ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Looking for a prescription for your administrative headaches? Doctor Alliance has got you covered! 🤝 Our advanced platform helps medical professionals focus on what they do best – providing top-quality patient care – by streamlining administrative tasks, reducing paperwork, and improving efficiency. With our platform, medical professionals can easily manage their patient records, communicate securely with colleagues, and sign and transmit electronic documents in compliance with HIPAA regulations.😬 Benefits: Save Valuable Time and Resources Eliminate Administrative Paperwork Capture Missed Revenue Experience Efficient Referral Management

Doctor Alliance A.I CyberSecurity Scoring

Doctor Alliance

Company Details

Linkedin ID:

doctor-alliance

Employees number:

114

Number of followers:

2,591

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

doctoralliance.com

IP Addresses:

0

Company ID:

DOC_8231925

Scan Status:

In-progress

AI scoreDoctor Alliance Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/doctor-alliance.jpeg
Doctor Alliance Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreDoctor Alliance Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/doctor-alliance.jpeg
Doctor Alliance Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Doctor Alliance Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Doctor AllianceRansomware10055/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: A cyber-criminal group breached **Doctor Alliance**, a U.S. healthcare billing firm, exfiltrating over **1.2 million patient records**, including highly sensitive data such as **names, home addresses, phone numbers, health-insurance claim numbers, diagnoses, prescriptions, check-up summaries, and hospital orders**. The attackers posted a **200 MB sample** of the stolen data on a public leak forum as proof and are **demanding ransom** for the deletion of the full dataset. The breach exposes victims to **long-term risks of medical identity theft, insurance fraud, and blackmail**, as healthcare data cannot be reset like passwords or credit cards. The incident also threatens downstream healthcare providers and billing partners, as compromised upstream systems may propagate vulnerabilities. Regulatory notifications, credit monitoring, and identity-theft protection measures are now critical for affected individuals and organizations.

Doctor AllianceRansomware100511/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: On November 7, 2025, Doctor Alliance, a Dallas-based healthcare technology provider, suffered a ransomware attack by a hacker known as 'Kazu.' The attacker infiltrated the company’s systems, exfiltrating over **1.2 million files (353 GB)**, including **personally identifiable information (PII)** such as names, addresses, Social Security numbers, dates of birth, and **protected health information (PHI)** like medical records, treatment details, and health insurance data. The breach poses severe risks of **identity theft, medical fraud, and privacy violations** for affected individuals nationwide, given Doctor Alliance’s integration with **electronic health record (EHR) systems** and its role in processing high volumes of clinical and administrative data. The hacker demanded a ransom, threatening to release the stolen data. As of now, Doctor Alliance has not issued a public statement, leaving patients and partners uncertain about mitigation steps. The incident underscores critical vulnerabilities in healthcare data security, with potential long-term reputational, financial, and operational consequences for the company and its stakeholders.

Doctor Alliance
Ransomware
Severity: 100
Impact: 5
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: A cyber-criminal group breached **Doctor Alliance**, a U.S. healthcare billing firm, exfiltrating over **1.2 million patient records**, including highly sensitive data such as **names, home addresses, phone numbers, health-insurance claim numbers, diagnoses, prescriptions, check-up summaries, and hospital orders**. The attackers posted a **200 MB sample** of the stolen data on a public leak forum as proof and are **demanding ransom** for the deletion of the full dataset. The breach exposes victims to **long-term risks of medical identity theft, insurance fraud, and blackmail**, as healthcare data cannot be reset like passwords or credit cards. The incident also threatens downstream healthcare providers and billing partners, as compromised upstream systems may propagate vulnerabilities. Regulatory notifications, credit monitoring, and identity-theft protection measures are now critical for affected individuals and organizations.

