ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Since 1885, Invacare has helped people with disabilities live life. Today, Invacare America is the global leader in home and long-term-care medical products. Invacare America headquartered in Elyria, Ohio and owned by C+A Global, is a global leader in the manufacture and distribution of innovative home and long-term care medical products that promote recovery and active lifestyles. Invacare America is home to approximately 2,200 employees. The company sells its products through home medical equipment providers, retail and e-commerce channels, residential care operators, distributors, and government health services. Invacare America, through its products and services, makes life's experiences possible for millions of consumers every day.

Invacare U.S. A.I CyberSecurity Scoring

Invacare U.S.

Company Details

Linkedin ID:

invacare-us

Employees number:

1,173

Number of followers:

34,247

NAICS:

None

Industry Type:

Medical Device

Homepage:

invacareamerica.com

IP Addresses:

0

Company ID:

INV_3402555

Scan Status:

In-progress

AI scoreInvacare U.S. Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/invacare-us.jpeg
Invacare U.S. Medical Device
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreInvacare U.S. Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/invacare-us.jpeg
Invacare U.S. Medical Device
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Invacare U.S. Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Invacare International Holdings Corp.Ransomware100511/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: In November 2025, Invacare International Holdings Corp., a leading manufacturer of medical equipment (e.g., wheelchairs, respiratory devices, and mobility aids), suffered a **ransomware attack** by the **RHYSIDA** group. The attackers claimed to have stolen sensitive personal data—including **names, addresses, dates of birth, Social Security numbers, health insurance details, medical records, and financial information**—from **thousands of current/former patients and employees**. The stolen data was threatened for public release on the dark web if ransom demands were unmet. The breach exposed highly confidential information, posing risks of **identity theft, financial fraud, and medical privacy violations**. The incident triggered legal investigations, with affected individuals urged to monitor credit reports, enroll in identity protection services, and seek compensation for damages like emotional distress, lost time, and out-of-pocket expenses.

Invacare International Holdings Corp.Ransomware10055/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: On November 4, 2025, Invacare International Holdings Corp., a medical device manufacturer, fell victim to a **RHYSIDA ransomware attack**. The attackers breached the company’s systems, encrypted critical files, and exfiltrated sensitive data, including **personally identifiable information (PII) and protected health information (PHI)**—such as names, addresses, Social Security numbers, financial details, and health records of patients, clients, and employees. The ransomware group threatened to **publicly release the stolen data** within six to seven days if their demands were not met.The breach poses severe risks, including **identity theft, financial fraud, and reputational damage**, given the sensitive nature of the exposed data. Invacare has not yet disclosed the full scope of affected individuals or organizations but is collaborating with **cybersecurity experts and law enforcement** to investigate and mitigate the incident. Affected parties are advised to monitor financial accounts, watch for phishing attempts, and consider credit freezes. The company may offer **credit monitoring or identity theft protection** as part of its response.

Invacare International Holdings Corp.
Ransomware
Severity: 100
Impact: 5
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: In November 2025, Invacare International Holdings Corp., a leading manufacturer of medical equipment (e.g., wheelchairs, respiratory devices, and mobility aids), suffered a **ransomware attack** by the **RHYSIDA** group. The attackers claimed to have stolen sensitive personal data—including **names, addresses, dates of birth, Social Security numbers, health insurance details, medical records, and financial information**—from **thousands of current/former patients and employees**. The stolen data was threatened for public release on the dark web if ransom demands were unmet. The breach exposed highly confidential information, posing risks of **identity theft, financial fraud, and medical privacy violations**. The incident triggered legal investigations, with affected individuals urged to monitor credit reports, enroll in identity protection services, and seek compensation for damages like emotional distress, lost time, and out-of-pocket expenses.

Invacare International Holdings Corp.
Ransomware
Severity: 100
Impact: 5
Seen: 5/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: On November 4, 2025, Invacare International Holdings Corp., a medical device manufacturer, fell victim to a **RHYSIDA ransomware attack**. The attackers breached the company’s systems, encrypted critical files, and exfiltrated sensitive data, including **personally identifiable information (PII) and protected health information (PHI)**—such as names, addresses, Social Security numbers, financial details, and health records of patients, clients, and employees. The ransomware group threatened to **publicly release the stolen data** within six to seven days if their demands were not met.The breach poses severe risks, including **identity theft, financial fraud, and reputational damage**, given the sensitive nature of the exposed data. Invacare has not yet disclosed the full scope of affected individuals or organizations but is collaborating with **cybersecurity experts and law enforcement** to investigate and mitigate the incident. Affected parties are advised to monitor financial accounts, watch for phishing attempts, and consider credit freezes. The company may offer **credit monitoring or identity theft protection** as part of its response.

Ailogo

Invacare U.S. Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Invacare U.S.

Incidents vs Medical Device Industry Average (This Year)

Invacare U.S. has 300.0% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Invacare U.S. has 212.5% more incidents than the average of all companies with at least one recorded incident.

Incident Types Invacare U.S. vs Medical Device Industry Avg (This Year)

Invacare U.S. reported 2 incidents this year: 0 cyber attacks, 2 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Invacare U.S. (X = Date, Y = Severity)

Invacare U.S. cyber incidents detection timeline including parent company and subsidiaries

Invacare U.S. Company Subsidiaries

SubsidiaryImage

Since 1885, Invacare has helped people with disabilities live life. Today, Invacare America is the global leader in home and long-term-care medical products. Invacare America headquartered in Elyria, Ohio and owned by C+A Global, is a global leader in the manufacture and distribution of innovative home and long-term care medical products that promote recovery and active lifestyles. Invacare America is home to approximately 2,200 employees. The company sells its products through home medical equipment providers, retail and e-commerce channels, residential care operators, distributors, and government health services. Invacare America, through its products and services, makes life's experiences possible for millions of consumers every day.

Loading...
similarCompanies

Invacare U.S. Similar Companies

Dentsply Sirona

A Global Total Solutions Provider Dentsply Sirona is the world’s largest manufacturer of professional dental products and technologies, empowering dental professionals to provide better, safer and faster dental care. Our products and solutions include leading positions and platforms across consuma

newsone

Invacare U.S. CyberSecurity News

November 10, 2025 08:00 AM
Invacare Data Breach Lawsuit Investigation

If you were affected by the Invacare International Holdings Corp. data breach, you may be entitled to compensation.

November 10, 2025 08:00 AM
Invacare Data Breach due to Ransomware Attack: Sensitive Info at Risk

Data breach at Invacare may involve PII and PHI. Exact number affected unknown. Monitor accounts and stay vigilant.

May 15, 2023 07:00 AM
Invacare Reports Results for First Quarter 2023

Invacare Holdings Corporation (OTC: IVCRQ) (“Invacare” or the “company”) today reported results of its predecessor Invacare Corporation for...

February 03, 2023 08:00 AM
Invacare files for Chapter 11 bankruptcy protection amid supply chain woes

Invacare said it filed a plan to reorganize under Chapter 11 bankruptcy protection in the U.S. Bankruptcy Court in southern Texas.

January 31, 2023 08:00 AM
Medical-Equipment Maker Invacare Files for Bankruptcy, Hurt by Rising Costs and Tariffs

Company has a deal with its lenders and most of its bondholders to slash debt by $240 million and be out of chapter 11 in four months.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Invacare U.S. CyberSecurity History Information

Official Website of Invacare U.S.

The official website of Invacare U.S. is invacareamerica.com.

Invacare U.S.’s AI-Generated Cybersecurity Score

According to Rankiteo, Invacare U.S.’s AI-generated cybersecurity score is 545, reflecting their Critical security posture.

How many security badges does Invacare U.S.’ have ?

According to Rankiteo, Invacare U.S. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Invacare U.S. have SOC 2 Type 1 certification ?

According to Rankiteo, Invacare U.S. is not certified under SOC 2 Type 1.

Does Invacare U.S. have SOC 2 Type 2 certification ?

According to Rankiteo, Invacare U.S. does not hold a SOC 2 Type 2 certification.

Does Invacare U.S. comply with GDPR ?

According to Rankiteo, Invacare U.S. is not listed as GDPR compliant.

Does Invacare U.S. have PCI DSS certification ?

According to Rankiteo, Invacare U.S. does not currently maintain PCI DSS compliance.

Does Invacare U.S. comply with HIPAA ?

According to Rankiteo, Invacare U.S. is not compliant with HIPAA regulations.

Does Invacare U.S. have ISO 27001 certification ?

According to Rankiteo,Invacare U.S. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Invacare U.S.

Invacare U.S. operates primarily in the Medical Device industry.

