The Biggest Healthcare Data Breaches of 2025—Explained Through Real-World Scenarios

Check out the new compliance progress tracker


Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

The Biggest Healthcare Data Breaches of 2025—Explained Through Real-World Scenarios

Kevin Henry

Data Breaches

April 22, 2025

7 minutes read
Share this article
The Biggest Healthcare Data Breaches of 2025—Explained Through Real-World Scenarios

UnitedHealth Change Healthcare Breach

What happened and why it matters

In 2025, UnitedHealth confirmed the Change Healthcare ransomware attack ultimately touched about 190 million Americans—the largest U.S. medical data exposure on record. Though the intrusion began in February 2024, the full scope, prolonged disruption, and ongoing data exfiltration fallout dominated 2025, straining pharmacies, billing, and care coordination nationwide. ([reuters.com](https://www.reuters.com/business/healthcare-pharmaceuticals/unitedhealth-confirms-190-million-americans-affected-by-hack-tech-unit-2025-01-24/?utm_source=openai))

Attackers initially gained unauthorized network access using a stolen credential on a portal without multi-factor authentication, then moved laterally to steal and encrypt data—a textbook ransomware attack with large-scale data exfiltration. UnitedHealth later acknowledged paying a $22 million ransom, underscoring how payment rarely guarantees data deletion. ([reuters.com](https://www.reuters.com/technology/cybersecurity/unitedhealth-hackers-took-advantage-citrix-vulnerabilty-break-ceo-says-2024-04-29/?utm_source=openai))

What data was exposed

  • Personal health information (PHI): diagnoses, treatments, test results, and care details; plus health insurance identifiers and, in many cases, Social Security numbers. ([reuters.com](https://www.reuters.com/business/healthcare-pharmaceuticals/unitedhealth-confirms-190-million-americans-affected-by-hack-tech-unit-2025-01-24/?utm_source=openai))

Incident response and lessons

UnitedHealth issued mass notifications, offered credit monitoring, rebuilt affected systems, and coordinated with federal investigators. For healthcare cybersecurity, the breach reinforces MFA everywhere, strict identity controls, segmentation, and rapid incident response to limit data exfiltration and service disruption. ([apnews.com](https://apnews.com/article/9e2fff70ce4f93566043210bdd347a1f?utm_source=openai))

Real-world scenario

You attempt to fill a prescription and learn the claims network is down. Weeks later, you receive a notice that your PHI and possibly your Social Security number were involved and that identity protection is available. ([reuters.com](https://www.reuters.com/business/healthcare-pharmaceuticals/unitedhealth-confirms-190-million-americans-affected-by-hack-tech-unit-2025-01-24/?utm_source=openai))

Yale New Haven Health System Exposure

What happened and why it matters

On March 8, 2025, Yale New Haven Health detected unusual activity and confirmed an unauthorized third party copied data. The system’s electronic medical record was not accessed, but the network server exposure affected more than 5.5 million people, making it one of 2025’s biggest U.S. health breaches. ([ynhhs.org](https://www.ynhhs.org/news/yale-new-haven-health-notifies-patients-of-data-security-incident?utm_source=openai))

What data was exposed

  • Names, contact details, dates of birth, race/ethnicity, patient type, medical record numbers; in some cases, Social Security numbers. ([ynhhs.org](https://www.ynhhs.org/news/yale-new-haven-health-notifies-patients-of-data-security-incident?utm_source=openai))

Incident response and lessons

YNHHS mailed notices, set up a call center, and offered credit monitoring where a Social Security number compromise was possible. In late 2025, an $18 million settlement process began, reflecting the long tail of notification and remediation. ([ynhhs.org](https://www.ynhhs.org/news/yale-new-haven-health-notifies-patients-of-data-security-incident?utm_source=openai))

Real-world scenario

You receive a letter explaining that although care was not disrupted, your demographic details and identifiers may have been copied. You’re offered credit monitoring and guidance on fraud alerts. ([ynhhs.org](https://www.ynhhs.org/news/yale-new-haven-health-notifies-patients-of-data-security-incident?utm_source=openai))

Episource Ransomware Incident

What happened and why it matters

Episource—a business associate serving multiple providers—confirmed a ransomware attack with unauthorized access between January 27 and February 6, 2025. Because business associates centralize data for many clients, the incident rippled across health systems. ([sharp.com](https://www.sharp.com/episource-data-breach?utm_source=openai))

