On or around July 14, 2024, Apex Global Solutions (AGS), a healthcare IT and back-office solutions provider, discovered potentially suspicious activity within its systems. After securing its environment and launching an investigation with third-party cybersecurity specialists, AGS determined that unauthorized access or acquisition of data occurred between June 18, 2024 and July 2, 2024.
The breach is severe in both scope and sensitivity; the ransomware group known as Brain Cipher has claimed responsibility, stating on their dark web portal that they exfiltrated up to 2 terabytes of data from AGS and provided sample screenshots as proof of access.
The stolen information includes both personally identifiable information (PII) and protected health information (PHI): first and last names, addresses, dates of birth, driver’s license numbers, Social Security numbers, diagnosis/condition, health insurance details, claims information, patient IDs, treatment information, provider names, and financial account information. While the exact number of affected individuals has not been disclosed, the breadth of data types and the fact that AGS serves healthcare organizations across more than 30 states suggest a potentially large impact.
The incident was publicly disclosed in a notice of data incident posted on MarketWatch. The attack was a ransomware event, with the threat actor leveraging the anonymity of the Tor network to publicize their claims and pressure the company.
Upon detecting the breach, AGS took immediate steps to secure its systems and engaged external cybersecurity experts to conduct a thorough investigation. The company has since implemented additional security measures to minimize the risk of similar incidents in the future. AGS has also notified law enforcement and is reviewing its data protection policies and procedures.
To support those affected, AGS is providing access to credit monitoring and identity protection services. Individuals who may have been impacted are encouraged to enroll in these services by calling (877) 520-4008, Monday through Friday, 9:00 a.m. to 9:00 p.m. Eastern Time (excluding holidays), or by writing to AGS at 400 Rella Blvd., Suite 200, Montebello, NY 10901.
Given the nature of the breach—specifically, the involvement of both PII and PHI and the confirmed theft by a ransomware group—affected individuals should remain vigilant. AGS recommends regularly reviewing account statements, explanation of benefits statements, and credit history for unauthorized activity.
Individuals can obtain a free credit report annually from each of the three major credit bureaus and are encouraged to consider placing a fraud alert or credit freeze on their credit files. Additional resources for identity theft protection and reporting are available through the Federal Trade Commission at IdentityTheft.gov.
For more information, you can review the official notice of data incident posted by AGS.