NOT for Sale! BlueLeaks 2.0 Hacktivist decides not to sell dataset with sensitive data
What Happened
Internet Yiff Machine (IYM), the hacktivist behind the P3 Global Intel breach dubbed "Blue Leaks 2.0," announced they would not sell the stolen dataset containing 8.3 million tips. P3 Global Intel operates tip reporting systems used by schools, healthcare organizations, and other institutions to collect sensitive incident reports. The dataset was initially offered for sale but IYM reversed course, choosing instead to retain control of the stolen information. This decision leaves the full scope of exposed data uncertain and healthcare entities potentially affected without clear visibility into what information may have been compromised.
Data Exposed
Based on P3 Global Intel's known service offerings, the 8.3 million tips likely include:
- Patient identity information (names, contact details)
- Mental health crisis reports submitted through healthcare tip lines
- Behavioral health incident details from institutional reporting systems
- Witness and reporter identifying information
- Timestamps and location data associated with reported incidents
- Potentially sensitive communications between patients, staff, and administrators
Healthcare organizations using P3 systems for patient safety reporting, workplace violence prevention, or crisis intervention would have submitted Protected Health Information (PHI) through these channels.
Response & Remediation
P3 Global Intel has not issued a public statement on breach notification status or remediation efforts. For healthcare covered entities that contracted with P3:
- Business Associate Agreement (BAA) review — P3's obligations under HIPAA and breach notification requirements must be enforced
- Breach notification assessments — covered entities must determine if the 8.3 million tips include their patients' PHI
- Risk analysis updates — third-party vendor risk scores must be recalculated
- Alternative reporting systems — practices should evaluate whether continued use of the compromised platform creates unacceptable risk
The decision not to sell the dataset does not eliminate the breach — the data remains in unauthorized hands and could be released, weaponized, or used for future attacks.
Why It Matters
This incident exposes a critical vulnerability in the vendor risk management practices of healthcare organizations. Tip reporting systems collect some of the most sensitive PHI — mental health crises, workplace violence reports, patient safety incidents — yet often receive less security scrutiny than EHR systems. When a vendor serving multiple healthcare entities is breached, the blast radius extends across every practice using that service.
The average breach costs healthcare organizations $9.8 million (IBM Security, 2024), with breach lifecycles averaging 258 days from initial compromise to containment. For small practices sharing a compromised vendor, the notification and remediation burden can be operational and financial disaster. Independent practices lack the legal and IT resources of hospital systems to navigate multi-party breaches where the responsible vendor may be unresponsive.
This incident exposes a critical vulnerability in the vendor risk management practices of healthcare organizations.
How Patient Protect Helps
Patient Protect's Vendor Risk Scanner is built for exactly this scenario. When you add a vendor like P3 Global Intel to your platform, Patient Protect:
- Tracks BAA status and expiration dates with automated renewal reminders
- Monitors vendor security posture and flags publicly reported incidents
- Calculates real-time vendor risk scores that feed into your overall compliance dashboard
- Generates audit-ready vendor risk documentation for OCR inquiries
When a breach like Blue Leaks 2.0 occurs, Patient Protect's Security Alerts notify you immediately, and the Autonomous Compliance Engine auto-generates the required response tasks — breach assessment, notification determinations, documentation updates — with completion tracking and deadline management.
The Breach Simulator lets you model the impact of a vendor breach against your actual controls before it happens, so you know exactly where your gaps are. Patient Protect's ePHI Audit Logging provides immutable proof of who accessed what data when, critical evidence when determining notification obligations after a shared vendor incident.
Independent practices working with compliance vendors gain an added security layer those platforms weren't designed to provide. Start a free trial at hipaa-port.com or check your risk at patient-protect.com/risk-assessment.
This editorial was generated by AI from publicly available source material and is clearly labeled as such. It does not constitute legal, compliance, or professional advice. Inclusion of any entity does not imply wrongdoing. Patient Protect makes no warranties regarding accuracy or completeness. Verify all information with the original source before relying on it.

