Company Details
erie-county-medical-center
1,797
14,033
62
ecmc.edu
0
ERI_2356601
In-progress

Erie County Medical Center Corporation Company CyberSecurity Posture
ecmc.eduECMC is a medical leader that makes patient experience our first priority, and brings compassionate, first-class care to the eight counties of Western New York, as well as Southern Ontario. Our presence and care extend throughout our area, from our advanced academic medical center on our main campus with 602 inpatient beds, to our multiple specialized centers of excellence, to our Terrace View Long-Term Care Facility with 390 beds, to on- and off-campus primary care and family health centers. In addition, as a verified, designated Level 1 Adult Trauma Center as well as regional center for burn care, behavioral health services, transplantation, cancer care, and more, we work with some of the most critical patient cases in Western New York. With this combination of knowledgeable, experienced doctors, a wealth of research, and advanced technology, we’re proud to offer Western New York a healthier future—and prouder still to show our community the difference between healthcare and true care(TM).
Company Details
erie-county-medical-center
1,797
14,033
62
ecmc.edu
0
ERI_2356601
In-progress
Between 700 and 749

ECMCC Global Score (TPRM)XXXX

Description: Erie County Medical Center was the victim of a ransomware attack in April 2017 that shut down the hospital's entire computer network but also affected the care delivered to patients or nursing home residents. According to Peter Cutler, the facility has accepted all inbound patients and has continued with all scheduled surgical procedures. While IT professionals attempt to bring computer systems back up, hospital and nursing home employees manually admitted patients, filled prescriptions, and scheduled tests. The FBI and the State Police investigated the incident and restored everything quickly.


No incidents recorded for Erie County Medical Center Corporation in 2025.
No incidents recorded for Erie County Medical Center Corporation in 2025.
No incidents recorded for Erie County Medical Center Corporation in 2025.
ECMCC cyber incidents detection timeline including parent company and subsidiaries

ECMC is a medical leader that makes patient experience our first priority, and brings compassionate, first-class care to the eight counties of Western New York, as well as Southern Ontario. Our presence and care extend throughout our area, from our advanced academic medical center on our main campus with 602 inpatient beds, to our multiple specialized centers of excellence, to our Terrace View Long-Term Care Facility with 390 beds, to on- and off-campus primary care and family health centers. In addition, as a verified, designated Level 1 Adult Trauma Center as well as regional center for burn care, behavioral health services, transplantation, cancer care, and more, we work with some of the most critical patient cases in Western New York. With this combination of knowledgeable, experienced doctors, a wealth of research, and advanced technology, we’re proud to offer Western New York a healthier future—and prouder still to show our community the difference between healthcare and true care(TM).


BayCare is a leading not-for-profit academic health care system that connects individuals and families to a wide range of services at 16 hospitals, including a children’s hospital, and hundreds of other convenient locations throughout the Tampa Bay and central Florida regions. The system is West Cen
Cardinal Health is a distributor of pharmaceuticals, a global manufacturer and distributor of medical and laboratory products, and a provider of performance and data solutions for healthcare facilities. With more than 50 years in business, operations in more than 30 countries and approximately 48,00

We are Erasmus MC. Our roots lie in Rotterdam, a city and port of international standing. We are the most innovative university medical center in the Netherlands and one of the world’s leading centers of scientific research. We are committed to achieving a healthy population and pursuing excellence

AP-HP (Greater Paris University Hospitals) is a European world-renowned university hospital. Its 39 hospitals treat 8 million people every year: in consultation, emergency, during scheduled or home hospitalizations. The AP-HP provides a public health service for everyone, 24 hours a day. This missi

BJC Health System is one of the largest nonprofit health care organizations in the United States and the largest in the state of Missouri, serving urban, suburban, and rural communities across Missouri, southern Illinois, eastern Kansas, and the greater Midwest region. One of the largest employers i

A world-leading integrated healthcare provider, IHH believes that making a difference starts with our aspiration to Care. For Good. Our team of 65,000 people commit to deliver greater good to our patients, people, the public and our planet, as we live our purpose each day to touch lives and trans
Geisinger is among the nation’s leading providers of value-based care, serving 1.2 million people in urban and rural communities across Pennsylvania. Founded in 1915 by philanthropist Abigail Geisinger, the nonprofit system generates $10 billion in annual revenues across 126 care sites — including 1
Care You Can Count On Whether you are searching for your next career opportunity or looking for care for yourself or a family member, you’ll find what you need at Scripps. Founded in 1924 by philanthropist Ellen Browning Scripps, Scripps is a non-profit integrated health care delivery system based

A Amil é uma empresa do setor de saúde que atua no Brasil combinando expertise e liderança para coordenar todos os agentes desse mercado - criando relações sustentáveis para conhecer e atender às necessidades de cada cliente e permitir que ele aproveite o melhor da vida. Diariamente, nos preocupamo
.png)
In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.
Compilation of cyberattacks by organization type and number of records compromised.
Hanson was the first woman and first Black person to chair the board of directors of the Erie County Medical Center Corp., on which she has served since 1996.
Each year, Buffalo expats in Washington, D.C., gather in the Dirksen Senate Office Building to debate the merits of Anchor Bar vs.
Five Cadia Healthcare rehabilitation, skilled nursing, and long-term care facilities in Delaware were found to have used the photographs,...
Erie County Medical Center is investing $2 million to create a center focused on breast health and expand its interventional pain program.
In this regularly updated special collection, we explore how hospitals and health systems are rolling out RPM initiatives.
For the first time since 2015, there was a year-over-year decline in the number of data breaches reported to the Department of Health and...
It's been five years since Erie County Medical Center was hit with a cyberattack that completely shut down its electronic systems.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Erie County Medical Center Corporation is http://www.ecmc.edu/.
According to Rankiteo, Erie County Medical Center Corporation’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, Erie County Medical Center Corporation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Erie County Medical Center Corporation is not certified under SOC 2 Type 1.
According to Rankiteo, Erie County Medical Center Corporation does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Erie County Medical Center Corporation is not listed as GDPR compliant.
According to Rankiteo, Erie County Medical Center Corporation does not currently maintain PCI DSS compliance.
According to Rankiteo, Erie County Medical Center Corporation is not compliant with HIPAA regulations.
According to Rankiteo,Erie County Medical Center Corporation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Erie County Medical Center Corporation operates primarily in the Hospitals and Health Care industry.
Erie County Medical Center Corporation employs approximately 1,797 people worldwide.
Erie County Medical Center Corporation presently has no subsidiaries across any sectors.
Erie County Medical Center Corporation’s official LinkedIn profile has approximately 14,033 followers.
Erie County Medical Center Corporation is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Erie County Medical Center Corporation does not have a profile on Crunchbase.
Yes, Erie County Medical Center Corporation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/erie-county-medical-center.
As of December 18, 2025, Rankiteo reports that Erie County Medical Center Corporation has experienced 1 cybersecurity incidents.
Erie County Medical Center Corporation has an estimated 31,342 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with fbi, third party assistance with state police, and and recovery measures with manual admissions, prescriptions, and test scheduling..
Title: Ransomware Attack on Erie County Medical Center
Description: Erie County Medical Center was the victim of a ransomware attack in April 2017 that shut down the hospital's entire computer network but also affected the care delivered to patients or nursing home residents.
Date Detected: April 2017
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Systems Affected: Entire computer network
Operational Impact: Patient admissionsPrescription fillingTest scheduling

Entity Name: Erie County Medical Center
Entity Type: Hospital
Industry: Healthcare
Location: Erie County

Third Party Assistance: Fbi, State Police.
Recovery Measures: Manual admissions, prescriptions, and test scheduling
Third-Party Assistance: The company involves third-party assistance in incident response through FBI, State Police, .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Manual admissions, prescriptions, and test scheduling.

Investigation Status: Resolved
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Fbi, State Police, .
Most Recent Incident Detected: The most recent incident detected was on April 2017.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was fbi, state police, .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved.
.png)
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.