Doctor Alliance
Ransomware
Severity: 100
Impact: 5
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: On November 7, 2025, Doctor Alliance, a Dallas-based healthcare technology provider, suffered a ransomware attack by a hacker known as 'Kazu.' The attacker infiltrated the company’s systems, exfiltrating over **1.2 million files (353 GB)**, including **personally identifiable information (PII)** such as names, addresses, Social Security numbers, dates of birth, and **protected health information (PHI)** like medical records, treatment details, and health insurance data. The breach poses severe risks of **identity theft, medical fraud, and privacy violations** for affected individuals nationwide, given Doctor Alliance’s integration with **electronic health record (EHR) systems** and its role in processing high volumes of clinical and administrative data. The hacker demanded a ransom, threatening to release the stolen data. As of now, Doctor Alliance has not issued a public statement, leaving patients and partners uncertain about mitigation steps. The incident underscores critical vulnerabilities in healthcare data security, with potential long-term reputational, financial, and operational consequences for the company and its stakeholders.

Ailogo

Doctor Alliance Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Doctor Alliance

Incidents vs Hospitals and Health Care Industry Average (This Year)

Doctor Alliance has 163.16% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Doctor Alliance has 212.5% more incidents than the average of all companies with at least one recorded incident.

Incident Types Doctor Alliance vs Hospitals and Health Care Industry Avg (This Year)

Doctor Alliance reported 2 incidents this year: 0 cyber attacks, 2 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Doctor Alliance (X = Date, Y = Severity)

Doctor Alliance cyber incidents detection timeline including parent company and subsidiaries

Doctor Alliance Company Subsidiaries

SubsidiaryImage

Looking for a prescription for your administrative headaches? Doctor Alliance has got you covered! 🤝 Our advanced platform helps medical professionals focus on what they do best – providing top-quality patient care – by streamlining administrative tasks, reducing paperwork, and improving efficiency. With our platform, medical professionals can easily manage their patient records, communicate securely with colleagues, and sign and transmit electronic documents in compliance with HIPAA regulations.😬 Benefits: Save Valuable Time and Resources Eliminate Administrative Paperwork Capture Missed Revenue Experience Efficient Referral Management

Loading...
similarCompanies

Doctor Alliance Similar Companies

The NHS was launched in 1948. It was born out of a long-held ideal that good healthcare should be available to all, regardless of wealth – one of the NHS's core principles. With the exception of some charges, such as prescriptions, optical services and dental services, the NHS in England remains

Johns Hopkins Medicine

Johns Hopkins Medicine is a governing structure for the University’s School of Medicine and the health system, coordinating their research, teaching, patient care, and related enterprises. The Johns Hopkins Hospital opened in 1889, followed four years later by the university’s School of Medicine

Kindred’s mission is to help our patients reach their highest potential for health and healing with intensive medical and rehabilitative care through a compassionate patient experience. Kindred’s 61 long-term acute care hospitals (LTACHs), along with 18 community-based, short-term acute care hospit

Cedars-Sinai

Since its beginning in 1902, Cedars-Sinai has evolved to meet the healthcare needs of one of the most diverse regions in the nation, continually setting new standards for quality and innovation in patient care, research, teaching and community service. Today, Cedars-Sinai is widely known for its na

Baptist Health

Baptist Health South Florida is the largest healthcare organization in the region, with 12 hospitals, more than 28,000 employees, 4,500 physicians and 200 outpatient centers, urgent care facilities and physician practices spanning Miami-Dade, Monroe, Broward and Palm Beach counties. Baptist Health S

UnitedHealth Group

UnitedHealth Group is a health care and well-being company with a mission to help people live healthier lives and help make the health system work better for everyone. We are 340,000 colleagues in two distinct and complementary businesses working to help build a modern, high-performing health syste

Hospital for Special Surgery

HSS is the world’s leading academic medical center focused on musculoskeletal health. At its core is Hospital for Special Surgery, nationally ranked No. 1 in orthopedics (for the 16th consecutive year), No. 3 in rheumatology by U.S. News & World Report (2025-2026), and the best pediatric orthopedic

GeBBS Healthcare Solutions

GeBBS Healthcare Solutions is a KLAS rated leading provider of Revenue Cycle Management (RCM) services and Risk Adjustment solutions. GeBBS’ innovative technology, combined with over 14,000-strong global workforce, helps clients improve financial performance, adhere to compliance, and enhance the pa

Emory Healthcare

Emory Healthcare is the most comprehensive health care system in Georgia. We offer 11 hospitals, the Emory Clinic, more than 250 provider locations, and more than 2,800 physicians specializing in 70 different medical subspecialties. Meaning we can provide treatments and services that may not be avai

newsone

Doctor Alliance CyberSecurity News

November 18, 2025 08:00 AM
Dr. Richard Zhao from NSFOCUS Selected into 2025 Top 10 Cybersecurity Professionals by Leading Consulting Company

SANTA CLARA, Calif., Nov 18, 2025 — International Data Corporation (IDC) officially released the “2025 IDC China Top 10 Cybersecurity...

November 13, 2025 08:00 AM
Cybersecurity researcher provides more details on $200K ransom pinned on Doctor Alliance

Cybersecurity researcher provides more details on $200K ransom pinned on Doctor Alliance ... In an update to HealthExec's story about a data...

November 13, 2025 12:07 AM
$200K ransom demanded of Doctor Alliance after hackers say they stole 1.2M files

A user calling themselves "Kazu" posted a sample of the data trove on a dark web forum, which was discovered by cybersecurity researchers.

November 12, 2025 08:00 AM
Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

On November 7, a relatively new user on a hacking forum offered data allegedly from Doctor Alliance for sale. According to the seller,...

November 11, 2025 08:00 AM
Over 1.2M records allegedly pilfered from Doctor Alliance

U.S. healthcare technology firm Doctor Alliance which provides billing services to AccentCare, Intrepid, and other healthcare providers had...

November 10, 2025 08:00 AM
Healthcare firm apparently hit by major cyberattack exposing over a million medical records - how to find out if you're affected

Doctor Alliance, an American healthcare technology firm, has allegedly suffered a cyberattack which saw it lose more than a million...

November 10, 2025 08:00 AM
Doctor Alliance breach allegedly exposes patients’ health data

Doctor Alliance breach exposes 1.2M+ patient records including diagnoses, prescriptions, and personal data. Hackers demand ransom payment.

October 30, 2025 07:00 AM
Russian cybercrime group hits PBM with ransomware

Hackers at Qilin claimed credit for a data breach at MedImpact, a pharmacy benefit manager serving insurance plans.

October 29, 2025 07:00 AM
Community hospital in Colorado thwarts ransomware attack, says patient data is safe

Family West Health, a 25-bed facility, said it spotted a cyberattack this week that forced it to shut down IT systems.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Doctor Alliance CyberSecurity History Information

Official Website of Doctor Alliance

The official website of Doctor Alliance is http://doctoralliance.com/.

Doctor Alliance’s AI-Generated Cybersecurity Score

According to Rankiteo, Doctor Alliance’s AI-generated cybersecurity score is 366, reflecting their Critical security posture.

How many security badges does Doctor Alliance’ have ?

According to Rankiteo, Doctor Alliance currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Doctor Alliance have SOC 2 Type 1 certification ?

According to Rankiteo, Doctor Alliance is not certified under SOC 2 Type 1.

Does Doctor Alliance have SOC 2 Type 2 certification ?

According to Rankiteo, Doctor Alliance does not hold a SOC 2 Type 2 certification.

Does Doctor Alliance comply with GDPR ?

According to Rankiteo, Doctor Alliance is not listed as GDPR compliant.

Does Doctor Alliance have PCI DSS certification ?

According to Rankiteo, Doctor Alliance does not currently maintain PCI DSS compliance.

Does Doctor Alliance comply with HIPAA ?

According to Rankiteo, Doctor Alliance is not compliant with HIPAA regulations.

Does Doctor Alliance have ISO 27001 certification ?

According to Rankiteo,Doctor Alliance is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Doctor Alliance

Doctor Alliance operates primarily in the Hospitals and Health Care industry.

Number of Employees at Doctor Alliance

Doctor Alliance employs approximately 114 people worldwide.

Subsidiaries Owned by Doctor Alliance

Doctor Alliance presently has no subsidiaries across any sectors.

Doctor Alliance’s LinkedIn Followers

Doctor Alliance’s official LinkedIn profile has approximately 2,591 followers.

NAICS Classification of Doctor Alliance

Doctor Alliance is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Doctor Alliance’s Presence on Crunchbase

No, Doctor Alliance does not have a profile on Crunchbase.

Doctor Alliance’s Presence on LinkedIn

Yes, Doctor Alliance maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/doctor-alliance.

Cybersecurity Incidents Involving Doctor Alliance

As of December 04, 2025, Rankiteo reports that Doctor Alliance has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Doctor Alliance has an estimated 30,378 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Doctor Alliance ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

How does Doctor Alliance detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with review audit logs for bulk data extraction, containment measures with suspend/block compromised credentials, and remediation measures with notify affected individuals and regulators, remediation measures with offer credit/identity-theft protection services, and communication strategy with no public statement issued as of reporting, communication strategy with advisories for affected individuals to:, communication strategy with - monitor credit reports/medical bills, communication strategy with - contact healthcare providers, communication strategy with - beware of phishing/solicitations, communication strategy with - consider fraud alerts/credit freezes..

Incident Details

Can you provide details on each incident ?

Incident : data breach

Title: Doctor Alliance Data Breach and Ransom Demand

Description: A cyber-criminal group claims to have exfiltrated over 1.2 million records from U.S. healthcare billing firm Doctor Alliance, including sensitive patient data such as prescriptions, treatment plans, and insurance-claim numbers. The threat actor posted a 200 MB sample of the stolen data on a public leak forum and is demanding ransom for deletion of the full dataset. The breach poses high risks of identity theft, medical fraud, and long-term exploitation of exposed healthcare data.

Type: data breach

Threat Actor: unknown cyber-criminal group

Motivation: financial gain (ransom)data monetization (dark web sale)

Incident : Data Breach

Title: Doctor Alliance Data Breach and Ransomware Attack

Description: On Nov. 7, 2025, Doctor Alliance, a Dallas-based healthcare technology provider, was allegedly alerted that an online hacker, 'Kazu', infiltrated its files and threatened to release them unless a ransom was paid. The hacking group claimed to have obtained over 1.2 million files (353 GB of data), including PII and PHI such as names, addresses, Social Security numbers, medical records, and health insurance information. The breach poses risks of identity theft, medical fraud, and privacy violations for affected individuals.

Date Detected: 2025-11-07

Type: Data Breach

Threat Actor: Kazu (hacking group)

Motivation: Financial (ransom demand)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : data breach DOC4192541111125

Data Compromised: Patient records (1.2m+)

Operational Impact: potential compromise of upstream/downstream healthcare systems

Brand Reputation Impact: high (healthcare data breach with long-term patient risks)

Legal Liabilities: potential HIPAA violationsregulatory fines

Identity Theft Risk: high (medical identity theft, insurance fraud)

Incident : Data Breach DOC0894308111825

Data Compromised: Pii (names, addresses, phone numbers, ssns, dates of birth), Phi (medical/treatment info, health insurance info)

Systems Affected: EHR-integrated platformClinical/Administrative data processing systems

Brand Reputation Impact: High (potential loss of trust due to exposure of sensitive health data)

Identity Theft Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Home Addresses, Phone Numbers, Health-Insurance Claim Numbers, Diagnoses, Check-Up Summaries, Prescriptions, Hospital Orders, , Pii, Phi and .

Which entities were affected by each incident ?

Incident : data breach DOC4192541111125

Entity Name: Doctor Alliance

Entity Type: healthcare billing firm

Industry: healthcare

Location: United States

Customers Affected: 1.2M+ patient records

Incident : data breach DOC4192541111125

Entity Name: Intrepid USA Healthcare

Entity Type: healthcare provider

Industry: healthcare

Incident : data breach DOC4192541111125

Entity Name: AccentCare

Entity Type: healthcare provider

Industry: healthcare

Incident : Data Breach DOC0894308111825

Entity Name: Doctor Alliance

Entity Type: Healthcare Technology Provider

Industry: Healthcare

Location: Dallas, Texas, USA

Customers Affected: Potentially nationwide (high-volume clinical/administrative data processor)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : data breach DOC4192541111125

Containment Measures: review audit logs for bulk data extractionsuspend/block compromised credentials

Remediation Measures: notify affected individuals and regulatorsoffer credit/identity-theft protection services

Incident : Data Breach DOC0894308111825

Communication Strategy: No public statement issued as of reportingAdvisories for affected individuals to:- Monitor credit reports/medical bills- Contact healthcare providers- Beware of phishing/solicitations- Consider fraud alerts/credit freezes

Data Breach Information

What type of data was compromised in each breach ?

Incident : data breach DOC4192541111125

Type of Data Compromised: Names, Home addresses, Phone numbers, Health-insurance claim numbers, Diagnoses, Check-up summaries, Prescriptions, Hospital orders

Number of Records Exposed: 1.2M+

Sensitivity of Data: high (protected health information - PHI)

File Types Exposed: database recordspatient documents

Incident : Data Breach DOC0894308111825

Type of Data Compromised: Pii, Phi

Number of Records Exposed: 1.2 million+ files (353 GB)

Sensitivity of Data: High (includes SSNs, medical records, insurance info)

Data Exfiltration: Confirmed (claimed by threat actor)

Personally Identifiable Information: NamesAddressesPhone numbersSocial Security numbersDates of birthMedical/treatment informationHealth insurance information

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: notify affected individuals and regulators, offer credit/identity-theft protection services, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by review audit logs for bulk data extraction, suspend/block compromised credentials and .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : data breach DOC4192541111125

Ransom Demanded: True

Data Exfiltration: True

Incident : Data Breach DOC0894308111825

Ransom Demanded: Yes (amount unspecified)

Data Exfiltration: Yes (double extortion tactic implied)

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : data breach DOC4192541111125

Regulations Violated: potential HIPAA violations,

Regulatory Notifications: required under health-data laws (e.g., HIPAA Breach Notification Rule)

Incident : Data Breach DOC0894308111825

Regulations Violated: Potential HIPAA violations (PHI exposure),

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : data breach DOC4192541111125

Lessons Learned: Securing business-associate and billing-vendor ecosystems is critical in healthcare., Healthcare data breaches have long-term risks (unlike resettable credentials)., Dependencies in upstream/downstream systems create extended vulnerability surfaces.

What recommendations were made to prevent future incidents ?

Incident : data breach DOC4192541111125

Recommendations: Implement stricter audit logging for bulk data operations., Enhance third-party vendor risk assessments., Proactively monitor dark web for exposed healthcare data., Expand identity-theft protection offerings for patients., Conduct regular penetration testing of billing systems.Implement stricter audit logging for bulk data operations., Enhance third-party vendor risk assessments., Proactively monitor dark web for exposed healthcare data., Expand identity-theft protection offerings for patients., Conduct regular penetration testing of billing systems.Implement stricter audit logging for bulk data operations., Enhance third-party vendor risk assessments., Proactively monitor dark web for exposed healthcare data., Expand identity-theft protection offerings for patients., Conduct regular penetration testing of billing systems.Implement stricter audit logging for bulk data operations., Enhance third-party vendor risk assessments., Proactively monitor dark web for exposed healthcare data., Expand identity-theft protection offerings for patients., Conduct regular penetration testing of billing systems.Implement stricter audit logging for bulk data operations., Enhance third-party vendor risk assessments., Proactively monitor dark web for exposed healthcare data., Expand identity-theft protection offerings for patients., Conduct regular penetration testing of billing systems.

Incident : Data Breach DOC0894308111825

Recommendations: Implement multi-layered security for EHR-integrated systems, Enhance monitoring for exfiltration of large data volumes, Develop pre-approved public communication templates for ransomware events, Conduct third-party audits of PHI/PII protection measuresImplement multi-layered security for EHR-integrated systems, Enhance monitoring for exfiltration of large data volumes, Develop pre-approved public communication templates for ransomware events, Conduct third-party audits of PHI/PII protection measuresImplement multi-layered security for EHR-integrated systems, Enhance monitoring for exfiltration of large data volumes, Develop pre-approved public communication templates for ransomware events, Conduct third-party audits of PHI/PII protection measuresImplement multi-layered security for EHR-integrated systems, Enhance monitoring for exfiltration of large data volumes, Develop pre-approved public communication templates for ransomware events, Conduct third-party audits of PHI/PII protection measures

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Securing business-associate and billing-vendor ecosystems is critical in healthcare.,Healthcare data breaches have long-term risks (unlike resettable credentials).,Dependencies in upstream/downstream systems create extended vulnerability surfaces.

References

Where can I find more information about each incident ?

