Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Exposed Patient Records. Show all posts

Tribal Health Clinics in California Report Patient Data Exposure

 


Patients receiving care at several tribal healthcare clinics in California have been warned that a cyber incident led to the exposure of both personal identification details and private medical information. The clinics are operated by a regional health organization that runs multiple facilities across the Sierra Foothills and primarily serves American Indian communities in that area.

A ransomware group known as Rhysida has publicly claimed responsibility for a cyberattack that took place in November 2025 and affected the MACT Health Board. The organization manages several clinics in the Sierra Foothills region of California that provide healthcare services to Indigenous populations living in nearby communities.

In January, the MACT Health Board informed an unspecified number of patients that their information had been involved in a data breach. The organization stated that the compromised data included several categories of sensitive personal information. This exposed data may include patients’ full names and government-issued Social Security numbers. In addition to identity information, highly confidential medical details were affected. These medical records can include information about treating doctors, medical diagnoses, insurance coverage details, prescribed medications, laboratory and diagnostic test results, stored medical images, and documentation related to ongoing care and treatment.

The cyber incident caused operational disruptions across MACT clinic systems starting on November 20, 2025. During this period, essential digital services became unavailable, including phone communication systems, platforms used to process prescription requests, and scheduling tools used to manage patient appointments. Telephone services were brought back online by December 1. However, as of January 22, some specialized imaging-related services were still not functioning normally, indicating that certain technical systems had not yet fully recovered.

Rhysida later added the MACT Health Board to its online data leak platform and demanded payment in cryptocurrency. The amount requested was eight units of digital currency, which was valued at approximately six hundred sixty-two thousand dollars at the time the demand was reported. To support its claim of responsibility, the group released sample files online, stating that the materials were taken from MACT’s systems. The files shared publicly reportedly included scans of passports and other internal documents.

The MACT Health Board has not confirmed that Rhysida’s claims are accurate. There is also no independent verification that the files published by the group genuinely originated from MACT’s internal systems. At this time, it remains unclear how many individuals received breach notifications, what method was used by the attackers to access MACT’s network, or whether any ransom payment was made. The organization declined to provide further information when questioned.

In its written notification to affected individuals, MACT stated that it experienced an incident that disrupted its information technology operations. The organization reported that an internal investigation found that unauthorized access occurred to certain files stored on its systems during a defined time window between November 12 and November 20, 2025.

The health organization is offering eligible individuals complimentary identity monitoring services. These services are intended to help patients detect possible misuse of personal or financial information following the exposure of sensitive records.

Rhysida is a cybercriminal group that first became active in public reporting in May 2023. The group deploys ransomware designed to both extract sensitive data from victim organizations and prevent access to internal systems by encrypting files. After carrying out an attack, the group demands payment in exchange for deleting stolen data and providing decryption tools that allow victims to regain access to locked systems. Rhysida operates under a ransomware-as-a-service model, in which external partners pay to use its malware and technical infrastructure to carry out attacks and collect ransom payments.

The group has claimed responsibility for more than one hundred confirmed ransomware incidents, along with additional claims that have not been publicly acknowledged by affected organizations. On average, the group’s ransom demands amount to several hundred thousand dollars per incident.

A significant portion of Rhysida’s confirmed attacks have targeted hospitals, clinics, and other healthcare providers. These healthcare-related incidents have resulted in the exposure of millions of sensitive records. Past cases linked to the group include attacks on healthcare organizations in multiple U.S. states, with ransom demands ranging from over one million dollars to several million dollars. In at least one case, the group claimed to have sold stolen data after a breach.

Researchers tracking cybersecurity incidents have recorded more than one hundred confirmed ransomware attacks on hospitals, clinics, and other healthcare providers across the United States in 2025 alone. These attacks collectively led to the exposure of nearly nine million patient records. In a separate incident reported during the same week, another healthcare organization confirmed a 2025 breach that was claimed by a different ransomware group, which demanded a six-figure ransom payment.

Ransomware attacks against healthcare organizations often involve both data theft and system disruption. Such incidents can disable critical medical systems, interfere with patient care, and create risks to patient safety and privacy. When hospitals and clinics lose access to digital systems, staff may be forced to rely on manual processes, delay or cancel appointments, and redirect patients to other facilities until systems are restored. These disruptions can increase operational strain and place patients and healthcare workers at heightened risk.

The MACT Health Board is named after the five California counties it serves: Mariposa, Amador, Alpine, Calaveras, and Tuolumne. The organization operates approximately a dozen healthcare facilities that primarily serve American Indian communities in the region. These clinics provide a range of services, including general medical care, dental treatment, behavioral health support, vision and eye care, and chiropractic services.


Large-Scale Data Breach at Frederick Health Exposes Patient Records

 


Two separate ransomware incidents have recently affected healthcare providers in Maryland and California and exposed sensitive information belonging to more than 1.1 million patients as a result, according to disclosures filed with federal regulators that recently broke the story. During one of the attacks, cybercriminals reportedly released approximately 480 gigabytes of data that had been unauthorised to be released by a method unknown to them. 

A filing by Frederick Health was filed with the US Department of Health and Human Services on March 28 the confirming that 934,326 individuals were affected by the cybersecurity breach. As reported by the Maryland-based healthcare organisation, the incident occurred on January 27, and it was a result of a ransomware attack that disrupted its computer infrastructure and contributed to the breach of sensitive information. 

It is still unclear how much information was compromised, but affected entities are still engaged in assessment and coordination of response efforts in compliance with federal laws regarding data protection, to find out the extent of the damage done. In the investigation that followed, it became evident that the attackers had gained access to a file-sharing server, which gave them access to various sensitive documents. This data varied from individual to individual, but included a mix of information that can be identified as identifying and data that can be protected by law. 

An attack on the network resulted in hackers obtaining patient names, addresses, birthdays, Social Security numbers, and driver's license information. Additionally, health-related information such as medical records, insurance policy information, and clinical care details was also snipped during the breach. 

There has been no public claim of responsibility for this breach at this point, and the stolen data has not yet been made available on dark web forums or marketplaces, making it possible to speculate that Frederick Health complied with a ransom demand to prevent the data from becoming public. Several steps have been taken by Frederick Health, which employs approximately 4,000 people and operates over 25 facilities, to minimise the negative impact of this security breach on its employees and facilities. 

In response to the incident, the organisation has offered complimentary credit monitoring and identity theft protection services through IDX to individuals who have been affected as part of its response. There were no official comments available, as no official commentary has yet been provided, because trying to contact a spokesperson for Frederick Health was unsuccessful at the time of reporting. 

The incident follows a growing trend in recent years of major data breaches in the healthcare sector. Recently, Blue Shield of California released a surprise announcement that they had been inadvertently exposed to 4.7 million members' protected health information by Google's analytics and advertising tools in the course of a breach announced earlier in the week. 

According to a recent report by Yale New Haven Health System (YNHHS), cybercriminals have gained access to the personal data of approximately 5.5 million patients as a result of an unrelated cyberattack. As a result of these events, the healthcare industry is facing increasingly escalating cybersecurity threats and their resulting consequences. 

Frederick Health was the victim of a ransomware attack in which no threat actor has officially claimed responsibility for the cyberattack, and it is not clear whether a ransom was ultimately paid in response to the cyberattack. As of late March, Frederick Health began sending individual notification letters to those affected, as well as offering complimentary credit monitoring and identity theft protection services to those affected by the disease. 

Upon learning of the breach, the organisation stated that it had since strengthened its cybersecurity infrastructure to protect data and increase monitoring for potential unauthorised access in response to the breach. Frederick Health Medical Group has been slammed in the wake of the breach after at least five class action lawsuits were filed. According to the allegations in the complaint, the organisation failed to implement adequate cybersecurity measures by industry standards, resulting in a significant risk of exposed patient data. 

Aside from this, plaintiffs have argued that the breach notification letters failed to provide adequate transparency, omitting details such as the type of data involved and the specific steps taken to prevent future incidents from being repeated. It was filed by Frederick Health patients Ernest Farkas, Joseph Kingsman, Jaquelyn Chaillet, James Shoemaker, Wesley Kibler, and Jennifer McCreary to bring this action against Frederick Health.

In the lawsuits, it is claimed that a breach in confidentiality has resulted in an ongoing and increased risk of identity theft and financial fraud, as well as additional personal financial burdens that were incurred as a result of efforts to mitigate the impact. A jury trial would supposedly be the best thing that could be done if the plaintiffs could prove negligence on the part of the healthcare provider, which may result in damages, attorney's fees, and punitive measures. 

Taking into account the Frederick Health data breach, it's important to note that it signifies a stark reminder of the growing cybersecurity vulnerabilities facing the healthcare sector-an industry that becomes increasingly reliant on the interconnected digital networks to provide necessary healthcare. Despite the fact that threat actors are continuously evolving their methods of attack, healthcare providers are required to take steps to protect sensitive patient information by adopting advanced security protocols, regularly auditing their systems, and implementing robust incident response strategies. 

