Company Details
ferguson-medical-group-lp
36
57
62
sfmc.net
0
FER_3360555
In-progress

FERGUSON MEDICAL GROUP, LP Company CyberSecurity Posture
sfmc.netFerguson Medical Group is a premier multi-specialty healthcare group dedicated to providing quality state-of-the-art medical services in a caring, compassionate and professional atmosphere. We are committed to services, innovation and quality care while serving the complete medical needs of the Southeastern Missouri area.
Company Details
ferguson-medical-group-lp
36
57
62
sfmc.net
0
FER_3360555
In-progress
Between 700 and 749

FMGL Global Score (TPRM)XXXX

Description: Ferguson Medical Group (FMG) in Sikeston, Missouri, allegedly suffered a cyber attack on its computer network, according to Saint Francis Healthcare System. Before they joined forces with Saint Francis, there was this one-off accessibility attack with Ferguson Medical Group. they demand a monetary ransom. According to the organization, their cyber security division was able to secure Ferguson's computer network and use backups to restore nearly all of the clinic's lost material. Any paperwork that had been scanned into the FMG system, regardless of date, and FMG records from September 20, 2018, to December 31, 2018, were not recoverable by experts.


No incidents recorded for FERGUSON MEDICAL GROUP, LP in 2025.
No incidents recorded for FERGUSON MEDICAL GROUP, LP in 2025.
No incidents recorded for FERGUSON MEDICAL GROUP, LP in 2025.
FMGL cyber incidents detection timeline including parent company and subsidiaries

Ferguson Medical Group is a premier multi-specialty healthcare group dedicated to providing quality state-of-the-art medical services in a caring, compassionate and professional atmosphere. We are committed to services, innovation and quality care while serving the complete medical needs of the Southeastern Missouri area.


The University of Texas MD Anderson Cancer Center is one of the world's most respected centers devoted exclusively to cancer patient care, research, education and prevention. MD Anderson provides cancer care at several convenient locations throughout the Greater Houston Area and collaborates with co

The NHS was launched in 1948. It was born out of a long-held ideal that good healthcare should be available to all, regardless of wealth – one of the NHS's core principles. With the exception of some charges, such as prescriptions, optical services and dental services, the NHS in England remains

UnitedHealth Group is a health care and well-being company with a mission to help people live healthier lives and help make the health system work better for everyone. We are 340,000 colleagues in two distinct and complementary businesses working to help build a modern, high-performing health syste

At Texas Health Resources, our mission is to improve the health of the people in the communities we serve. We are one of the largest faith-based, nonprofit health systems in the United States with a team of more than 28,000 employees of wholly owned/operated facilities and consolidated joint ventur

We provide quality, compassionate health care at more than 40 hospitals and care centers that are serving communities across California, Arizona and Nevada every minute of every day. And while not everyone may live near a major medical facility, Dignity Health is making health care more accessible b

We are Erasmus MC. Our roots lie in Rotterdam, a city and port of international standing. We are the most innovative university medical center in the Netherlands and one of the world’s leading centers of scientific research. We are committed to achieving a healthy population and pursuing excellence

As a world-class academic and health care system, Duke Health strives to transform medicine and health locally and globally through innovative scientific research, rapid translation of breakthrough discoveries, educating future clinical and scientific leaders, advocating and practicing evidence-base

After the acquisition of the Capio Group in 2018, Ramsay Santé has become Europe's leading private hospital and primary care companies. The group now has 36,000 employees and works with nearly 8,600 private practitioners. Present in 5 countries, France, Sweden, Norway, Denmark and Italy, the group

South Eastern Norway Regional health Authority is a merger between the former Eastern and South regional Health Authority. Responsible for secondary healthcare services for the south-eastern parts of Norway 2.5 million people (approx 52% of population) cost containment budget 58 billion Nkr. 100%
.png)
The transaction marks the tech giant's largest acquisition to date. Yesterday (18 March), Google's parent company Alphabet announced that it...
Patients impacted by the 2019 ransomware attack on Ferguson Medical Group, now owned by Saint Francis Healthcare, reached a $350000 with the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of FERGUSON MEDICAL GROUP, LP is http://www.fergusonmedical.com.
According to Rankiteo, FERGUSON MEDICAL GROUP, LP’s AI-generated cybersecurity score is 742, reflecting their Moderate security posture.
According to Rankiteo, FERGUSON MEDICAL GROUP, LP currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, FERGUSON MEDICAL GROUP, LP is not certified under SOC 2 Type 1.
According to Rankiteo, FERGUSON MEDICAL GROUP, LP does not hold a SOC 2 Type 2 certification.
According to Rankiteo, FERGUSON MEDICAL GROUP, LP is not listed as GDPR compliant.
According to Rankiteo, FERGUSON MEDICAL GROUP, LP does not currently maintain PCI DSS compliance.
According to Rankiteo, FERGUSON MEDICAL GROUP, LP is not compliant with HIPAA regulations.
According to Rankiteo,FERGUSON MEDICAL GROUP, LP is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
FERGUSON MEDICAL GROUP, LP operates primarily in the Hospitals and Health Care industry.
FERGUSON MEDICAL GROUP, LP employs approximately 36 people worldwide.
FERGUSON MEDICAL GROUP, LP presently has no subsidiaries across any sectors.
FERGUSON MEDICAL GROUP, LP’s official LinkedIn profile has approximately 57 followers.
FERGUSON MEDICAL GROUP, LP is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, FERGUSON MEDICAL GROUP, LP does not have a profile on Crunchbase.
Yes, FERGUSON MEDICAL GROUP, LP maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ferguson-medical-group-lp.
As of November 28, 2025, Rankiteo reports that FERGUSON MEDICAL GROUP, LP has experienced 1 cybersecurity incidents.
FERGUSON MEDICAL GROUP, LP has an estimated 30,037 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with secured ferguson's computer network, and remediation measures with used backups to restore nearly all of the clinic's lost material..
Title: Cyber Attack on Ferguson Medical Group
Description: Ferguson Medical Group (FMG) in Sikeston, Missouri, allegedly suffered a cyber attack on its computer network, according to Saint Francis Healthcare System. Before they joined forces with Saint Francis, there was this one-off accessibility attack with Ferguson Medical Group. They demanded a monetary ransom. According to the organization, their cyber security division was able to secure Ferguson's computer network and use backups to restore nearly all of the clinic's lost material. Any paperwork that had been scanned into the FMG system, regardless of date, and FMG records from September 20, 2018, to December 31, 2018, were not recoverable by experts.
Type: Ransomware
Motivation: Monetary ransom
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Any paperwork that had been scanned into the fmg system, Fmg records from september 20, 2018, to december 31, 2018
Systems Affected: Computer network

Entity Name: Ferguson Medical Group
Entity Type: Medical Clinic
Industry: Healthcare
Location: Sikeston, Missouri

Containment Measures: Secured Ferguson's computer network
Remediation Measures: Used backups to restore nearly all of the clinic's lost material
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Used backups to restore nearly all of the clinic's lost material.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by secured ferguson's computer network.

Source: Saint Francis Healthcare System
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Saint Francis Healthcare System.
Most Significant Data Compromised: The most significant data compromised in an incident were Any paperwork that had been scanned into the FMG system, FMG records from September 20, 2018, to December 31, 2018 and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Secured Ferguson's computer network.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were FMG records from September 20, 2018, to December 31, 2018 and Any paperwork that had been scanned into the FMG system.
Most Recent Source: The most recent source of information about an incident is Saint Francis Healthcare System.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.