25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

December 2024 Healthcare Data Breach Report

It was a relatively quiet end to the year in terms of healthcare data breaches, with only 46 data breaches of 500 or more healthcare records reported to the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) in December. The low December total meant that for only the second time since 2009, there was a year-over-year reduction in healthcare data breaches. The OCR data breach portal currently shows 721 reports of large data breaches in 2024, down 3.48% from 2023’s record-breaking total of 747 large healthcare data breaches.

2024 healthcare data breaches

December saw the third-lowest monthly breach total of 2024, with large data breaches falling by 34.3% month-over-month to the second-lowest December total in the past 5 years, with 33 fewer large data breaches than December 2023.

Healthcare data breaches in December (2020-2024)

December was also a relatively good month in terms of breached healthcare records, with 3,938,375 healthcare records reported as exposed, impermissibly disclosed, or stolen – the second-lowest monthly total of 2024, although that does represent a 14.5% month-over-month increase in breached records.

2024 breached healthcare records

Compared to the previous 5 years, December 2024 saw a return to a more typical number of breached records, down 74% from the unusually high number of breached records in December 2023. The good news ends there, however, as 2024 was the worst-ever year in terms of breached healthcare records, with a 9.96% increase from the record-breaking total in 2023. The OCR breach portal currently lists 185,043,568 breached records in 2024. That number will increase over the coming months as HIPAA-regulated entities finish their data breach investigations and report accurate figures. There are still many data breaches listed on the OCR breach portal with suspected placeholder figures of 500 or 501 affected individuals.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

December breached healthcare records (2020-2024)

Biggest Healthcare Data Breaches in December 2024

While no data breaches of 1 million+ records were reported in December, one data breach came close, with 914,138 records compromised in a hacking incident at ConnectOnCall.com, a platform healthcare providers use to improve their after-hours call process and enhance patient communications. A major hacking incident was reported by Richmond University Medical Center, with hackers gaining access to systems containing the protected health information of 674,033 individuals, and large hacking incidents were also reported by River Region Cardiology (which has yet to publish a media notice or website substitute breach notice), the Center for Vein Restoration, Regional Care, and Tycon Medical Systems.

In total, 19 data breaches of 10,000 or more records were reported in December, the vast majority of which were hacking incidents and ransomware attacks; however, two data breaches in the list stand out as they involved neither. The third-largest data breach of the month was reported by Atrium Health and was due to the historic use of website tracking technologies that impermissibly transferred data to third parties such as Meta and Google. The breach potentially affected 585,959 patients.

The other non-hacking breach occurred at UT Southwestern Medical Center. Employees were found to be using an unauthorized calendar app to which patient data was added. The provider of the tool could access data in the app, and since the app was unauthorized there was no business associate agreement in place.

Name of Covered Entity State Covered Entity Type Individuals Affected Business Associate Present
ConnectOnCall.com, LLC DE Business Associate 914,138 Hacking incident
Richmond University Medical Center NY Healthcare Provider 674,033 Hacking incident
Atrium Health NC Healthcare Provider 585,959 Website tracking tools disclosed PHI to third parties
River Region Cardiology AL Healthcare Provider 500,000 Hacking incident
Center for Vein Restoration MD Business Associate 446,094 Hacking incident
Regional Care, Inc. NE Healthcare Clearing House 225,728 Hacking incident
Tycon Medical Systems, Inc. VA Healthcare Provider 112,847 Hacking incident
Brockton Neighborhood Health Center MA Healthcare Provider 97,488 Ransomware attack (Interlock) – data theft confirmed
VisionPoint Eye Center, PLLC IL Healthcare Provider 66,926 Hacking incident
Dignity Health Lassen Medical Clinic CA Healthcare Provider 65,482 Hacking incident
UT Southwestern Medical Center TX Healthcare Provider 43,048 Employees used an unauthorized calendar management tool that exposed data to an unauthorized third party
SAG-AFTRA Health Plan CA Health Plan 35,592 Phishing attack – Single email account
Lexington Diagnostic Center KY Healthcare Provider 29,819 Hacking incident
Ott Cone & Redpath, P.A. NC Business Associate 22,171 Phishing attack – Single email account
In-Home Attendant Services Ltd. TX Healthcare Provider 22,000 Hacking incident
Rumpke Consolidated Companies, Inc. & Affiliates Benefits Plan OH Health Plan 16,946 Hacking incident – Data theft confirmed, extortion attempted
Lifetime Psychiatry, LLC MO Healthcare Provider 16,926 Hacked email account
PracticeSuite, Inc. FL Business Associate 13,000 Hacking incident
Alta Resources Corp. WI Health Plan 12,162 Ransomware attack