In addition to the technical disruptions, such breaches may also affect patient trust, operational integrity and legal liability beyond the technical disruptions they cause. As a result of this incident, patients are reminded that it is important to exercise vigilance — monitoring credit reports, brokerage accounts, and insurance statements for unusual activity, as well as making use of identity protection services when available. 

There is also a responsibility that rests with legislators and regulators to determine whether existing cybersecurity regulations are adequate for creating a safe and secure environment, given the high-risk environment in which healthcare organizations operate today. 

There is no doubt that the Frederick Health case highlights the urgent need for an effective and proactive infrastructure for cybersecurity, one that is capable of not only responding to breaches, but also anticipating and neutralizing them prior to a breach having wide-ranging consequences.

Michigan's Largest Healthcare Facility Confirms Ransomware Attack

 

One of Michigan's top healthcare systems acknowledged that it is dealing with a ransomware attack after a notorious hacking group boasted about the incident.

A McLaren HealthCare representative stated that the organisation had discovered unusual behaviour on its computer network and started investigation right away.

“Based on our investigation, we have determined that we experienced a ransomware event. We are investigating reports that some of our data may be available on the dark web and will notify individuals whose information was impacted, if any, as soon as possible,” a spokesperson stated. 

McLaren runs 13 hospitals in Michigan, as well as infusion centres, cancer centres, primary and specialised care offices and a clinical laboratory network. The company employs over 28,000 people and has a totally owned medical malpractice insurance company. 

The company reported issues affecting billing and electronic health record systems earlier this month. According to the Detroit Free Press, McLaren was forced to shut down the computer network at 14 different locations, a situation that became so dire that staff were forced to communicate via personal phones. 

McLaren has “retained leading global cybersecurity specialists to assist in our investigation, and we have been in touch with law enforcement. We have also taken measures to further strengthen our cybersecurity posture with a focus on securing our systems and limiting disruption to our patients and the communities we serve,” the spokesperson said. 

The spokesperson added that systems "remain operational," but did not answer questions about whether billing and record systems were operational again. They did not specify whether or not a ransom would be paid. 

The Black Cat/AlphV ransomware gang claimed responsibility for the attack in a last Friday morning post on their leak site. 

The group, who initially did not name the organisation before adding McLaren's name hours later, claimed to have acquired 6 TB of data, which allegedly included millions of people's personal information as well as videos of the hospitals' operations.

The Michigan Department of Emergency Management and Homeland Security, as well as the governor's office, did not reply to queries for comment on whether the corporation was receiving expertise. 

BlackCat has made a practise of going after healthcare facilities, triggering outrage earlier this year when it attempted to extort a Pennsylvania hospital network by posting images of breast cancer patients. It claimed responsibility for an attack on NextGen Healthcare, a technology company, in January. 

The group grabbed headlines worldwide two weeks ago when it attacked MGM Resorts, damaging six major Las Vegas casinos and paralysing slot machines, ATMs, and other machinery. 

The attack on McLaren comes just one month after another major U.S. hospital network was targeted by ransomware hackers. This week, the epidemic of ransomware attacks on hospitals reached Congress. House members held a hearing on the matter and heard testimony from various people who had battled hackers. 

One of Vermont's leading healthcare organisations' president, Stephen Leffler, spoke to Congress on his experience dealing with a 2020 ransomware assault and cautioned that even with their extensive security measures, they were still affected. 

“This really is an arms race. As we have all seen in the news over the past few 3 years, the cybercriminals and actors are getting increasingly sophisticated, and so this important work to protect our systems will never be fully finished,” Leffler stated.

LockBit Attack: Ransomware Gang Threatens to Leak Cancer Patients’ Medical Data


LockBit ransomware group recently revealed its intent to leak private medical data of cancer patients, stolen in the breach on Varian Medical Systems.

Varian, a subsidiary of Siemens Healthineeres, provides software for the oncology department's applications and specializes in offering therapeutic and diagnostic oncology services. The California-based corporation has more than 10,000 employees as of 2021 and had an annual profit of £269 million. 

While it is still unclear how LockBit got access to Varian's systems or how much data was stolen, the ransomware gang warned readers of its "victim blog" that if the company did not meet their demands within two weeks, soon, its private databases and patient medical data would be made public. Apparently, Varian has until 17 August to meet the negotiation demands in order to restore their stolen data, if they wish to avoid ‘all databases and patient data’ from being exposed in LockBit’s blog. 

The attack is most likely to be a part of ‘triple extortion,’ a strategy usually used by ransomware actors. The strategy involves a three-part attack on an organization that starts with the theft of data that appears to be sensitive before it is encrypted. The corporate victim of the breach can only get their data back and keep it private if they pay a ransom, following which they will receive – in theory – a decryption key from the hackers. 

In regards to the breach, Siemens Healthineers – Varian’s parent company confirmed that an internal investigation is ongoing. However, they did not provide any further details of the breach. 

“Siemens Healthineers is aware that a segment of our business is allegedly affected by the Lockbit ransomware group[…]Cybersecurity is of utmost importance to Siemens Healthineers, and we are making every effort to continually improve our security and data privacy,” said a spokesperson.

Growing Cases of LockBit

Recent months have witnessed a good many cyberattacks conducted by LockBit against some major companies. According to a report by the US Cybersecurity and Infrastructure Security Agency, in the first quarter of 2023, the ransomware gang has already targeted 1,653 companies. They frequently repurposed freeware and open-source tools for use in network reconnaissance, remote access, tunnelling, credential dumping, and file exfiltration. 

Some examples of the LockBit hit companies would be their recent campaign against the port of Nagoya, which ossified supply chains for Japanese automobile company Toyota, and SpaceX in which the ransomware gang claims to have led to a haul of 3,000 proprietary schematics, and an attempt to extort $70 million from Taiwanese chip maker TSMC.  

NextGen Data Breach, Personal Data of 1.5M Patients Hacked



NextGen Healthcare, the US-based electronic health record company, has recently revealed that their firm has suffered a breach in its systems, where hackers ended up stealing the personal data of more than one million patients, including roughly 4,000 individuals from Maine. 

NextGen Healthcare claimed in a letter to those impacted that hackers stole the names, birthdates, addresses, and Social Security numbers of patients.

"Security, in all its forms, is a top priority for NextGen Healthcare. When we learned of the incident, we took steps to investigate and remediate, including working together with leading outside cybersecurity experts and notifying law enforcement. The individuals known to be impacted by this incident were notified on April 28, 2023, and we have offered them 24 months of free fraud detection and identity theft protection," company spokesperson Tami Andrade stated.

In regards to the information compromised in the data breach, the company confirms that their “investigation has revealed no evidence of any access or impact to any of your health or medical records or any health or medical data.” However, on being asked if the company has any means, such as records, to ascertain what data has been exfiltrated, Andrade declined to respond.

While reporting the issue to the Maine attorney general’s office, the firm noted that it was alerted of the suspicious activities on March 30. They further discovered that hackers had gained access to its networks between March 29 and April 14, 2023. According to the notification, the attackers used client credentials that "appear to have been stolen from other sources or incidents unrelated to NextGen" to log into its NextGen Office system, a cloud-based EHR and practice management solution.

Prior to this incident, in January, NextGen had witnessed a ransomware attack, reportedly conducted by the ALPHV ransomware gang (also known as BlackCat). Fragments of data stolen in the attack, such as employee names, addresses, phone numbers, and passport scans were apparently seen listed on ALPHV’s dark web leak site.  

US Healthcare Startup Brightline Impacted by Fortra GoAnywhere Assaults

 

A firm providing virtual mental health services for children is the latest victim of Fortra's widespread ransomware onslaught, which has spread its effects even further. 

The American healthcare behemoth Blue Shield of California confirmed that data from one of its providers, Brightline, that was housed in its GoAnywhere file transfer platform had been taken in a data breach notice filed with the Maine attorney general's office. Threat analysts identified Brightline as a potential victim of the mass breach last week. It offers online coaching and therapy for kids. 

The breach notification verified that hackers—perhaps members of the Russia-linked Clop ransomware gang who claimed to have infiltrated over a hundred businesses via an unreported security flaw—accessed and possibly exfiltrated the personal information of over 63,000 patients. 

The group has announced that they will release the data taken from Brightline "soon" on Clop's dark web leak site, which they use to expose the stolen material absent payment of a ransom.

On its website or on social media, Brightline has not yet made the breach publicly acknowledged. John O'Connor, a representative for Brightline, declined to comment on TechCrunch's inquiries, although he did not deny that the hack has a 63,000 person impact. The number of young Brightline customers who are impacted is unknown. 

According to Blue Shield's breach report, the patient names, addresses, dates of birth, gender, Blue Shield subscriber ID numbers, phone numbers, e-mail addresses, plan names, and plan group numbers were all compromised. 

Nevertheless, Brightline is not the only healthcare provider among the 130 firms being affected by the Clop group. US Wellness, a provider of corporate health and wellness initiatives, also acknowledged that hackers had gained access to user personal information including names, addresses, dates of birth, and member ID numbers. 

Because of the severity of the Fortra vulnerability's effects on healthcare institutions, the U.S. government's health sector cybersecurity coordination centre, or HC3, issued a warning in February to help companies prepare for Clop's attacks. 

The City of Toronto, Investissement Québec, and Virgin Red are among the ever-expanding list of victims the group is known to have targeted outside of healthcare institutions. 

Virgin Red was contacted by Clop and, according to Jodie Burton, learnt that hackers had "illegally gotten some Virgin Red files via a cyber-attack on our provider, GoAnywhere." Although Fortra had promised them that their data was secure, TechCrunch has heard from other victims who, like them, only discovered that data had been taken after receiving a ransom demand.

Ransomware Attacks on U.S. Hospitals Causing Deaths

Every day we are witnessing ransomware attacks, and companies worldwide are investing millions to protect their network and systems from digital attacks, however, it is getting increasingly challenging to fight against cyber threats because cyber attackers do not only use traditional methods, they are also inventing advance technologies to fortify their attacks.

Hospitals and clinics are a top target of malicious attackers since reports suggest that the annual number of ransomware attacks against U.S. hospitals has virtually doubled from 2016 to 2021 and is likely to rise in the future given its pace, according to what JAMA Health Forum said in its recent research. 

As per the report, the security breaches exploited the sensitive information of an estimated 42 million patients. “It does seem like ransomware actors have recognized that health care is a sector that has a lot of money and they're willing to pay up to try to resume health care delivery, so it seems to be an area that they're targeting more and more,” lead researcher Hannah Neprash said. 

JAMA Health Forum conducted research over five years on U.S. medical facilities, in which they have discovered that the attackers exposed a large volume of personal health data over time and in coming years the attacks will increase by large.

According to Neprash’s database, clinics were targeted in 58% of attacks, followed by hospitals (22%), outpatient surgical centers (15%), mental health facilities (14%), and dental offices (12%). 

Threat actors exploit open security vulnerabilities by infecting a PC or a network with a phishing attack, or malicious websites and asking for a ransom to be paid. Unlike other cyber attacks, the goal of malicious actors, here, is to disrupt operations rather than to steal data. 

However, it becomes a great threat because it can jeopardize patient outcomes when health organizations are targeted. 

In 2019, a baby died during a ransomware attack at Springhill Medical Center in Mobile, Ala. As per the data, 44% of the attacks disrupted care delivery, sometimes by more than a month. 

“We found that along a number of dimensions, ransomware attacks are getting more severe. It's not a good news story. This is a scary thing for health care providers and patients,” Neprash added. 

Ponemon Institute, an information technology research group published its report in September 2021, in which they found out that one out of four healthcare delivery organizations reported that ransomware attacks are responsible for an increase in deaths. 

“Health care organizations need to think about and drill on — that is practice — these back-up processes and systems, the old-school ways of getting out information and communicating with each other. Unfortunately, that cyber event will happen at one point or another and it will be chaos unless there is a plan,” said Lee Kim, senior principal of cybersecurity and privacy with the Healthcare Information and Management Systems Society, in Chicago.

 NHS 111 Cyberattack may Harm Patients Privacy



On Thursday, the software firm Advanced, which supplies patient data to numerous trusts and the majority of NHS 111 providers in England, suffered a cyber attack. Several NHS systems, notably Carenotes, which is used to store patient records, experienced an outage that affected mental health and community services across the nation.

Carenotes have not yet been restored 22 days after the outage. On August 17, a hospital in Birmingham informed its staff that restoration might take an additional five weeks. The experts said that if Carenotes is back up, it will likely take two weeks for every day under current predictions, indicating that full recovery might take longer than a year. 

After Carenotes went down, patients' safety concerns about mental health and community trust workers not being able to access their records were raised. According to experts, there have already been instances where staff members have been unable to access patient records, resulting in patients not receiving the proper dosage of their medications.

The staff is also at ris; when you step outside, you never know who might be in danger. Authorities claimed that you cannot create reports for the court based on the Mental Health Act. Last Monday, the staff at Birmingham Children's Hospital, which manages children's mental health services, was informed that the problem might not be solved for additional five weeks.

Hackers are requesting money in exchange for not disclosing private information, leaving the NHS without access to essential services in the interim. The hackers stole GP notes and patient data.

As part of its winterization efforts, the NHS recently stated it would increase the number of call takers to 111. "Politicians and NHS England need to recognize that mental health trusts are working with complicated and high-risk patients, who have a higher risk of mortality," one physician in the east of England said.

The Advanced Carenotes EPR program, which contains mental health records, was also hacked by criminals. Staff members are currently in a very desperate situation, according to the affected mental health trusts, since they are still unable to access crucial patient details.