Skip to main content
Mallory

Healthcare Provider Data Breaches and Ransomware-Linked Patient Data Exposure

healthcare-sector-threatbreach-disclosure-notificationmass-credential-exposuredata-exfiltration-methodransomware-group-operation
Updated March 21, 2026 at 02:17 PM5 sources
Share:
Healthcare Provider Data Breaches and Ransomware-Linked Patient Data Exposure

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Multiple U.S. healthcare organizations reported unauthorized network access and patient data exposure, with several incidents involving confirmed data exfiltration and follow-on notification/credit-monitoring actions. QualDerm Partners disclosed unauthorized access between Dec. 23–24, 2025 with files exfiltrated and notifications being sent on a rolling basis, while Carolina Foot & Ankle Associates reported a Dec. 2025 intrusion detected after a network disruption and confirmed exfiltration of files containing PHI (e.g., demographics, MRNs, insurance data, and treatment/billing codes). Additional breach disclosures included Cedar Point Health (intrusion detected around June 16, 2025, with a months-long data review concluding in late Jan. 2026 and impacted data potentially including SSNs/ITINs and government IDs) alongside separate notifications from Wee Care Pediatrics and Easterseals Northeast Indiana.

Legal and regulatory consequences continued to surface from earlier healthcare incidents. Asheville Eye Associates agreed to settle consolidated class-action litigation tied to a Nov. 2024 attack claimed by DragonForce ransomware, which allegedly exfiltrated ~540 GB before encrypting systems and later leaked data when ransom was not paid; the breach was reported to HHS OCR as affecting 204,984 individuals. Sector-wide reporting also indicated 46 large healthcare breaches logged for Jan. 2026 on the HHS OCR portal (500+ individuals), exposing ~1.44 million individuals’ PHI, amid discussion that late-2025 reporting backlogs may have influenced recent month-to-month trends.

Timeline

  1. Feb 27, 2026

    Asheville Eye Associates agrees to class action settlement

    By February 27, 2026, Asheville Eye Associates had agreed to settle litigation stemming from its November 2024 ransomware attack. The proposed settlement provides reimbursement for certain losses, identity theft protection, and other benefits while the company denies wrongdoing.

  2. Feb 26, 2026

    Carolina Foot & Ankle reports breach to HHS OCR

    By late February 2026, Carolina Foot & Ankle Associates had reported the December 2025 incident to HHS OCR using a placeholder estimate of at least 501 affected individuals. The practice also offered credit monitoring and notified law enforcement.

  3. Feb 25, 2026

    Inc Ransom claims Easterseals Northeast Indiana attack

    By February 2026, the Inc Ransom group claimed responsibility for the Easterseals Northeast Indiana incident, alleging it stole 405 GB of data. The public claim aligned with the provider's description of the event as ransomware-related.

  4. Feb 25, 2026

    Texas AG filing says 174,837 Texans affected in QualDerm breach

    QualDerm informed the Texas Attorney General that 174,837 Texas residents were affected by the breach. The filing suggested the total impact may be larger across the 17 states where QualDerm supports practices.

  5. Feb 25, 2026

    QualDerm begins rolling notifications to affected individuals

    By February 2026, QualDerm Partners was sending notification letters on a rolling basis while continuing to review the impacted data. The company also offered complimentary credit monitoring and identity theft protection.

  6. Jan 31, 2026

    HHS OCR records 46 large healthcare breaches in January 2026

    During January 2026, the HHS Office for Civil Rights breach portal logged 46 healthcare breaches affecting 500 or more individuals. Those incidents exposed or impermissibly disclosed PHI for 1,441,182 people.

  7. Jan 27, 2026

    Cedar Point Health completes data impact analysis

    On January 27, 2026, Cedar Point Health completed its review of the compromised data. The analysis found extensive identifiers and health and financial information were exposed.

  8. Dec 24, 2025

    QualDerm Partners detects suspicious activity

    On December 24, 2025, QualDerm Partners detected suspicious activity on its computer network. The company engaged third-party cybersecurity experts to investigate the incident.

  9. Dec 23, 2025

    QualDerm Partners unauthorized access and exfiltration occur

    QualDerm Partners later determined an unauthorized party accessed its network and exfiltrated sensitive files between December 23 and December 24, 2025. Potentially exposed data included personal, medical, insurance, and for some individuals government-issued ID information.

  10. Dec 20, 2025

    New Age Dermatology identifies ransomware attack

    Around December 20, 2025, New Age Dermatology identified a ransomware attack that rendered an internal server inoperable. The organization said patient-record data may have been exposed, though the full scope was still under review.

  11. Dec 15, 2025

    Wee Care Pediatrics identifies suspicious activity

    Around December 15, 2025, Wee Care Pediatrics discovered suspicious activity and later confirmed unauthorized access to its network. Potentially exposed data included PHI, Social Security numbers, and insurance and government program details.

  12. Dec 8, 2025

    Marin Cancer Care detects intrusion

    Marin Cancer Care detected suspicious activity around December 8, 2025. The provider later determined the incident may have exposed patient information.

  13. Dec 8, 2025

    Carolina Foot & Ankle Associates detects cyberattack

    On December 8, 2025, Carolina Foot & Ankle Associates detected a network disruption. An investigation found an unauthorized party accessed its network and exfiltrated files containing patient information.

  14. Dec 6, 2025

    Marin Cancer Care intrusion window ends

    Marin Cancer Care determined the unauthorized access to its systems continued until December 6, 2025. Its investigation and review of affected files remained ongoing afterward.

  15. Nov 22, 2025

    Marin Cancer Care unauthorized access window begins

    Marin Cancer Care later determined an unauthorized party had access to its environment beginning November 22, 2025. Patient files may have been viewed or acquired during the intrusion.

  16. Nov 10, 2025

    Easterseals Northeast Indiana confirms data theft

    On November 10, 2025, Easterseals Northeast Indiana confirmed that data had been exfiltrated. Exposed information included protected health information and Social Security numbers.

  17. Sep 4, 2025

    Easterseals Northeast Indiana detects suspicious activity

    Easterseals Northeast Indiana identified suspicious activity on its network on September 4, 2025. A later investigation found patient data was stolen in an incident described as consistent with ransomware.

  18. Jun 16, 2025

    Cedar Point Health network intrusion begins

    Cedar Point Health detected unauthorized access to its network around June 16, 2025. The incident exposed patient data, including health, financial, and identity information.

  19. Nov 1, 2024

    Asheville Eye Associates hit by DragonForce ransomware attack

    In November 2024, Asheville Eye Associates suffered a ransomware attack and data breach. DragonForce later claimed it exfiltrated 540 GB of data before encrypting systems and leaked the data after no ransom was paid.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Healthcare Data Breach and Ransomware Incident Roundup

Healthcare Data Breach and Ransomware Incident Roundup

Several healthcare-related organizations disclosed **separate data breach incidents** involving ransomware, unauthorized network access, and third-party compromise. CommonSpirit Health said patient data was exposed through a downstream vendor chain after **Pinnacle Holdings Ltd** suffered a ransomware attack, with attackers present in the network from November 11 to November 25, 2024, and exfiltrating files before the incident was later relayed through **NorthGauge Healthcare Advisors**. Meadowlark Hills and MedPeds also disclosed breaches tied to the **Beast ransomware** group, while Tieu Dental reported unauthorized access to its network in July 2025 that exposed patient information including Social Security numbers, medical and insurance data. These incidents led to regulatory notifications and offers of credit monitoring or identity theft protection for affected individuals. A separate legal development involved **Geisinger Health** and **Nuance Communications**, where a judge approved a **$5 million settlement** over claims tied to a former Nuance employee's theft of medical records affecting about 1.3 million patients. That matter differs from the ransomware and breach notifications because it concerns civil litigation over an earlier insider data theft rather than a newly disclosed intrusion. Overall, the reporting reflects ongoing exposure of protected health information across the healthcare sector through both direct attacks and third-party relationships, with delayed notification timelines and incomplete early visibility into the full scope of compromised data remaining recurring issues.

2 weeks ago
Delayed patient notifications following healthcare data breaches at providers and vendors

Delayed patient notifications following healthcare data breaches at providers and vendors

Multiple healthcare organizations and vendors reported **delayed patient notifications** after discovering unauthorized access to protected health information (PHI), in some cases more than a year after the underlying compromise. In Colorado, **Alpine Ear, Nose, and Throat (Alpine ENT)** notified **65,648** individuals that an attacker accessed and exfiltrated files containing PHI in an incident identified on **Nov. 19, 2024**; the **BianLian** ransomware group later claimed responsibility and posted the organization to its leak site. Exposed data was described as highly sensitive, including medical information and, for some individuals, **financial account data and payment card details** (including CVC/expiration) and **Social Security numbers**; Alpine ENT reported no confirmed identity theft at the time of notification and offered credit monitoring. Separately, **Bayada Home Health Care** disclosed exposure risk tied to a **third-party vendor (Doctor Alliance)** after Doctor Alliance reported unauthorized network access during **Oct.–Nov. 2025**, potentially affecting Home Health Certification and Plan of Care forms containing patient identifiers and clinical/insurance details (and **SSNs for a subset**). Bayada said it discontinued using Doctor Alliance and reported the matter to regulators. In another vendor-related incident, **TriZetto Provider Solutions (Cognizant)**—an insurance verification provider—suffered a cyberattack impacting PHI across multiple states; Oregon providers began notifying additional patients after the breach was reported as occurring in **Nov. 2024** but not discovered until **Oct. 2, 2025**, with no financial data reportedly compromised and no evidence of misuse so far; the incident has prompted **class-action lawsuits**, engagement of **Mandiant**, and law enforcement notification.

1 months ago
Healthcare Data Breaches and Patient Data Exposure Reports

Healthcare Data Breaches and Patient Data Exposure Reports

Multiple organizations reported or were alleged to have suffered **data breaches involving sensitive personal and health information**. Telehealth provider **Call-On-Doc** was allegedly breached in early December, with a hacking-forum listing claiming exfiltration of **1,144,223 patient records** including contact details and highly sensitive visit metadata (e.g., *medical category/condition*, including STD-related entries), though the company had not publicly commented at the time of reporting. Separately, **Laurel Health Centers** (a Federally Qualified Health Center network in Northern Pennsylvania) reported **unauthorized access to its email environment** from July 11–25, 2025; emails and attachments may have been viewed or copied, potentially exposing a wide range of PHI/PII (including SSNs, insurance/Medicare data, diagnostic/treatment information, and some financial data). Laurel stated it took time to confirm the threat actor was fully removed, completed mailbox review by Dec. 30, 2025, and then began notifying affected individuals and offering credit monitoring. Outside healthcare delivery, the **Civil Service Employees Association (CSEA)** labor union reported a May intrusion (May 3–31) resulting in theft of data for **47,000+ members**, including names and **Social Security numbers**, and said it took systems offline, reset passwords, and implemented additional security controls; it reported no evidence of misuse but advised vigilance for identity theft. A separate HIPAA Journal item summarized academic research on **insider risk**—finding many students would hypothetically sell patient data for money—which is not tied to a specific breach incident but underscores the broader threat environment for healthcare data.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Healthcare Provider Data Breaches and Ransomware-Linked Patient Data Exposure | Mallory