In addition to the above data breaches, four breaches were reported to OCR as affecting 500 or 501 individuals. These figures are often used when the breach reporting deadline arrives, but the total number of affected individuals has not yet been determined. These could easily make the above list when the investigations conclude.

Name of Covered Entity State Covered Entity Type Individuals Affected Cause of Breach
Dragonfly Health AZ Business Associate 501 Hacking/IT Incident
Word & Brown Insurance Administrators, Inc. CA Business Associate 501 Hacking/IT Incident
Youth Eastside Services WA Healthcare Provider 501 Hacking/IT Incident
Kitsap Mental Health Services WA Healthcare Provider 500 Hacking/IT Incident

Causes of December 2024 Healthcare Data Breaches

Hacking and other IT-related incidents continue to dominate the breach reports, as has been the case throughout 2024 and over the past few years. The nature of these incidents is not always disclosed by HIPAA-regulated entities such as if ransomware was used, even when ransomware gangs have announced that they have stolen data and added the data to their data leak sites. Several ransomware groups have dispensed with ransomware and now focus on data theft and extortion. Healthcare organizations can often recover their data from backups, and dispensing with file encryption makes attacks quieter and faster. Oftentimes, the threat of exposing stolen data is the main driver behind the decision to pay a ransom.

Causes of December 2024 healthcare data breaches

In December, hacking and other IT incidents accounted for 80.4% of the large data breaches (37 incidents) and 83.81% of the month’s breached records. The average size of a hacking incident in December was 89,212 records and the median breach size was 3,112 records. There were 7 unauthorized access/disclosure incidents involving 635,149 records, with an average breach size of 90,736 records and a median breach size of 1,317 records. The average breach size was skewed because 92.5% of those records were impermissibly disclosed in one data breach. Loss and theft incidents are now only reported in very low numbers, largely due to the migration to the cloud and the widespread use of encryption on portable electronic devices. Two loss incidents were reported involving a total of 2,375 records. There were no theft or improper disposal incidents.

Network servers were the most common location of breached protected health information due to the number of hacking incidents; however, more than one-fifth of breaches involved data stored in email accounts, highlighting the need for strong password policies, multifactor authentication, and security awareness training for the workforce.

Location of breached protected health information in December 2024

Where did the Data Breaches Occur?

Healthcare providers reported 30 data breaches in December (2,243,060 records), 8 data breaches were reported by business associates (1,401,066 records), 7 data breaches were reported by health plans (68,521 records) and there was one data breach at a healthcare clearinghouse (225,728 records). When a data breach occurs at a business associate, the business associate must report the data breach to each affected covered entity, and the covered entity must decide who should send out individual notifications and notify OCR and the media. Some covered entities choose to report business associate breaches to OCR and issue their own notifications, while others delegate that responsibility to the business associate. If a business associate works with multiple covered entities, a combination of the two may occur.

That means data breaches at business associates are often underrepresented in data breach reports. The HIPAA Journal calculates where the breach occurred rather than the entity that reported the breach to ensure business associate data breaches are reported accurately. As you can see from the pie chart below, while 8 data breaches were reported by business associates, another 3 occurred at business associates but were reported by the affected covered entities. The pie charts below are based on the location of the breach rather than the reporting entity.

December 2024 healthcare data breaches - affected HIPAA-regulated entities

Records breached in December 2024 at HIPAA-regulated entities

Geographical Distribution of Healthcare Data Breaches

In December, California was the worst-affected state with 5 reported data breaches, followed by Texas with 4 breaches, and Illinois, Massachusetts, Tennessee, and Washington which each had 3 data breaches.

State Breaches
California 5
Texas 4
Illinois, Massachusetts, Tennessee & Washington 3
Alabama, Florida, Missouri, Nebraska & North Carolina 2
Arizona, Connecticut, Delaware, Indiana, Kentucky, Maryland, Michigan, Nevada, New York, Ohio, Oklahoma, Utah, Virginia, Wisconsin & the District of Columbia 1

Delaware topped the list for breached records, as while only one breach was reported by a Delaware-headquartered HIPAA-regulated entity, it was the largest data breach of the month. New York and Maryland also made the top five having only experienced one breach apiece.

State Individuals Affected
DE 914,138
NY 674,033
NC 608,130
AL 500,776
MD 446,094

HIPAA Enforcement Activity in December 2024

OCR closed out the year with 9 settlements with HIPAA-regulated entities in December to resolve alleged violations of the HIPAA Rules.  In 2024, OCR closed 22 investigations of complaints and data breach investigations with settlements (15) and civil monetary penalties (7), collecting $12,841,796 in penalties, making it one of the business years of HIPAA enforcement to date.

OCR Penalties for HIPAA Violations (2017-2024)

Solara Medical Supplies

The biggest settlement of the month and the second largest penalty of 2024 was agreed upon with the direct-to-patient distributor of medical products for diabetes management, Solara Medical Supplies. Solara Medical Supplies agreed to pay a $3,000,000 penalty to resolve alleged violations of the HIPAA Security Rule and Breach Notification Rule. OCR identified noncompliance in the areas of risk analysis, risk management, and delayed notifications to the HHS, individuals, and the media, as well as the impermissible disclosure of the data of 114,007 and 1,531 individuals. The latter occurred when notifying individuals about the first breach.

Gulf Coast Pain Consultants, LLC d/b/a Clearway Pain Solutions Institute

Clearway Pain Solutions Institute agreed to settle its HIPAA violation case with OCR for $1,190,000. The Florida pain management practice failed to terminate the access rights of a former contractor when the contractor stopped working for the company. The contractor accessed health records on three occasions after stopping working for the company. OCR identified noncompliance with the HIPAA Security Rule in areas of risk analysis, reviews of records of activity in IT systems, and a lack of procedures for modifying workforce members’ access to patient data.

Children’s Hospital Colorado

Children’s Hospital Colorado was investigated over a 2017 phishing incident, although OCR took no action over the breach. The IT department had failed to reenable 2-factor authentication on the compromised account. Then, 3 years later another phishing incident was reported. In total, 14,210 records were compromised across the two incidents. While investigating the breach, OCR discovered that 6,666 members of the workforce, including 3,495 nursing students, had not been provided with HIPAA training. OCR determined there had been HIPAA violations in the areas of risk analysis, workforce Privacy Rule training, and the impermissible disclosure of PHI. The case was settled for $548,265.

USR Holdings

USR Holdings, a holding company that manages primary mental health and substance abuse treatment facilities in Florida, was investigated over unauthorized access to a database over 4 months, resulting in the deletion of protected health information from the database. OCR identified HIPAA violations in the areas of risk analysis, recording activity in information systems, procedures for creating and maintaining retrievable exact copies of ePHI, and there was an impermissible disclosure of the ePHI of 2,903 individuals. USR Holdings settled and paid a $337,750 penalty.

Inmediata Health Group

The Puerto Rican healthcare clearinghouse Inmediata Health Group had already settled alleged violations of the HIPAA Rules and state laws in a multistate action involving 32 states and Puerto Rico in 2023 and paid a $1.5 million penalty. In December, Inmediata settled alleged violations of the HIPAA Rules with OCR and paid a $250,000 penalty. The HIPAA violations were identified following a report of a breach of the protected health information of 1,565,338 that had been stored on an improperly secured server, resulting in the exposure of the data over the Internet. OCR identified HIPAA violations related to the risk analysis,  monitoring and reviewing health information system activity, and the impermissible disclosure of the protected health information of 1,565,338 individuals.

Virtual Private Network Solutions

Virtual Private Network Solutions, a Virginia-based provider of data hosting and cloud services, was investigated over a reported breach of the protected health information of 6,400 individuals. The report was submitted on behalf of 12 covered entity clients and at least one other client was affected, exposing 17,468 records. OCR identified a failure to conduct a comprehensive and accurate risk analysis. The case was settled for $90,000.

Elgon Information Systems

Elgon Information Systems, a Massachusetts provider of electronic medical records and billing support services, was investigated over a breach of the protected health information of 31,248 individuals. A ransomware group accessed its network via open ports on its firewall, stole data, and encrypted files. OCR identified a failure to conduct a comprehensive and accurate risk analysis. Elgon Information Systems settled the alleged HIPAA violation and paid an $80,000 penalty.

South Broward Hospital District (Memorial Health System)

South Broward Hospital District, DBA Memorial Health System, was investigated over a complaint from a patient who had not been provided with his requested records, despite making multiple requests to the Florida health system. Memorial Health System maintained there was no HIPAA violation, as prior to those requests, the requested test results had been provided to the patient. OCR determined that there had been a HIPAA Right of Access violation, and while Memorial Health System requested a hearing with an Administrative Law Judge to fight its case, a settlement was negotiated, and a $60,000 penalty was paid.

Northeast Surgical Group

Northeast Surgical Group in Michigan was investigated over a ransomware-related data breach involving the protected health information of 15,298 patients, which was exfiltrated and encrypted in the attack. OCR investigated and determined that Northeast Surgical Group had failed to conduct a comprehensive and accurate risk analysis. The alleged HIPAA violation was settled, and Northeast Surgical Group paid a $10,000 penalty.

 

Enforcement Actions by State Attorneys General

There were also two enforcement actions announced by State Attorneys General in December, one by New York and one by Indiana.

HealthAlliance

HealthAlliance was investigated by the Office of the New York Attorney General over a breach of the personal and protected health information of 242,641 New Yorkers. HealthAlliance had been notified by a vendor, Citrix, about vulnerabilities in its NetScaler networking products. Patches were made available, but they could not be implemented due to technical problems. HealthAlliance worked to resolve the issues over the following 3 months but continued to use the vulnerable products. The vulnerabilities were found and exploited by hackers who stole patient data. While security failures were likely HIPAA violations, the New York Attorney General took action over the violations of New York Executive & General Business Law. The case was settled with a $1,500,000 penalty and a commitment by HealthAlliance to improve security. $850,000 of the penalty was suspended due to HealthAlliance’s financial position.

Westend Dental

The last penalty was one of the worst HIPAA violation cases The HIPAA Journal has seen. Westend Dental was investigated by the Indiana Attorney General over a complaint from a patient who had not been provided with their requested health records. The patient was told the records could not be provided due to a hacking incident, which had not been reported to OCR or the state. The investigation uncovered multiple violations of HIPAA and state law, and there was an attempted cover-up of a ransomware attack and data breach.

The Indiana Attorney General identified multiple violations of the HIPAA Security Rule, impermissible disclosures of protected health information, the failure to post a notice of privacy practices, the failure to comply with the requirements of the HIPAA Breach Notification Rule and the Indiana Disclosure of Security Breach Act, and violations of the Indiana Deceptive Consumer Sales Act. The number of affected individuals is unknown as the ransomware attack was not remediated or investigated. Westend Dental maintained, until evidence was provided to the contrary, that data had been accidentally wiped due to a drive formatting error. Westend Dental agreed to a consent order involving a $350,000 fine and will implement a long list of measures to ensure HIPAA compliance.

About This Report

The data for this report was obtained from the HHS’ Office for Civil Rights on January 20, 2025, and has been supplemented with information from HIPAA Journal breach reporting and other media sources. HIPAA-regulated entities may amend their breach reports after they have been submitted to OCR when more information is known about the data breach, such as the number of affected individuals. The HIPAA Journal does not update past monthly data breach reports to reflect any changes that come to light after publication; however, they will be reflected in future monthly breach reports and on our healthcare data breach statistics page, which is updated regularly.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist