relationships and operational vulnerabilities inside clinics.

🎯 Impact & Downstream Threats

The institutional impact on Doctor Alliance is substantial given the platform's role as a back-office layer for major U.S. home-health operators. Federal HIPAA notification obligations as a business associate, an active Office for Civil Rights review, multistate attorney-general filings, and active class-action litigation in the U.S. District Court for the Northern District of Texas are all underway. The credential-abuse pathway raises broader questions about Doctor Alliance's authentication arc

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
SIM swapping, vishing & SMS phishing
Full identity theft & synthetic identity fraud

📋 Breach Intelligence

EntityDoctor Alliance
Organization • USA
Breach Date2025-11-18
DBC Added2025-12-15
Added Date2025-12-15
Records~387K (386,583 records)
Attack VectorMisconfiguration
Threat ActorKazu (alias)
Data SubjectsPatient
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityElevated
Breach ID402.0
StatusConfirmed

📝 Executive Summary

Doctor Alliance, a Dallas-based healthcare technology company providing clinical document management and billing services to home health agencies and physician practices, suffered a credential-abuse data breach between October 31 and November 17, 2025. An unauthorized party obtained Doctor Alliance web-portal login credentials through unknown means and used a script to systematically request patient documents from the portal by enumerating combinations of patient IDs and document numbers. A hacker using the alias 'Kazu' claimed responsibility on a hacking forum on November 7, 2025, asserting theft of 1.24 million files totaling 353 gigabytes and demanding a $200,000 ransom by November 21, 2025. Doctor Alliance was alerted on November 13, 2025, notified the FBI on November 16, 2025, and posted a public notice on its website. Multiple home-health clients including Amedisys, AccentCare, Angels Care Home Health, and Prima Care subsequently issued downstream patient notifications.

The breach affected approximately 387,000 individuals based on records indexed by breach-tracking services, with approximately 33,000 unique Social Security numbers and 7,900 unique email addresses among the records. Compromised fields included patient names, addresses, phone numbers, email addresses, dates of birth, Social Security numbers, medical record numbers, Medicare numbers, diagnoses, treatment information, medications, and provider information. Although the hacker's claim of 1.24 million files initially suggested 1.2 million affected individuals, subsequent analysis indicated the actual patient-individual count is substantially smaller, with many files representing duplicate documents for the same patients across multiple home-health visits.

For affected patients, the practical risk profile combines identity-fraud exposure with home-health and Medicare-specific risks. The combination of name, address, date of birth, and Social Security number is a strong base for synthetic identity fraud and fraudulent credit applications. Inclusion of Medicare numbers raises direct healthcare-fraud risk including fraudulent home-health billing. Inclusion of medication and diagnosis information supports highly targeted medical-themed phishing referencing real prescriptions and treatments. Patients receiving home-health services are categorically more vulnerable to medical-fraud and emotional-manipulation scams because they are often elderly or recovering from illness. Affected patients should freeze credit at all three U.S. bureaus, monitor Medicare summary notices and home-health billing statements closely, alert family caregivers to be cautious of unsolicited contact, and treat unsolicited communications referencing Doctor Alliance, home-health agencies, or Medicare with caution.

🏢 About Doctor Alliance

Doctor Alliance (operating as My 485, Inc.) is a Dallas, Texas-based healthcare technology company that provides clinical document management, billing, and physician-workflow services to home health agencies and physician practices across the United States. The company's platform integrates with electronic health record systems and processes high volumes of clinical and administrative data, including patient documents, plan-of-care signatures, and Medicare 485 forms. Doctor Alliance's clients include major U.S. home health operators such as Amedisys, AccentCare, Interim HealthCare, Angels Care Home Health, and Prima Care. As a HIPAA-regulated healthcare business associate, Doctor Alliance maintains substantial volumes of protected health information aggregated across its many home-health and physician clients, alongside provider records, scheduling information, and billing data.

Healthcare Technology Company | Clinical documentation, billing, and physician workflow services | Healthcare document and billing platform | USA
USAdoctorallianceinc.com

🗂 Why They Hold Your Data

Healthcare workflow and billing platforms collect patient identity, provider records, billing data, clinical documents, scheduling information, and physician workflow records across practice-management operations.

📰 Recent Developments

Doctor Alliance was alerted to a cybersecurity incident on November 13, 2025 after a hacker using the alias 'Kazu' posted on an underground hacking forum on November 7, 2025 claiming to have stolen 1.24 million files totaling 353 GB from Doctor Alliance's systems. The hacker demanded a $200,000 ransom by November 21, 2025, threatening to sell the data if payment was not made. Doctor Alliance's investigation determined that an unknown unauthorized party had obtained Doctor Alliance web-portal credentials and accessed certain files intermittently between October 31, 2025 and November 17, 2025. The unauthorized party also used a script to send multiple requests to the Doctor Alliance web portal using varying combinations of patient IDs and document numbers, indicating credential abuse and enumeration rather than ransomware encryption. Doctor Alliance notified the FBI on November 16, 2025 and posted a public notice on its website. Affected home-health clients including Amedisys (notified January 5, 2026), Angels Care (notified January 13, 2026), and AccentCare (notified February 2026) issued downstream patient notifications. Multiple class-action lawsuits were filed in the U.S. District Court for the Northern District of Texas, Dallas Division.

🔍 Data Points Exposed

4 verified field types:
Social Security Number
Email
Phone Number
Name

Exposure Categories

CredentialsSSN

Canonical Fields

email_address, full_name, phone_number, ssn

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~387K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: doctor-alliance-2025

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Doctor Alliance
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationEmailPhone

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom