Back to Intelligence

California & Washington Healthcare Provider Breaches: Defending Against PHI Exfiltration

SA
Security Arsenal Team
May 21, 2026
6 min read

Recent breach notifications from Family Health Centers of San Diego, Totem Lake Family Dentistry, and Glendora Surgery Center serve as a stark reminder that the healthcare sector remains a primary target for cybercriminals. While the specific vectors (e.g., specific CVE exploitation vs. phishing) may vary, the outcome is consistent: unauthorized access to Protected Health Information (PHI). For defenders, these announcements are triggers to validate existing controls against data theft tactics. The exposure of patient names, addresses, and medical records not only violates HIPAA but also paves the way for downstream phishing and identity theft attacks.

Defenders must assume that if these small-to-medium-sized providers were compromised, threat actors are likely probing similar infrastructure in the ecosystem. The priority now is to detect active data staging and exfiltration, and to harden access controls to prevent unauthorized network persistence.

Technical Analysis

Based on the typical profile of breaches in these environments, the incidents likely involve the following technical characteristics:

  • Affected Assets: Electronic Health Record (EHR) databases, file servers storing patient documents (PDFs, DICOM images), and billing systems.
  • Attack Vector: While the specific initial access vector was not detailed in the summary, healthcare providers of this size frequently fall victim to:
    • Phishing / Credential Theft: Leading to valid account usage.
    • Unpatched Services: Exposure of RDP or VPN services to the internet.
    • Third-Party Vendor Access: Compromised credentials used by billing or IT support vendors.
  • Mechanism of Compromise: The attack chain typically involves an adversary establishing a foothold, escalating privileges (often via Misconfiguration or valid credentials), and locating sensitive data repositories.
  • Objective: Exfiltration of PHI (PII + Medical Data) for double-extortion ransomware or sale on underground markets.
  • Exploitation Status: Confirmed unauthorized access leading to data disclosure.

Detection & Response

Given the confirmed nature of these breaches, security teams must hunt for indicators of data staging (collection) and exfiltration. The following rules and queries are designed to detect the bulk copying of medical records and the use of archiving tools often employed to steal data.

SIGMA Rules

YAML
---
title: Potential Mass File Copying of Medical Documents
id: 8a2b4c1d-5e6f-4a3b-8c9d-1e2f3a4b5c6d
status: experimental
description: Detects potential mass copying of files with extensions commonly used for medical records (PDF, DOCX, TIF, DICOM) from a user context, indicative of data staging.
references:
  - https://attack.mitre.org/techniques/T1005/
author: Security Arsenal
date: 2024/05/23
tags:
  - attack.collection
  - attack.t1005
logsource:
  category: file_access
  product: windows
detection:
  selection:
    TargetFilename|contains:
      - '\\EHR\'
      - '\\Patients\'
      - '\\MedicalRecords\'
    TargetFilename|endswith:
      - '.pdf'
      - '.doc'
      - '.docx'
      - '.tif'
      - '.dcm'
  condition: selection
  timeframe: 1m
  count: 50
falsepositives:
  - Legitimate backup operations
  - Bulk printing by authorized staff
level: high
---
title: Suspicious Archiving Tool Execution for Data Exfiltration
id: 9b3c5d2e-6f7a-5b4c-9d0e-2f3a4b5c6d7e
status: experimental
description: Detects the execution of common archiving tools (WinRAR, 7-Zip) with command lines indicating large file spanning or password protection, often used to stage data for exfiltration.
references:
  - https://attack.mitre.org/techniques/T1560/
author: Security Arsenal
date: 2024/05/23
tags:
  - attack.collection
  - attack.t1560.001
logsource:
  category: process_creation
  product: windows
detection:
  selection_img:
    Image|endswith:
      - '\\winrar.exe'
      - '\\7z.exe'
      - '\\winzip.exe'
  selection_cli:
    CommandLine|contains:
      - '-p' # Password protection
      - '-v' # Voluming (splitting archives)
      - 'a ' # Add to archive command
  condition: all of selection_*
falsepositives:
  - Administrative backups
level: medium