Number of Employees at Invacare U.S.

Invacare U.S. employs approximately 1,173 people worldwide.

Subsidiaries Owned by Invacare U.S.

Invacare U.S. presently has no subsidiaries across any sectors.

Invacare U.S.’s LinkedIn Followers

Invacare U.S.’s official LinkedIn profile has approximately 34,247 followers.

NAICS Classification of Invacare U.S.

Invacare U.S. is classified under the NAICS code None, which corresponds to Others.

Invacare U.S.’s Presence on Crunchbase

No, Invacare U.S. does not have a profile on Crunchbase.

Invacare U.S.’s Presence on LinkedIn

Yes, Invacare U.S. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/invacare-us.

Cybersecurity Incidents Involving Invacare U.S.

As of December 04, 2025, Rankiteo reports that Invacare U.S. has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Invacare U.S. has an estimated 1,407 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Invacare U.S. ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

How does Invacare U.S. detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notification letters to affected individuals (assumed), credit monitoring services offered (assumed), and and third party assistance with cybersecurity experts, and and communication strategy with notifying impacted individuals by mail, communication strategy with making required state and federal disclosures, communication strategy with potential credit monitoring or identity theft protection services for affected parties..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware Attack / Data Breach

Title: Invacare International Holdings Corp. Ransomware Attack (November 2025)

Description: Invacare International Holdings Corp., a major manufacturer and distributor of medical equipment, was targeted by a ransomware attack in early November 2025. The attack was carried out by the RHYSIDA group, who claimed to have accessed and stolen sensitive personal data, including names, addresses, dates of birth, Social Security numbers, health insurance information, medical records, and financial information. The group threatened to publish the data on the dark web if their demands were not met within six to seven days. The breach is believed to affect several thousand current and former patients and employees.

Date Detected: Early November 2025

Date Publicly Disclosed: November 4, 2025

Type: Ransomware Attack / Data Breach

Attack Vector: Ransomware (likely phishing, exploit, or compromised credentials)

Threat Actor: RHYSIDA

Motivation: Financial (ransom demand)

Incident : ransomware attack

Title: RHYSIDA Ransomware Attack on Invacare International Holdings Corp.

Description: On Nov. 4, 2025, the RHYSIDA ransomware group claimed responsibility for a cyberattack targeting Invacare International Holdings Corp., a medical device manufacturing and distribution company. The group breached Invacare’s systems, encrypted critical files, and exfiltrated sensitive organizational data, including personally identifiable information (PII) and protected health information (PHI). The attackers threatened to publicly release the stolen data within six to seven days unless ransom demands were met. The breach was first reported on the Tor network, and its severity is classified as high due to the risk of identity theft and fraud.

Date Detected: 2025-11-04

Date Publicly Disclosed: 2025-11-04

Type: ransomware attack

Threat Actor: RHYSIDA ransomware group

Motivation: financial extortion

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Data Compromised: Name, Address, Date of birth, Social security number, Health insurance information, Medical information, Financial information

Brand Reputation Impact: High (potential loss of trust among patients and healthcare partners)

Legal Liabilities: Potential lawsuits and compensation claims from affected individuals

Identity Theft Risk: High (due to exposure of PII and financial data)

Payment Information Risk: Moderate (financial information exposed)

Incident : ransomware attack INV2192521111025

Data Compromised: Personally identifiable information (pii), Protected health information (phi), Names, Addresses, Email addresses, Social security numbers, Financial information, Health information

Brand Reputation Impact: high (risk of identity theft and fraud due to public data release threat)

Identity Theft Risk: high

Payment Information Risk: high

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Protected Health Information (Phi), Financial Information, , Personally Identifiable Information (Pii), Protected Health Information (Phi), Names, Addresses, Email Addresses, Social Security Numbers, Financial Information, Health Information and .

Which entities were affected by each incident ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Entity Name: Invacare International Holdings Corp.

Entity Type: Public Company

Industry: Medical Equipment Manufacturing & Distribution

Location: Elyria, Ohio, USA

Size: Large (global operations in North America, Europe, and Asia Pacific)

Customers Affected: Several thousand (current and former patients and employees)

Incident : ransomware attack INV2192521111025

Entity Name: Invacare International Holdings Corp.

