Company Details
hale-makua-health-services
121
1,693
62
halemakua.org
0
HAL_9359806
In-progress


Hale Makua Health Services Company CyberSecurity Posture
halemakua.orgHale Makua Health Services is a private, non-profit company located on the Hawaiian Island of Maui whose mission is to improve the well-being of those in our care through compassionate personalized health services in our home and yours. Our programs include skilled nursing care in two nursing homes, a rehabilitation center, home healthcare, adult day health and an Adult Residential Care Home.
Company Details
hale-makua-health-services
121
1,693
62
halemakua.org
0
HAL_9359806
In-progress
Between 650 and 699

HMHS Global Score (TPRM)XXXX

Description: Hale Makua Health Services Hit by Qilin Ransomware Attack in September 2025 Hale Makua Health Services, a nonprofit healthcare provider based in Maui, Hawaii, suffered a ransomware attack in September 2025, exposing sensitive patient and organizational data. The breach was first disclosed on the dark web on September 25, 2025, by the Qilin ransomware group, which claimed to have stolen confidential information and shared screenshots of the data on its portal. Hale Makua, founded in 1946, operates two senior care campuses in Kahului and Wailuku and is the largest provider of senior living units on Maui. The organization reported the incident to the U.S. Department of Health and Human Services on October 29, 2025, though specific details about the compromised data such as whether it included personal, financial, or health records have not been publicly confirmed. Ransomware attacks typically involve unauthorized access and exfiltration of sensitive information, raising concerns about potential identity theft and financial fraud for affected individuals. Legal firms, including Shamis & Gentile P.A., are investigating the breach to determine eligibility for compensation through class action lawsuits, citing risks such as emotional distress, out-of-pocket expenses, and long-term privacy vulnerabilities.


No incidents recorded for Hale Makua Health Services in 2026.
No incidents recorded for Hale Makua Health Services in 2026.
No incidents recorded for Hale Makua Health Services in 2026.
HMHS cyber incidents detection timeline including parent company and subsidiaries

Hale Makua Health Services is a private, non-profit company located on the Hawaiian Island of Maui whose mission is to improve the well-being of those in our care through compassionate personalized health services in our home and yours. Our programs include skilled nursing care in two nursing homes, a rehabilitation center, home healthcare, adult day health and an Adult Residential Care Home.

Beginning with a single community in 1981, Sunrise Senior Living has grown to more than 270 communities throughout the U.S. and Canada. Each of our communities continues the mission laid out by founders Paul and Terry Klaassen more than 40 years ago: to champion quality of life for all seniors. Jo

City of Hope's mission is to deliver the cures of tomorrow to the people who need them today. Founded in 1913, City of Hope has grown into one of the largest cancer research and treatment organizations in the U.S. and one of the leading research centers for diabetes and other life-threatening illnes
Indiana University Health is Indiana’s largest and most comprehensive system. A unique partnership with the Indiana University School of Medicine—one of the nation’s largest medical schools—gives patients access to groundbreaking research and innovative treatments, and it offers team members acces

Ramsay Health Care is a trusted provider of private hospital and healthcare services in Australia, Europe and the United Kingdom. Every year, millions of patients put their trust in Ramsay, confident in our ability to deliver safe, high-quality healthcare with outstanding clinical outcomes. We ope

Fueled by our bold purpose to improve the health of humanity, we are transforming from a traditional health benefits organization into a lifetime trusted health partner. Our nearly 100,000 associates serve more than 118 million people, at every stage of health. We address a full range of needs wi
Cleveland Clinic, located in Cleveland, Ohio, is a not-for-profit, multispecialty academic medical center that integrates clinical and hospital care with research and education. Founded in 1921 by four renowned physicians with a vision of providing outstanding patient care based upon the principles

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues. Wherever and whenever people need us, we help them
DaVita means “to give life,” reflecting our proud history as leaders in dialysis—an essential, life-sustaining treatment for those living with end stage kidney disease (ESKD). Today, our mission is to minimize the devastating impacts of kidney disease across the full spectrum of kidney health care.
As a world-class academic and health care system, Duke Health strives to transform medicine and health locally and globally through innovative scientific research, rapid translation of breakthrough discoveries, educating future clinical and scientific leaders, advocating and practicing evidence-base
.png)
Edmund Chan, who previously served as senior vice president and area manager for the East Bay market of Kaiser Foundation Health Plan and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Hale Makua Health Services is http://www.halemakua.org/careers.
According to Rankiteo, Hale Makua Health Services’s AI-generated cybersecurity score is 665, reflecting their Weak security posture.
According to Rankiteo, Hale Makua Health Services currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Hale Makua Health Services has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Hale Makua Health Services is not certified under SOC 2 Type 1.
According to Rankiteo, Hale Makua Health Services does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Hale Makua Health Services is not listed as GDPR compliant.
According to Rankiteo, Hale Makua Health Services does not currently maintain PCI DSS compliance.
According to Rankiteo, Hale Makua Health Services is not compliant with HIPAA regulations.
According to Rankiteo,Hale Makua Health Services is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Hale Makua Health Services operates primarily in the Hospitals and Health Care industry.
Hale Makua Health Services employs approximately 121 people worldwide.
Hale Makua Health Services presently has no subsidiaries across any sectors.
Hale Makua Health Services’s official LinkedIn profile has approximately 1,693 followers.
Hale Makua Health Services is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Hale Makua Health Services does not have a profile on Crunchbase.
Yes, Hale Makua Health Services maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/hale-makua-health-services.
As of January 25, 2026, Rankiteo reports that Hale Makua Health Services has experienced 1 cybersecurity incidents.
Hale Makua Health Services has an estimated 31,618 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: Hale Makua Health Services Ransomware Attack and Data Breach
Description: Hale Makua Health Services experienced a ransomware attack in September 2025, resulting in the exposure of sensitive personally identifiable information. The breach was posted on the dark web by the Qilin ransomware group, who claimed to have obtained sensitive organizational data.
Date Detected: 2025-09
Date Publicly Disclosed: 2025-09-25
Type: Ransomware
Threat Actor: Qilin ransomware group
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Sensitive personally identifiable information
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally identifiable information and health-related information.

Entity Name: Hale Makua Health Services
Entity Type: Healthcare Organization
Industry: Healthcare
Location: Maui, Hawaii, USA
Size: Largest provider of senior care living units and beds on Maui
Customers Affected: Patients, residents, or clients of Hale Makua Health Services

Type of Data Compromised: Personally identifiable information, health-related information
Sensitivity of Data: High
Data Encryption: True

Ransomware Strain: Qilin
Data Encryption: True
Data Exfiltration: True

Regulations Violated: HIPAA,
Regulatory Notifications: Reported to the U.S. Department of Health and Human Services on 2025-10-29

Recommendations: Review official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal lawsReview official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal lawsReview official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal lawsReview official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal lawsReview official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal laws

Source: Shamis & Gentile P.A.
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Shamis & Gentile P.A..

Investigation Status: Ongoing

Customer Advisories: Affected individuals may be eligible to join a class action lawsuit seeking compensation for damages such as lost time, emotional distress, out-of-pocket expenses, and increased risk of identity theft.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Affected individuals may be eligible to join a class action lawsuit seeking compensation for damages such as lost time, emotional distress, out-of-pocket expenses and and increased risk of identity theft..
Last Attacking Group: The attacking group in the last incident was an Qilin ransomware group.
Most Recent Incident Detected: The most recent incident detected was on 2025-09.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-25.
Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive personally identifiable information.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive personally identifiable information.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Save all correspondence and documentation related to the breach, Consider placing a fraud alert or security freeze on credit files, Review official notifications from Hale Makua Health Services regarding the breach, Learn about legal rights to compensation and remedies under state and federal laws, Monitor financial accounts, credit reports and and health insurance statements for suspicious activity.
Most Recent Source: The most recent source of information about an incident is Shamis & Gentile P.A..
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Affected individuals may be eligible to join a class action lawsuit seeking compensation for damages such as lost time, emotional distress, out-of-pocket expenses and and increased risk of identity theft.
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.