KQL (Microsoft Sentinel / Defender)

KQL — Microsoft Sentinel / Defender
// Hunt for unusual volume of data transfer or access to sensitive directories
DeviceFileEvents
| where Timestamp > ago(7d)
| where TargetFilename has_any ("EHR", "Patients", "PHI", "MedicalRecords") 
or TargetFilename endswith @".pdf" 
or TargetFilename endswith @".dcm"
| summarize count(), unique_files = dcount(TargetFilename), list_of_files = make_set(TargetFilename) by InitiatingProcessAccountName, DeviceName, bin(Timestamp, 5m)
| where unique_files > 20
| order by count_ desc
| extend hunting_link = "https://securityarsenal.com/intel/healthcare-security"

Velociraptor VQL

VQL — Velociraptor
-- Hunt for recently created archives (zip, rar, 7z) in user directories
SELECT 
  FullPath, 
  Size, 
  Mtime, 
  Mode.String as Mode,
  Sys.OSPath.Basename(Name) as FileName
FROM glob(globs="/*", root="C:\Users\")
WHERE 
  FullPath =~ '\\.(zip|rar|7z|iso)$'
  AND Mtime > now() - 24h
GROUP BY FullPath

Remediation Script (PowerShell)

PowerShell
# Audit and Lockdown: Identify excessive permissions on sensitive shares
# Run this on the file server hosting PHI data

$SensitiveShares = @("EHR", "Patients", "Billing", "Scans")
$Report = @()

foreach ($Share in $SensitiveShares) {
    $Path = "\Server\$Share" # Replace with actual local paths if running locally, e.g., "D:\Data\$Share"
    if (Test-Path $Path) {
        $Acl = Get-Acl -Path $Path
        foreach ($Access in $Acl.Access) {
            # Flag non-inherited, modify/full control permissions for non-admin groups
            if ($Access.IsInherited -eq $false -and 
                $Access.FileSystemRights -match "Modify|FullControl" -and 
                $Access.IdentityReference -notmatch "^(BUILTIN\\Administrators|NT AUTHORITY\\SYSTEM|DOMAIN\\Domain Admins)") {
                
                $Report += [PSCustomObject]@{
                    Path = $Path
                    Identity = $Access.IdentityReference
                    Rights = $Access.FileSystemRights
                    Type = $Access.AccessControlType
                }
            }
        }
    }
}

if ($Report) {
    Write-Host "[!] Found excessive permissions on sensitive paths:" -ForegroundColor Red
    $Report | Format-Table -AutoSize
    # Recommended Action: Review these groups/users and restrict to "Read and Execute" unless write access is strictly required.
} else {
    Write-Host "[+] No excessive non-inherited permissions found on monitored shares." -ForegroundColor Green
}

Remediation

Based on the breach patterns observed at Family Health Centers, Totem Lake, and Glendora, the following remediation steps are critical for preventing similar incidents:

  1. Audit and Revoke Stale Access: Immediately conduct a review of all user accounts with access to PHI databases and file shares. Disable accounts for terminated employees or contractors who no longer require access.
  2. Implement or Enforce MFA: Ensure Multi-Factor Authentication (MFA) is enforced on all remote access points (VPN, RDP, Citrix, OWA) and for all privileged administrative accounts.
  3. Network Segmentation: Verify that EHR systems and backup repositories are not directly accessible from the general employee network or the internet. Place them in a separate VLAN with strict ACLs.
  4. Egress Filtering: Configure firewalls to block outbound traffic to known malicious IPs and restrict outbound protocols (e.g., SMB, RDP) from workstations to the internet.
  5. Data Loss Prevention (DLP): Deploy DLP rules to alert on unauthorized transfers of files containing sensitive keywords (e.g., "SSN", "DOB", "Patient ID") to external cloud storage or personal email accounts.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcare-cybersecurityhipaa-compliancehealthcare-ransomwareehr-securitymedical-data-breachhealthcare-breachphi-exfiltrationincident-response

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.