Incident : data breach DOC4192541111125

Source: Cybersecurity researchers analyzing leaked sample data

Incident : data breach DOC4192541111125

Source: Threat actor's public leak forum post

Incident : Data Breach DOC0894308111825

Source: Unnamed cybersecurity news outlet (initial report)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cybersecurity researchers analyzing leaked sample data, and Source: Threat actor's public leak forum post, and Source: Unnamed cybersecurity news outlet (initial report).

Investigation Status

What is the current status of the investigation for each incident ?

Incident : data breach DOC4192541111125

Investigation Status: unconfirmed by Doctor Alliance; ongoing analysis by researchers

Incident : Data Breach DOC0894308111825

Investigation Status: Ongoing (no official updates from Doctor Alliance)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through No Public Statement Issued As Of Reporting, Advisories For Affected Individuals To:, - Monitor Credit Reports/Medical Bills, - Contact Healthcare Providers, - Beware Of Phishing/Solicitations and - Consider Fraud Alerts/Credit Freezes.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : data breach DOC4192541111125

Stakeholder Advisories: Review Audit Logs For Unusual Activity., Suspend Compromised Credentials., Prepare Regulatory Notifications..

Customer Advisories: Monitor medical claims for fraudulent activity.Check insurance statements for unfamiliar charges.Place fraud alerts with credit agencies.Enroll in offered identity-protection services.

Incident : Data Breach DOC0894308111825

Customer Advisories: Monitor credit reports and medical billsContact healthcare providers regarding recordsAvoid sharing sensitive info in unsolicited communicationsConsider fraud alerts/credit freezes

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Review Audit Logs For Unusual Activity., Suspend Compromised Credentials., Prepare Regulatory Notifications., Monitor Medical Claims For Fraudulent Activity., Check Insurance Statements For Unfamiliar Charges., Place Fraud Alerts With Credit Agencies., Enroll In Offered Identity-Protection Services., , Monitor Credit Reports And Medical Bills, Contact Healthcare Providers Regarding Records, Avoid Sharing Sensitive Info In Unsolicited Communications, Consider Fraud Alerts/Credit Freezes and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : data breach DOC4192541111125

High Value Targets: Patient Records, Insurance Claim Data,

Data Sold on Dark Web: Patient Records, Insurance Claim Data,

Incident : Data Breach DOC0894308111825

High Value Targets: Ehr-Integrated Systems, Clinical/Administrative Databases,

Data Sold on Dark Web: Ehr-Integrated Systems, Clinical/Administrative Databases,

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was True.

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an unknown cyber-criminal group and Kazu (hacking group).

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-11-07.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were patient records (1.2M+), , PII (names, addresses, phone numbers, SSNs, dates of birth), PHI (medical/treatment info, health insurance info) and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was EHR-integrated platformClinical/Administrative data processing systems.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was review audit logs for bulk data extractionsuspend/block compromised credentials.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were PHI (medical/treatment info, health insurance info), patient records (1.2M+), PII (names, addresses, phone numbers, SSNs and dates of birth).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.2M.

Ransomware Information

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Dependencies in upstream/downstream systems create extended vulnerability surfaces.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Develop pre-approved public communication templates for ransomware events, Expand identity-theft protection offerings for patients., Enhance monitoring for exfiltration of large data volumes, Proactively monitor dark web for exposed healthcare data., Conduct regular penetration testing of billing systems., Conduct third-party audits of PHI/PII protection measures, Implement stricter audit logging for bulk data operations., Implement multi-layered security for EHR-integrated systems and Enhance third-party vendor risk assessments..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Unnamed cybersecurity news outlet (initial report), Threat actor's public leak forum post and Cybersecurity researchers analyzing leaked sample data.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is unconfirmed by Doctor Alliance; ongoing analysis by researchers.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Review audit logs for unusual activity., Suspend compromised credentials., Prepare regulatory notifications., .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Monitor medical claims for fraudulent activity.Check insurance statements for unfamiliar charges.Place fraud alerts with credit agencies.Enroll in offered identity-protection services. and Monitor credit reports and medical billsContact healthcare providers regarding recordsAvoid sharing sensitive info in unsolicited communicationsConsider fraud alerts/credit freezes.

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=doctor-alliance' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge