Healthcare Services Group Data Breach Exposes 624,000 Patients

▼ Summary
– Healthcare Services Group (HSGI) experienced a security breach affecting over 600,000 individuals, with unauthorized access occurring from September 27 to October 3, 2024.
– The breach involved the exfiltration of sensitive personal data, including Social Security numbers, driver’s license details, financial information, and account credentials.
– Impacted individuals were notified about the breach on August 25, 2025, following a 10-month investigation to determine the scope and affected parties.
– HSGI is offering 12 to 24 months of credit monitoring and identity theft protection services to those affected, though there is currently no evidence of misuse of the stolen data.
– The company advises vigilance against phishing and scams, and no ransomware groups have claimed responsibility for the attack as of the reporting date.
A significant data breach at Healthcare Services Group (HSGI) has compromised the personal information of more than 624,000 patients, raising serious concerns about data security within the healthcare support sector. The incident underscores the persistent vulnerabilities facing organizations that manage sensitive personal and financial data on a large scale.
The breach was first detected on October 7, 2024, though investigators later determined that unauthorized access to the company’s network had actually begun ten days earlier, on September 27. During that period, an intruder copied files from HSGI’s systems, potentially gaining access to a wide range of confidential patient information.
Following the discovery, the company launched a thorough review to identify what specific data was taken and which individuals were affected. This process extended over several months, concluding only in late August 2025, when formal breach notifications were finally distributed to those impacted.
Healthcare Services Group, a Pennsylvania-based publicly traded company, provides essential support services to healthcare facilities nationwide. With annual revenues reaching $1.7 billion, the firm plays a critical role in the operational infrastructure of thousands of medical centers across the United States.
The stolen data varies from person to person but may include highly sensitive details such as full names, Social Security numbers, driver’s license or state ID numbers, financial account information, and even account access credentials. Such information could be used for identity theft, financial fraud, or targeted phishing campaigns.
Despite the severity of the exposure, HSGI has stated that there is currently no evidence suggesting the stolen data has been misused. As a precaution, the company is offering affected individuals complimentary credit monitoring and identity theft protection services, ranging from 12 to 24 months, depending on the type and sensitivity of the exposed information.
The company also advises impacted patients to remain alert for suspicious activity, including phishing emails or unauthorized transactions, and to promptly report anything unusual to their financial institutions and relevant authorities.
Thus far, no ransomware group has publicly claimed responsibility for the attack. Further details regarding the breach’s scope and the company’s response are anticipated as the investigation continues.
(Source: Bleeping Computer)