Entity Type: corporation

Industry: medical device manufacturing and distribution

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Communication Strategy: Notification letters to affected individuals (assumed), credit monitoring services offered (assumed)

Incident : ransomware attack INV2192521111025

Incident Response Plan Activated: True

Third Party Assistance: cybersecurity experts

Communication Strategy: notifying impacted individuals by mailmaking required state and federal disclosurespotential credit monitoring or identity theft protection services for affected parties

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through cybersecurity experts.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi), Financial information

Number of Records Exposed: Several thousand (exact number undisclosed)

Sensitivity of Data: High (includes SSN, medical, and financial data)

Data Exfiltration: Yes (claimed by RHYSIDA group)

Data Encryption: Likely (ransomware attack implies encryption of systems)

Personally Identifiable Information: NameAddressDate of birthSocial Security numberHealth insurance informationMedical records

Incident : ransomware attack INV2192521111025

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi), Names, Addresses, Email addresses, Social security numbers, Financial information, Health information

Sensitivity of Data: high (includes PII and PHI)

Data Encryption: True

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Ransomware Strain: RHYSIDA

Data Encryption: Likely

Data Exfiltration: Yes

Incident : ransomware attack INV2192521111025

Ransomware Strain: RHYSIDA

Data Encryption: True

Data Exfiltration: True

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Regulations Violated: Potential HIPAA violations (health data exposure), State data breach notification laws (e.g., California Consumer Privacy Act if applicable),

Legal Actions: Class action lawsuits under investigation by Shamis & Gentile P.A.

Incident : ransomware attack INV2192521111025

Regulatory Notifications: state and federal disclosures (expected)

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class action lawsuits under investigation by Shamis & Gentile P.A..

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Recommendations: Enroll in credit monitoring and identity protection services if offered., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected to explore compensation options.Enroll in credit monitoring and identity protection services if offered., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected to explore compensation options.Enroll in credit monitoring and identity protection services if offered., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected to explore compensation options.Enroll in credit monitoring and identity protection services if offered., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected to explore compensation options.Enroll in credit monitoring and identity protection services if offered., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected to explore compensation options.

Incident : ransomware attack INV2192521111025

Recommendations: Review any notice or communication from Invacare or medical providers., Monitor financial accounts and credit reports for unusual activity., Be alert for phishing emails or suspicious communications referencing Invacare or personal information., Change passwords for accounts overlapping with Invacare services., Consider placing a fraud alert or credit freeze with major credit bureaus if personal or financial data was shared with Invacare., Take advantage of credit monitoring or identity theft protection services if offered by Invacare.Review any notice or communication from Invacare or medical providers., Monitor financial accounts and credit reports for unusual activity., Be alert for phishing emails or suspicious communications referencing Invacare or personal information., Change passwords for accounts overlapping with Invacare services., Consider placing a fraud alert or credit freeze with major credit bureaus if personal or financial data was shared with Invacare., Take advantage of credit monitoring or identity theft protection services if offered by Invacare.Review any notice or communication from Invacare or medical providers., Monitor financial accounts and credit reports for unusual activity., Be alert for phishing emails or suspicious communications referencing Invacare or personal information., Change passwords for accounts overlapping with Invacare services., Consider placing a fraud alert or credit freeze with major credit bureaus if personal or financial data was shared with Invacare., Take advantage of credit monitoring or identity theft protection services if offered by Invacare.Review any notice or communication from Invacare or medical providers., Monitor financial accounts and credit reports for unusual activity., Be alert for phishing emails or suspicious communications referencing Invacare or personal information., Change passwords for accounts overlapping with Invacare services., Consider placing a fraud alert or credit freeze with major credit bureaus if personal or financial data was shared with Invacare., Take advantage of credit monitoring or identity theft protection services if offered by Invacare.Review any notice or communication from Invacare or medical providers., Monitor financial accounts and credit reports for unusual activity., Be alert for phishing emails or suspicious communications referencing Invacare or personal information., Change passwords for accounts overlapping with Invacare services., Consider placing a fraud alert or credit freeze with major credit bureaus if personal or financial data was shared with Invacare., Take advantage of credit monitoring or identity theft protection services if offered by Invacare.Review any notice or communication from Invacare or medical providers., Monitor financial accounts and credit reports for unusual activity., Be alert for phishing emails or suspicious communications referencing Invacare or personal information., Change passwords for accounts overlapping with Invacare services., Consider placing a fraud alert or credit freeze with major credit bureaus if personal or financial data was shared with Invacare., Take advantage of credit monitoring or identity theft protection services if offered by Invacare.

References

Where can I find more information about each incident ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Source: Shamis & Gentile P.A. Investigation Notice

Incident : ransomware attack INV2192521111025

Source: Dark web post by RHYSIDA ransomware group (Tor network)

Date Accessed: 2025-11-04

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Shamis & Gentile P.A. Investigation Notice, and Source: Dark web post by RHYSIDA ransomware group (Tor network)Date Accessed: 2025-11-04.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Investigation Status: Ongoing (class action investigation by Shamis & Gentile P.A.)

Incident : ransomware attack INV2192521111025

Investigation Status: ongoing (engaging with cybersecurity experts and law enforcement)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification letters to affected individuals (assumed), credit monitoring services offered (assumed), Notifying Impacted Individuals By Mail, Making Required State And Federal Disclosures and Potential Credit Monitoring Or Identity Theft Protection Services For Affected Parties.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Ransomware Attack / Data Breach INV1592415111025

Customer Advisories: Review and save notification letters.Enroll in free credit monitoring/identity protection if offered.Monitor accounts for unauthorized activity.Consider placing a fraud alert or credit freeze.Seek legal assistance for potential compensation.

Incident : ransomware attack INV2192521111025

Customer Advisories: Review notices from Invacare or medical providers.Monitor financial accounts and credit reports.Watch for phishing emails referencing Invacare.Change passwords for potentially affected accounts.Consider fraud alerts or credit freezes if data was shared with Invacare.Utilize credit monitoring or identity theft protection if offered.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Review And Save Notification Letters., Enroll In Free Credit Monitoring/Identity Protection If Offered., Monitor Accounts For Unauthorized Activity., Consider Placing A Fraud Alert Or Credit Freeze., Seek Legal Assistance For Potential Compensation., , Review Notices From Invacare Or Medical Providers., Monitor Financial Accounts And Credit Reports., Watch For Phishing Emails Referencing Invacare., Change Passwords For Potentially Affected Accounts., Consider Fraud Alerts Or Credit Freezes If Data Was Shared With Invacare., Utilize Credit Monitoring Or Identity Theft Protection If Offered. and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Ransomware Attack / Data Breach INV1592415111025

High Value Targets: Patient Records, Employee Data, Financial Systems,

Data Sold on Dark Web: Patient Records, Employee Data, Financial Systems,

Post-Incident Analysis

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as cybersecurity experts.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an RHYSIDA and RHYSIDA ransomware group.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on Early November 2025.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-04.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Name, Address, Date of birth, Social Security number, Health insurance information, Medical information, Financial information, , personally identifiable information (PII), protected health information (PHI), names, addresses, email addresses, Social Security numbers, financial information, health information and .

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity experts.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were health information, Address, Name, names, financial information, Social Security number, Social Security numbers, addresses, protected health information (PHI), Health insurance information, personally identifiable information (PII), Medical information, email addresses, Financial information and Date of birth.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class action lawsuits under investigation by Shamis & Gentile P.A..

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Request free annual credit reports from major bureaus., Change passwords for accounts overlapping with Invacare services., Seek legal counsel if affected to explore compensation options., Take advantage of credit monitoring or identity theft protection services if offered by Invacare., Place a fraud alert on credit reports., Monitor financial statements for suspicious activity., Enroll in credit monitoring and identity protection services if offered., Monitor financial accounts and credit reports for unusual activity., Be alert for phishing emails or suspicious communications referencing Invacare or personal information., Review any notice or communication from Invacare or medical providers. and Consider placing a fraud alert or credit freeze with major credit bureaus if personal or financial data was shared with Invacare..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Shamis & Gentile P.A. Investigation Notice and Dark web post by RHYSIDA ransomware group (Tor network).

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (class action investigation by Shamis & Gentile P.A.).

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Review and save notification letters.Enroll in free credit monitoring/identity protection if offered.Monitor accounts for unauthorized activity.Consider placing a fraud alert or credit freeze.Seek legal assistance for potential compensation. and Review notices from Invacare or medical providers.Monitor financial accounts and credit reports.Watch for phishing emails referencing Invacare.Change passwords for potentially affected accounts.Consider fraud alerts or credit freezes if data was shared with Invacare.Utilize credit monitoring or identity theft protection if offered.

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=invacare-us' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge