Skip to main content
Mallory
Back to intelligence
healthcare-sector-threatbreach-disclosure-notificationmass-credential-exposuredata-exfiltration-method

Healthcare Provider Data Breaches and Ransomware-Linked Patient Data Exposure

Updated 2mo agoFirst seen Feb 27, 20265 sources

Multiple U.S. healthcare organizations reported unauthorized network access and patient data exposure, with several incidents involving confirmed data exfiltration and follow-on notification/credit-monitoring actions. QualDerm Partners disclosed unauthorized access between Dec. 23–24, 2025 with files exfiltrated and notifications being sent on a rolling basis, while Carolina Foot & Ankle Associates reported a Dec. 2025 intrusion detected after a network disruption and confirmed exfiltration of files containing PHI (e.g., demographics, MRNs, insurance data, and treatment/billing codes). Additional breach disclosures included Cedar Point Health (intrusion detected around June 16, 2025, with a months-long data review concluding in late Jan. 2026 and impacted data potentially including SSNs/ITINs and government IDs) alongside separate notifications from Wee Care Pediatrics and Easterseals Northeast Indiana.

Legal and regulatory consequences continued to surface from earlier healthcare incidents. Asheville Eye Associates agreed to settle consolidated class-action litigation tied to a Nov. 2024 attack claimed by DragonForce ransomware, which allegedly exfiltrated ~540 GB before encrypting systems and later leaked data when ransom was not paid; the breach was reported to HHS OCR as affecting 204,984 individuals. Sector-wide reporting also indicated 46 large healthcare breaches logged for Jan. 2026 on the HHS OCR portal (500+ individuals), exposing ~1.44 million individuals’ PHI, amid discussion that late-2025 reporting backlogs may have influenced recent month-to-month trends.

Share:
Healthcare Provider Data Breaches and Ransomware-Linked Patient Data Exposure
Stay ahead

Get ahead of threats like this

Mallory correlates global threat intelligence with your attack surface — know if you’re exposed before adversaries strike.

EVENT TIMELINE

How this story unfolded

19 events from the most recent confirmed update back to the earliest known activity.

19 EVENTS
Feb 27, 20263mo ago

Asheville Eye Associates agrees to class action settlement

By February 27, 2026, Asheville Eye Associates had agreed to settle litigation stemming from its November 2024 ransomware attack. The proposed settlement provides reimbursement for certain losses, identity theft protection, and other benefits while the company denies wrongdoing.

Feb 26, 20263mo ago

Carolina Foot & Ankle reports breach to HHS OCR

By late February 2026, Carolina Foot & Ankle Associates had reported the December 2025 incident to HHS OCR using a placeholder estimate of at least 501 affected individuals. The practice also offered credit monitoring and notified law enforcement.

Feb 25, 20263mo ago

Inc Ransom claims Easterseals Northeast Indiana attack

By February 2026, the Inc Ransom group claimed responsibility for the Easterseals Northeast Indiana incident, alleging it stole 405 GB of data. The public claim aligned with the provider's description of the event as ransomware-related.

Texas AG filing says 174,837 Texans affected in QualDerm breach

QualDerm informed the Texas Attorney General that 174,837 Texas residents were affected by the breach. The filing suggested the total impact may be larger across the 17 states where QualDerm supports practices.

QualDerm begins rolling notifications to affected individuals

By February 2026, QualDerm Partners was sending notification letters on a rolling basis while continuing to review the impacted data. The company also offered complimentary credit monitoring and identity theft protection.

Jan 31, 20264mo ago

HHS OCR records 46 large healthcare breaches in January 2026

During January 2026, the HHS Office for Civil Rights breach portal logged 46 healthcare breaches affecting 500 or more individuals. Those incidents exposed or impermissibly disclosed PHI for 1,441,182 people.

Jan 27, 20264mo ago

Cedar Point Health completes data impact analysis

On January 27, 2026, Cedar Point Health completed its review of the compromised data. The analysis found extensive identifiers and health and financial information were exposed.

Dec 24, 20255mo ago

QualDerm Partners detects suspicious activity

On December 24, 2025, QualDerm Partners detected suspicious activity on its computer network. The company engaged third-party cybersecurity experts to investigate the incident.

Dec 23, 20255mo ago

QualDerm Partners unauthorized access and exfiltration occur

QualDerm Partners later determined an unauthorized party accessed its network and exfiltrated sensitive files between December 23 and December 24, 2025. Potentially exposed data included personal, medical, insurance, and for some individuals government-issued ID information.

Dec 20, 20255mo ago

New Age Dermatology identifies ransomware attack

Around December 20, 2025, New Age Dermatology identified a ransomware attack that rendered an internal server inoperable. The organization said patient-record data may have been exposed, though the full scope was still under review.

Dec 15, 20255mo ago

Wee Care Pediatrics identifies suspicious activity

Around December 15, 2025, Wee Care Pediatrics discovered suspicious activity and later confirmed unauthorized access to its network. Potentially exposed data included PHI, Social Security numbers, and insurance and government program details.

Dec 8, 20256mo ago

Marin Cancer Care detects intrusion

Marin Cancer Care detected suspicious activity around December 8, 2025. The provider later determined the incident may have exposed patient information.

Carolina Foot & Ankle Associates detects cyberattack

On December 8, 2025, Carolina Foot & Ankle Associates detected a network disruption. An investigation found an unauthorized party accessed its network and exfiltrated files containing patient information.

Dec 6, 20256mo ago

Marin Cancer Care intrusion window ends

Marin Cancer Care determined the unauthorized access to its systems continued until December 6, 2025. Its investigation and review of affected files remained ongoing afterward.

Nov 22, 20256mo ago

Marin Cancer Care unauthorized access window begins

Marin Cancer Care later determined an unauthorized party had access to its environment beginning November 22, 2025. Patient files may have been viewed or acquired during the intrusion.

Nov 10, 20257mo ago

Easterseals Northeast Indiana confirms data theft

On November 10, 2025, Easterseals Northeast Indiana confirmed that data had been exfiltrated. Exposed information included protected health information and Social Security numbers.

Sep 4, 20259mo ago

Easterseals Northeast Indiana detects suspicious activity

Easterseals Northeast Indiana identified suspicious activity on its network on September 4, 2025. A later investigation found patient data was stolen in an incident described as consistent with ransomware.

Jun 16, 202511mo ago

Cedar Point Health network intrusion begins

Cedar Point Health detected unauthorized access to its network around June 16, 2025. The incident exposed patient data, including health, financial, and identity information.

Nov 1, 20242y ago

Asheville Eye Associates hit by DragonForce ransomware attack

In November 2024, Asheville Eye Associates suffered a ransomware attack and data breach. DragonForce later claimed it exfiltrated 540 GB of data before encrypting systems and leaked the data after no ransom was paid.

The operational view lives in Mallory

See the full picture, correlated to your attack surface.

This page covers what’s public. Mallory adds the parts that aren’t — which of your assets are affected, which threat actors are using it right now, which detections to deploy, and what to do next.
Exposure mapping

Map indicators from this story to your assets and identify affected systems in minutes.

Threat actor evidence

Every observed campaign, victim, and pivot linked to actors named in this story.

Associated malware

Malware, exploits, and IOCs connected to the activity described here.

Detection signatures

YARA, Sigma, and Snort rules deployed to your SIEM as soon as they’re published.

Scheduled alerts

Get matching new stories delivered to your team as they break — not the next morning.

AI threads

Ask questions about this story and take action on the answers.

Healthcare Provider Data Breaches and Ransomware-Linked Patient Data Exposure | Mallory