Study Explores Extent of Hacking and Ransomware Attacks in Healthcare
Ransomware is one of the leading causes of healthcare data breaches, according to a new study by researchers at Michigan State University, Yale University, and Johns Hopkins University. The study, published in JAMA Network Open. The study revealed that over the past 15 years, ransomware attacks have resulted in the exposure or theft of the healthcare data of at least 285 million individuals. At the time when the study was conducted, the ransomware attack on Change Healthcare was listed on the HHS’ Office for Civil Rights breach portal as affecting 100 million individuals. The total has now been updated to 190 million affected individuals, so at least 375 million individuals have now been confirmed as having their health data stolen or exposed in ransomware attacks, and most likely considerably more. While the first ransomware attacks occurred in the 1980s, ransomware did not start to proliferate until 2012/2013, and there was a significant uptick in attacks on hospitals and other healthcare providers in 2016. The first double extortion attacks started in 2019, where data was stolen...
Healthcare Organizations Take 3.7 Months To Announce Ransomware Data Breaches
A recent data analysis by Comparitech has revealed that the average time for a U.S. healthcare organization to report a ransomware attack is 3.7 months, the shortest time out of all industries represented in the study. Across all industries, the average time to report a ransomware attack in 2023 was 5.1 months, a considerable increase from the average of 2.1 months in 2018. In 2024, ransomware-related data breaches took an average of 3.7 months to report, although it is too early to obtain reliable reporting data, as ransomware victims are still reporting ransomware-related data breaches from last year. Comparitech’s researchers analyzed data from 2,600 U.S. ransomware attacks since 2018. Over the entire period of study, the average time to report a data breach following a ransomware attack was 4.1 months. The legal sector delayed reporting data breaches for the longest time, taking an average of 6.4 months to report the data breach. While healthcare had the shortest breach reporting times, one healthcare entity had an exceptionally long delay between the date of the attack and the...
Medical Imaging Service Provider Settles HIPAA Risk Analysis & Breach Notification Failures
The HHS’ Office for Civil Rights has announced its 8th financial penalty under the Trump administration, with the latest financial penalty resolving an alleged violation of the risk analysis provision of the HIPAA Security Rule and a violation of the HIPAA Breach Notification Rule. The California magnetic resonance imaging (MRI) service provider, Vision Upright MRI LLC, has agreed to settle the alleged violations and will pay a $5,000 financial penalty. OCR currently has a risk analysis enforcement initiative and has imposed 9 penalties under this initiative. OCR is focusing on risk analysis compliance as the risk analysis is a foundational Security Rule requirement that is essential for risk management and implementing safeguards to ensure the confidentiality, integrity, and availability of electronic protected health information (ePHI). The failure to conduct a comprehensive and accurate risk analysis is also one of the most commonly identified HIPAA violations. OCR also appears to be looking closely at Breach Notification Rule compliance. The HIPAA Breach Notification Rule...
Weiser Memorial Hospital Data Breach Affects 59,990 Patients
Cyberattacks and data breaches have recently been announced by Weiser Memorial Hospital in Idaho and Minnesota Orthodontics and Dentofacial Orthopedics. Weiser Memorial Hospital Weiser Memorial Hospital in Idaho has recently informed the HHS’ Office for Civil Rights about a data breach that involved unauthorized access to the personal and protected health information of 59,990 individuals. Unusual network activity was identified on September 4, 2024, and after securing its network, Weiser Memorial Hospital engaged third-party cybersecurity experts to investigate and determine the nature and scope of the unauthorized activity. The investigation confirmed that an unauthorized third party accessed its network and exfiltrated files containing sensitive data on or around September 4, 2024. The impacted files were reviewed to determine the patients affected and the types of data involved, and that process concluded on April 21, 2025. Weiser Memorial Hospital has confirmed that current and former patients had some or all of the following information stolen in the incident: name,...
Microsoft, Fortinet & Ivanti Warn About Actively Exploited Zero Day Vulnerabilities
Microsoft, Fortinet & Ivanti have all notified customers about vulnerabilities in their products that are known to have been exploited by threat actors. Prompt patching is strongly recommended, and workaround/mitigations should be implemented if patching must be delayed. Microsoft On Patch Tuesday, Microsoft issued patches for five vulnerabilities known to have been exploited in the wild, plus two publicly disclosed zero-day vulnerabilities. The actively exploited vulnerabilities are: Product CVE Severity Type Outcome Microsoft DWM Core Library CVE-2025-30400 Important Elevation of Privilege Local elevation of privilege to SYSTEM Windows Common Log File System CVE-2025-32701 Important Elevation of Privilege Local elevation of privilege to SYSTEM Windows Common Log File System CVE-2025-32706 Important Elevation of Privilege Local elevation of privilege to SYSTEM Windows Ancillary Function Driver CVE-2025-32709 Important Elevation of Privilege Local elevation of privilege to SYSTEM Microsoft Scripting Engine CVE-2025-30397 Important Memory Corruption Code execution The following...