What data was exposed

  • PHI including names, dates of birth, health insurance details, medical information (diagnoses, prescriptions, treatment), and Social Security numbers for some. Total affected individuals reported around 5.4 million. ([prnewswire.com](https://www.prnewswire.com/news-releases/privacy-alert-episource-under-investigation-for-data-breach-of-5-4-million-customer-records-302488696.html?utm_source=openai))

Incident response and lessons

Episource disabled affected applications, engaged forensics, notified law enforcement, and began coordinated notifications through its clients. Key lesson: vet vendor security rigorously and require incident response and data exfiltration controls in contracts. ([sharp.com](https://www.sharp.com/episource-data-breach?utm_source=openai))

Real-world scenario

Your clinic wasn’t hacked directly, yet you receive a notice because a contractor managing your risk-adjustment data suffered a breach with data exfiltration. ([sharp.com](https://www.sharp.com/episource-data-breach?utm_source=openai))

DaVita Kidney Dialysis Attack

What happened and why it matters

DaVita disclosed a ransomware attack identified April 12, 2025, that encrypted portions of its network and impacted a labs database. Ultimately, 2.7 million individuals were affected; the event drove notable remediation costs and highlighted clinical-lab dependencies in dialysis care. ([cybernews.com](https://cybernews.com/security/davita-discloses-ransomware-attack-activities-disrupted/?utm_source=openai))

What data was exposed

  • Demographics, health insurance data, clinical information including certain dialysis lab results; in some cases, Social Security numbers and limited tax-related data. The Interlock group claimed massive data theft. ([hipaajournal.com](https://www.hipaajournal.com/davita-ransomware-attack/?utm_source=openai))

Incident response and lessons

DaVita isolated systems, maintained patient treatments, notified individuals, and offered identity protection. Post-incident, it strengthened monitoring and system controls—illustrating that mission-critical providers need tested downtime procedures and segmented lab systems. ([hipaajournal.com](https://www.hipaajournal.com/davita-ransomware-attack/?utm_source=openai))

Real-world scenario

You continue dialysis, but lab results take longer to post. Later, you’re informed your PHI—from test results to identifiers—may have been accessed, with credit monitoring offered. ([reuters.com](https://www.reuters.com/business/healthcare-pharmaceuticals/ransomware-attack-davita-impacted-27-million-people-us-health-dept-website-shows-2025-08-21/?utm_source=openai))

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Clinical Diagnostics Nova Ransomware

What happened and why it matters

In the Netherlands, Clinical Diagnostics (part of Eurofins) was hit by Nova ransomware. Attackers exfiltrated data in early July 2025 and posted a sample on July 6, affecting national cervical cancer screening participants and other patients. Reports indicate an initial ransom payment, followed by a second demand after the lab engaged police—showing double-extortion leverage after data exfiltration. ([nltimes.nl](https://nltimes.nl/2025/08/13/hackers-say-dutch-lab-paid-ransom-stolen-data-laboratory-wont-confirm?utm_source=openai))

What data was exposed

  • Names, addresses, dates of birth, citizen service numbers (BSN), and medical test results for at least 485,000 women in screening, plus tens of thousands of other patients. ([nltimes.nl](https://nltimes.nl/2025/08/13/hackers-say-dutch-lab-paid-ransom-stolen-data-laboratory-wont-confirm?utm_source=openai))

Incident response and lessons

Authorities and national screening bodies coordinated notification and investigation. The case shows why incident response must anticipate second-stage extortion—even after ransom—and why public-health programs need hardened vendor controls and rapid communications. ([nltimes.nl](https://nltimes.nl/2025/08/18/hackers-threatening-leak-data-stolen-dutch-laboratory?utm_source=openai))

Real-world scenario

A patient in a screening program learns sensitive results could be exposed online, illustrating how ransomware attacks can create lasting privacy harm beyond immediate care disruptions. ([nltimes.nl](https://nltimes.nl/2025/08/13/hackers-say-dutch-lab-paid-ransom-stolen-data-laboratory-wont-confirm?utm_source=openai))

Asahi Qilin Cyberattack

What happened and why it matters

In September–October 2025, the Qilin ransomware group attacked Asahi Group Holdings in Japan, exposing data and disrupting production. While Asahi is not a healthcare provider, Qilin also targeted healthcare organizations in 2025; the incident illustrates the same RaaS tactics used against medical targets and the cross-sector risks that spill into health supply chains. ([reuters.com](https://www.reuters.com/world/asia-pacific/cybercriminals-claim-hack-japans-asahi-group-2025-10-07/?utm_source=openai))

Key tactics observed

  • Unauthorized network access, encryption, and claims of data exfiltration totaling about 27 GB; public proof posts and extortion countdowns typical of Qilin’s playbook. ([reuters.com](https://www.reuters.com/world/asia-pacific/cybercriminals-claim-hack-japans-asahi-group-2025-10-07/?utm_source=openai))

Why healthcare should care

Qilin’s 2025 activity included attacks on medical organizations (e.g., Utsunomiya Central Clinic), underscoring the need for sector-wide defenses against ransomware attack patterns that traverse industries. ([theregister.com](https://www.theregister.com/2025/03/05/qilin_ransomware_credit/?utm_source=openai))

Oracle Cerner Patient Data Theft

What happened and why it matters

Oracle Health (formerly Cerner) disclosed that an unauthorized party accessed legacy Cerner systems as early as January 22, 2025, stealing patient data kept on older servers. The FBI opened an investigation, and multiple U.S. hospitals later notified patients of exposure tied to Oracle’s platform. Third‑party platform incidents like this can ripple across many providers at once. ([reuters.com](https://www.reuters.com/technology/fbi-investigating-cyberattack-oracle-bloomberg-news-reports-2025-03-28/?utm_source=openai))

What data was exposed

  • Per affected providers, data may include names, medical record numbers, diagnoses, medications, test results, images, treatment details, and in some instances Social Security numbers. ([lifebridgehealth.org](https://www.lifebridgehealth.org/news/notice-oracle-healthcerner-security-incident?utm_source=openai))

Incident response and lessons

Oracle engaged federal law enforcement and cybersecurity firms; providers sent notices and offered credit/identity monitoring. Lesson: legacy environments and vendor platforms require continuous hardening, credential hygiene, and proactive monitoring for unauthorized network access. ([reuters.com](https://www.reuters.com/technology/cybersecurity/oracle-tells-clients-second-recent-hack-log-in-data-stolen-bloomberg-news-2025-04-02/?utm_source=openai))

What this means for healthcare cybersecurity

Across these cases, common threads include credential compromise, inadequate MFA, data exfiltration before encryption, and third‑party risk. Build layered defenses (MFA, identity controls, segmentation), contract for rapid incident response, and practice tabletop exercises that include vendor and supply‑chain scenarios. ([apnews.com](https://apnews.com/article/9e2fff70ce4f93566043210bdd347a1f?utm_source=openai))

FAQs.

What caused the biggest healthcare data breaches of 2025?

Most incidents began with unauthorized network access via stolen or weak credentials, often without multifactor authentication, followed by data exfiltration and ransomware encryption. Supply‑chain and vendor platforms amplified impact when a single compromise touched many providers. Examples include Change Healthcare’s MFA gap, Episource’s ransomware window, and Oracle Health’s legacy‑system access. ([apnews.com](https://apnews.com/article/9e2fff70ce4f93566043210bdd347a1f?utm_source=openai))

How were patient records protected after these breaches?

Organizations issued notices, offered credit monitoring/identity protection, stood up call centers, rebuilt or segmented systems, and worked with law enforcement and regulators. Yale New Haven and DaVita offered identity services, and affected Oracle Health customers notified patients with two‑year monitoring. ([ynhhs.org](https://www.ynhhs.org/news/yale-new-haven-health-notifies-patients-of-data-security-incident?utm_source=openai))

What ransomware groups targeted healthcare organizations in 2025?

Key actors included Interlock (DaVita), Nova (Clinical Diagnostics), Qilin (e.g., Utsunomiya Central Clinic), and Medusa (multiple U.S. providers). 2025 also saw continued fallout from ALPHV/BlackCat’s Change Healthcare attack disclosed earlier but still driving notifications and risk into 2025. ([hipaajournal.com](https://www.hipaajournal.com/davita-ransomware-attack/?utm_source=openai))

How can healthcare providers prevent similar data breaches?

Prioritize phishing‑resistant MFA everywhere, least‑privilege access, continuous monitoring of authentication logs, rapid credential rotation, segmentation of clinical and admin systems, and tested incident response across vendors. Follow CISA‑aligned guidance to reset affected credentials, replace hardcoded secrets, and monitor for anomalous access in identity and cloud systems. ([americanbar.org](https://www.americanbar.org/groups/health_law/news/2025/4/oracle-cloud-breaches-lead-to-cisa-guidance-lawsuits/?utm_source=openai))

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles