Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Hale Makua Health Services is a private, non-profit company located on the Hawaiian Island of Maui whose mission is to improve the well-being of those in our care through compassionate personalized health services in our home and yours. Our programs include skilled nursing care in two nursing homes, a rehabilitation center, home healthcare, adult day health and an Adult Residential Care Home.

Hale Makua Health Services A.I CyberSecurity Scoring

HMHS

Company Details

Linkedin ID:

hale-makua-health-services

Employees number:

121

Number of followers:

1,693

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

halemakua.org

IP Addresses:

0

Company ID:

HAL_9359806

Scan Status:

In-progress

AI scoreHMHS Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/hale-makua-health-services.jpeg
HMHS Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreHMHS Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/hale-makua-health-services.jpeg
HMHS Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

HMHS Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Hale Makua Health ServicesRansomware10049/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Hale Makua Health Services Hit by Qilin Ransomware Attack in September 2025 Hale Makua Health Services, a nonprofit healthcare provider based in Maui, Hawaii, suffered a ransomware attack in September 2025, exposing sensitive patient and organizational data. The breach was first disclosed on the dark web on September 25, 2025, by the Qilin ransomware group, which claimed to have stolen confidential information and shared screenshots of the data on its portal. Hale Makua, founded in 1946, operates two senior care campuses in Kahului and Wailuku and is the largest provider of senior living units on Maui. The organization reported the incident to the U.S. Department of Health and Human Services on October 29, 2025, though specific details about the compromised data such as whether it included personal, financial, or health records have not been publicly confirmed. Ransomware attacks typically involve unauthorized access and exfiltration of sensitive information, raising concerns about potential identity theft and financial fraud for affected individuals. Legal firms, including Shamis & Gentile P.A., are investigating the breach to determine eligibility for compensation through class action lawsuits, citing risks such as emotional distress, out-of-pocket expenses, and long-term privacy vulnerabilities.

Hale Makua Health Services: Hale Makua Data Breach Lawsuit Investigation
Ransomware
Severity: 100
Impact: 4
Seen: 9/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Hale Makua Health Services Hit by Qilin Ransomware Attack in September 2025 Hale Makua Health Services, a nonprofit healthcare provider based in Maui, Hawaii, suffered a ransomware attack in September 2025, exposing sensitive patient and organizational data. The breach was first disclosed on the dark web on September 25, 2025, by the Qilin ransomware group, which claimed to have stolen confidential information and shared screenshots of the data on its portal. Hale Makua, founded in 1946, operates two senior care campuses in Kahului and Wailuku and is the largest provider of senior living units on Maui. The organization reported the incident to the U.S. Department of Health and Human Services on October 29, 2025, though specific details about the compromised data such as whether it included personal, financial, or health records have not been publicly confirmed. Ransomware attacks typically involve unauthorized access and exfiltration of sensitive information, raising concerns about potential identity theft and financial fraud for affected individuals. Legal firms, including Shamis & Gentile P.A., are investigating the breach to determine eligibility for compensation through class action lawsuits, citing risks such as emotional distress, out-of-pocket expenses, and long-term privacy vulnerabilities.

Ailogo

HMHS Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for HMHS

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for Hale Makua Health Services in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Hale Makua Health Services in 2026.

Incident Types HMHS vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for Hale Makua Health Services in 2026.

Incident History — HMHS (X = Date, Y = Severity)

HMHS cyber incidents detection timeline including parent company and subsidiaries

HMHS Company Subsidiaries

SubsidiaryImage

Hale Makua Health Services is a private, non-profit company located on the Hawaiian Island of Maui whose mission is to improve the well-being of those in our care through compassionate personalized health services in our home and yours. Our programs include skilled nursing care in two nursing homes, a rehabilitation center, home healthcare, adult day health and an Adult Residential Care Home.

Loading...
similarCompanies

HMHS Similar Companies

Sunrise Senior Living

Beginning with a single community in 1981, Sunrise Senior Living has grown to more than 270 communities throughout the U.S. and Canada. Each of our communities continues the mission laid out by founders Paul and Terry Klaassen more than 40 years ago: to champion quality of life for all seniors. Jo

City of Hope

City of Hope's mission is to deliver the cures of tomorrow to the people who need them today. Founded in 1913, City of Hope has grown into one of the largest cancer research and treatment organizations in the U.S. and one of the leading research centers for diabetes and other life-threatening illnes

Indiana University Health

Indiana University Health is Indiana’s largest and most comprehensive system. A unique partnership with the Indiana University School of Medicine—one of the nation’s largest medical schools—gives patients access to groundbreaking research and innovative treatments, and it offers team members acces

Ramsay Health Care

Ramsay Health Care is a trusted provider of private hospital and healthcare services in Australia, Europe and the United Kingdom. Every year, millions of patients put their trust in Ramsay, confident in our ability to deliver safe, high-quality healthcare with outstanding clinical outcomes. We ope

Elevance Health

Fueled by our bold purpose to improve the health of humanity, we are transforming from a traditional health benefits organization into a lifetime trusted health partner. Our nearly 100,000 associates serve more than 118 million people, at every stage of health. We address a full range of needs wi

Cleveland Clinic

Cleveland Clinic, located in Cleveland, Ohio, is a not-for-profit, multispecialty academic medical center that integrates clinical and hospital care with research and education. Founded in 1921 by four renowned physicians with a vision of providing outstanding patient care based upon the principles

CVS Health

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues. Wherever and whenever people need us, we help them

DaVita Kidney Care

DaVita means “to give life,” reflecting our proud history as leaders in dialysis—an essential, life-sustaining treatment for those living with end stage kidney disease (ESKD). Today, our mission is to minimize the devastating impacts of kidney disease across the full spectrum of kidney health care.

Duke University Health System

As a world-class academic and health care system, Duke Health strives to transform medicine and health locally and globally through innovative scientific research, rapid translation of breakthrough discoveries, educating future clinical and scientific leaders, advocating and practicing evidence-base

newsone

HMHS CyberSecurity News

April 08, 2024 07:00 AM
Kaiser Permanente Hawaii names new market president

Edmund Chan, who previously served as senior vice president and area manager for the East Bay market of Kaiser Foundation Health Plan and...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

HMHS CyberSecurity History Information

Official Website of Hale Makua Health Services

The official website of Hale Makua Health Services is http://www.halemakua.org/careers.

Hale Makua Health Services’s AI-Generated Cybersecurity Score

According to Rankiteo, Hale Makua Health Services’s AI-generated cybersecurity score is 665, reflecting their Weak security posture.

How many security badges does Hale Makua Health Services’ have ?

According to Rankiteo, Hale Makua Health Services currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Hale Makua Health Services been affected by any supply chain cyber incidents ?

According to Rankiteo, Hale Makua Health Services has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Hale Makua Health Services have SOC 2 Type 1 certification ?

According to Rankiteo, Hale Makua Health Services is not certified under SOC 2 Type 1.

Does Hale Makua Health Services have SOC 2 Type 2 certification ?

According to Rankiteo, Hale Makua Health Services does not hold a SOC 2 Type 2 certification.

Does Hale Makua Health Services comply with GDPR ?

According to Rankiteo, Hale Makua Health Services is not listed as GDPR compliant.

Does Hale Makua Health Services have PCI DSS certification ?

According to Rankiteo, Hale Makua Health Services does not currently maintain PCI DSS compliance.

Does Hale Makua Health Services comply with HIPAA ?

According to Rankiteo, Hale Makua Health Services is not compliant with HIPAA regulations.

Does Hale Makua Health Services have ISO 27001 certification ?

According to Rankiteo,Hale Makua Health Services is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Hale Makua Health Services

Hale Makua Health Services operates primarily in the Hospitals and Health Care industry.

Number of Employees at Hale Makua Health Services

Hale Makua Health Services employs approximately 121 people worldwide.

Subsidiaries Owned by Hale Makua Health Services

Hale Makua Health Services presently has no subsidiaries across any sectors.

Hale Makua Health Services’s LinkedIn Followers

Hale Makua Health Services’s official LinkedIn profile has approximately 1,693 followers.

NAICS Classification of Hale Makua Health Services

Hale Makua Health Services is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

Hale Makua Health Services’s Presence on Crunchbase

No, Hale Makua Health Services does not have a profile on Crunchbase.

Hale Makua Health Services’s Presence on LinkedIn

Yes, Hale Makua Health Services maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/hale-makua-health-services.

Cybersecurity Incidents Involving Hale Makua Health Services

As of January 25, 2026, Rankiteo reports that Hale Makua Health Services has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Hale Makua Health Services has an estimated 31,618 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Hale Makua Health Services ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Hale Makua Health Services Ransomware Attack and Data Breach

Description: Hale Makua Health Services experienced a ransomware attack in September 2025, resulting in the exposure of sensitive personally identifiable information. The breach was posted on the dark web by the Qilin ransomware group, who claimed to have obtained sensitive organizational data.

Date Detected: 2025-09

Date Publicly Disclosed: 2025-09-25

Type: Ransomware

Threat Actor: Qilin ransomware group

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware HAL1768001751

Data Compromised: Sensitive personally identifiable information

Identity Theft Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally identifiable information and health-related information.

Which entities were affected by each incident ?

Incident : Ransomware HAL1768001751

Entity Name: Hale Makua Health Services

Entity Type: Healthcare Organization

Industry: Healthcare

Location: Maui, Hawaii, USA

Size: Largest provider of senior care living units and beds on Maui

Customers Affected: Patients, residents, or clients of Hale Makua Health Services

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware HAL1768001751

Type of Data Compromised: Personally identifiable information, health-related information

Sensitivity of Data: High

Data Encryption: True

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware HAL1768001751

Ransomware Strain: Qilin

Data Encryption: True

Data Exfiltration: True

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Ransomware HAL1768001751

Regulations Violated: HIPAA,

Regulatory Notifications: Reported to the U.S. Department of Health and Human Services on 2025-10-29

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Ransomware HAL1768001751

Recommendations: Review official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal lawsReview official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal lawsReview official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal lawsReview official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal lawsReview official notifications from Hale Makua Health Services regarding the breach, Monitor financial accounts, credit reports, and health insurance statements for suspicious activity, Consider placing a fraud alert or security freeze on credit files, Save all correspondence and documentation related to the breach, Learn about legal rights to compensation and remedies under state and federal laws

References

Where can I find more information about each incident ?

Incident : Ransomware HAL1768001751

Source: Shamis & Gentile P.A.

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Shamis & Gentile P.A..

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Ransomware HAL1768001751

Investigation Status: Ongoing

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Ransomware HAL1768001751

Customer Advisories: Affected individuals may be eligible to join a class action lawsuit seeking compensation for damages such as lost time, emotional distress, out-of-pocket expenses, and increased risk of identity theft.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Affected individuals may be eligible to join a class action lawsuit seeking compensation for damages such as lost time, emotional distress, out-of-pocket expenses and and increased risk of identity theft..

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Qilin ransomware group.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-09.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-25.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive personally identifiable information.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive personally identifiable information.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Save all correspondence and documentation related to the breach, Consider placing a fraud alert or security freeze on credit files, Review official notifications from Hale Makua Health Services regarding the breach, Learn about legal rights to compensation and remedies under state and federal laws, Monitor financial accounts, credit reports and and health insurance statements for suspicious activity.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Shamis & Gentile P.A..

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Affected individuals may be eligible to join a class action lawsuit seeking compensation for damages such as lost time, emotional distress, out-of-pocket expenses and and increased risk of identity theft.

cve

Latest Global CVEs (Not Company-Specific)

Description

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Description

The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.

Risk Information
cvss3
Base: 6.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Description

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.

Risk Information
cvss3
Base: 7.5
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Risk Information
cvss3
Base: 4.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=hale-makua-health-services' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge