Pennsylvania Hospitalist Group Breach Exposes Sensitive Patient Info

Published
September 27, 2025
Updated
September 27, 2025
Pennsylvania Hospitalist Group Breach Exposes Sensitive Patient Info
Pennsylvania Hospitalist Group
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

Affected by the

Pennsylvania Hospitalist Group

data breach?

Join the Lawsuit

It's free to join. 

Banner advertisement for ExpressVPN to take control of your online security

Claim Depot may receieve a commission from links on this page

Pennsylvania Hospitalist Group, LLC, a medical practice specializing in emergency medicine, experienced a cybersecurity incident. The data breach occurred when an unauthorized actor gained access to the computer network of ApolloMD Business Services, a third-party billing services provider affiliated with the group and several other physician practices.

The cyberattack was first discovered on May 22, 2025, after unusual activity was observed in ApolloMD’s internal systems. An investigation determined that a data breach occurred between May 22 and May 23, 2025, when files containing sensitive patient information were potentially accessed. The Qilin ransomware group claimed responsibility for the attack.

The total number of affected individuals has not been released but is believed to include thousands of patients from multiple physician practices. Compromised information included names, Social Security numbers, dates of birth, addresses, diagnosis information, provider names, dates of service, treatment information and health insurance information.

ApolloMD published a Notice of Data Security Incident on its website. The company began notifying impacted individuals by mail on Sept. 17, 2025.

Pennsylvania Hospitalist Group's response

Upon discovering the breach, ApolloMD secured affected systems, engaged law enforcement and later notified impacted practices. Patients whose Social Security numbers were compromised are being offered free credit monitoring services.

If you receive a data breach notice from ApolloMD, Pennsylvania Hospitalist Group or a hospital you received treatment at, you may want to:

  • Sign up for the free credit monitoring services, if offered.
  • Monitor your credit reports and financial accounts for any unusual activity.
  • Be alert for phishing emails or phone calls that may use your exposed information.
  • Consider placing a fraud alert or credit freeze with major credit bureaus.

ApolloMD established a dedicated, toll-free incident response line (833-397-6797) is available Monday through Friday, 8 a.m. to 8 p.m. Eastern Time, to answer questions and provide support to individuals that believe they may be involved in the data breach.

Protect Your Data

A breach notice means your personal details could be circulating far beyond the organization involved. One practical step is continuous monitoring: services such as Identity Defender (included with an ExpressVPN subscription) can automatically check dark-web markets, flag new credit-file activity, and request removal of your information from data-broker sites.

This kind of “early-warning system” can’t undo a breach, but it can help you spot misuse quickly and limit further exposure. ExpressVPN is offering 61% off, risk-free for 30 days, with ID Theft Insurance included and no extra cost for those who sign up for one or two years.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Consumers Notification date
Date of Breach
Breach Discovered Date
Total People Affected
Information Types Exposed
  • Name
  • Social Security number
  • Dates of birth
  • Addresses
  • Diagnosis information
  • Provider names
  • Dates of service
  • Treatment information
  • Health insurance information
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image