ProxyCare Inc Data Breach Exposes Social Security numbers

Published
March 31, 2026
Updated
March 31, 2026
ProxyCare Inc Data Breach Exposes Social Security numbers
Proxycare
Affected by the data breach? You may be entitled to compensation. Submit a claim today.

ProxyCare Inc, a pharmacy services company headquartered in Sunrise, Florida, disclosed a data breach that the company first discovered on Aug. 22, 2025. The breach has so far impacted 125 Massachusetts residents.

ProxyCare began sending notifications to affected individuals on March 23, 2026, and posted a notice about the data security incident on its website.

What happened in the ProxyCare data breach

ProxyCare learned that certain systems within its network environment had been affected by a cybersecurity incident. Upon discovering the issue, the company launched a thorough investigation into the matter.

The investigation had two main goals: to determine how far the unauthorized activity had spread within the company's network and to find out whether any personal health information had been accessed or taken by an unauthorized party.

The cybersecurity team conducted a detailed forensic analysis of the affected systems and performed an extensive manual review of the documents contained in the impacted files. This process, which involved identifying what types of personal information the files contained and which individuals were affected, took several months to complete.

On Jan. 29, 2026, ProxyCare determined that files potentially accessed or acquired by an unauthorized third party contained personal health information.

The types of personally identifiable information exposed in the breach included the names and Social Security numbers.

ProxyCare's response to the breach

The company sent written notifications to all individuals whose information was found in the potentially affected files. Those letters included guidance on best practices to help people safeguard their personal information in the aftermath of the incident, according to the company.

Individuals whose Social Security numbers were contained in the impacted files have been offered complimentary credit monitoring services. Given the sensitive nature of the information involved in this breach, affected individuals may want to consider enrolling in this service promptly.

ProxyCare has set up a dedicated toll-free response line for people who have questions or need more information about the incident. The number is 844-558-4566, and it is available Monday through Friday from 9 a.m. to 9 p.m. Eastern time.

Steps to take if your information was exposed

  • Place a fraud alert on credit files by contacting any one of the three major credit bureaus: Equifax (1-800-525-6285), Experian (1-888-397-3742) or TransUnion (1-800-680-7289), which will then notify the other two.
  • Consider placing a credit freeze with all three credit bureaus to prevent new accounts from being opened without explicit consent.
  • Request free credit reports at AnnualCreditReport.com and review them carefully for any accounts or credit inquiries that seem unfamiliar.
  • Review Explanation of Benefits statements from health insurers for any services or charges that were not expected or do not look right.
  • Watch for phishing attempts that mention ProxyCare or this data breach by name, as scammers sometimes use real breach notifications to trick people into giving up more personal details.
  • Monitor bank accounts and credit card statements for unauthorized charges or withdrawals and report any suspicious activity to the financial institution right away.

SUBMIT YOUR CLAIM TO THE LAW FIRM HANDLING THIS INVESTIGATION

Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info
  • Affected information types not yet disclosed

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image