Company Details
mclaren-health-care
9,073
32,869
62
mclaren.org
0
MCL_2784125
In-progress

McLaren Health Care Company CyberSecurity Posture
mclaren.orgMcLaren Health Care, headquartered in Grand Blanc, Michigan, is a $7.3 billion, fully integrated health care delivery system committed to quality, evidence-based patient care and cost efficiency. The McLaren system includes 12 hospitals in Michigan, ambulatory surgery centers, imaging centers, a 640-member employed primary and specialty care physician network, commercial and Medicaid HMOs covering more than 732,838 lives in Michigan and Indiana, home health, infusion and hospice providers, pharmacy services, a clinical laboratory network and a wholly owned medical malpractice insurance company. McLaren operates Michigan’s largest network of cancer centers and providers, anchored by the Karmanos Cancer Institute, a National Cancer Institute-designated comprehensive cancer centers. McLaren has 28,000 full-, part-time and contracted employees and more than 113,000 network providers throughout Michigan, Indiana and Ohio. As part of its Graduate Medical Education (GME) program, McLaren maintains academic affiliations with medical schools at Wayne State University, Michigan State University and Central Medical University. McLaren’s seven (7) GME campuses offer 27 residencies and eight (8) fellowship programs that train over 650 future physicians annually. All GME programs at McLaren are overseen and managed centrally by the Department of Academic Affairs.
Company Details
mclaren-health-care
9,073
32,869
62
mclaren.org
0
MCL_2784125
In-progress
Between 0 and 549

MHC Global Score (TPRM)XXXX

Description: McLaren Health Care (McLaren) suffered a data breach that exposed almost 2.2 million people's sensitive personal data. When the corporation saw unusual activity, it promptly hired outside forensic specialists to assist with the investigation. McLaren discovered that during the unauthorised actor's access, they were able to obtain specific data that was kept on the network. McLaren conducted a comprehensive examination of the potentially affected files as part of an ongoing inquiry to find out if any sensitive material was there.
Description: The Maine Office of the Attorney General reported on November 9, 2023, that McLaren Health Care experienced a data breach due to unauthorized access between July 28, 2023, and August 23, 2023, affecting 2,192,515 individuals in total, including 77 Maine residents. The compromised information includes names and Social Security numbers, among other health-related data. McLaren is offering 12 months of credit monitoring services through IDX to impacted individuals.
Description: McLaren Health Care suffered a data breach in July 2024 caused by the INC ransomware gang, impacting 743,000 patients. The attack was discovered on August 5, 2024, but forensic investigations were completed on May 5, 2025. The breach involved an IT and phone systems outage, affecting patient databases. Full names were exposed, but the full extent of the data breach remains unclear. This is the second major breach for McLaren, with the previous one in July 2023 by the ALPHV/BlackCat ransomware group affecting 2.2 million people.
Description: McLaren Health Care hospitals suffered a ransomware attack by the INC Ransom group, leading to the disruption of IT and phone systems. Patients' sensitive information was compromised, including Social Security numbers, health insurance details, medical records, and more. The breach affected 2,192,515 individuals, risking their personal and medical information, which may lead to fraudulent activities. The hospital experienced operational difficulties, and healthcare services were impacted, as patients were requested to bring their own medication and test information due to the loss of database access.
Description: A ransomware attack between July and August 2024 affecting McLaren Health Care and Karmanos Cancer Institute has resulted in a data breach affecting nearly 750,000 people. Hackers stole data including Social Security numbers, health insurance information, driver's license details, names, and medical data. The breach was linked to the INC ransomware gang. The attack disrupted IT and phone systems, leading to cancellations and rescheduling of surgeries, appointments, and treatments. Affected individuals are being offered a year of free credit monitoring.


No incidents recorded for McLaren Health Care in 2025.
No incidents recorded for McLaren Health Care in 2025.
No incidents recorded for McLaren Health Care in 2025.
MHC cyber incidents detection timeline including parent company and subsidiaries

McLaren Health Care, headquartered in Grand Blanc, Michigan, is a $7.3 billion, fully integrated health care delivery system committed to quality, evidence-based patient care and cost efficiency. The McLaren system includes 12 hospitals in Michigan, ambulatory surgery centers, imaging centers, a 640-member employed primary and specialty care physician network, commercial and Medicaid HMOs covering more than 732,838 lives in Michigan and Indiana, home health, infusion and hospice providers, pharmacy services, a clinical laboratory network and a wholly owned medical malpractice insurance company. McLaren operates Michigan’s largest network of cancer centers and providers, anchored by the Karmanos Cancer Institute, a National Cancer Institute-designated comprehensive cancer centers. McLaren has 28,000 full-, part-time and contracted employees and more than 113,000 network providers throughout Michigan, Indiana and Ohio. As part of its Graduate Medical Education (GME) program, McLaren maintains academic affiliations with medical schools at Wayne State University, Michigan State University and Central Medical University. McLaren’s seven (7) GME campuses offer 27 residencies and eight (8) fellowship programs that train over 650 future physicians annually. All GME programs at McLaren are overseen and managed centrally by the Department of Academic Affairs.


Northwell Health is New York State’s largest health care provider and private employer, with 21 hospitals, about 900 outpatient facilities and more than 12,000 affiliated physicians. We care for over two million people annually in the New York metro area and beyond, thanks to philanthropic support
Headquartered in Utah with locations in six primary states and additional operations across the western U.S., Intermountain Health is a nonprofit system of 33 hospitals, 400+ clinics, a medical group of more than 4,800 employed physicians and advanced care providers, a health plan division called Se
Northwestern Medicine is the collaboration between Northwestern Memorial HealthCare and Northwestern University Feinberg School of Medicine around a strategic vision to transform the future of healthcare. It encompasses the research, teaching, and patient care activities of the academic medical cent

CHRISTUS Health is a Catholic not-for-profit health care system comprising more than 600 centers, including long-term care facilities, community hospitals, walk-in clinics and health ministries. We are a community of 50,000 Associates, with over 15,000 physicians providing personalized care. Our m

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues – including more than 40,000 physicians, pharmacists,

From a single medical centre to a performance-driven healthcare enterprise spread across more than 400+ medical establishments, including 15 hospitals, 120 clinics and 307 pharmacies in GCC and growing, Aster DM Healthcare has transitioned into being the leading healthcare authority across the Middl

Homes and communities are where people thrive. We’ve held this belief since our founding in 1967 and have worked to make it reality for the thousands of individuals we serve. We continue that work today and are using innovation, technology, and collaboration across our organization to do more for mo

SARquavitae, personas que cuidan a las personas SARquavitae es la mayor plataforma de España de servicios sanitarios y sociales de atención a las personas. La plantilla, formada por 12.200 profesionales, ofrece más de 10.900 plazas repartidas por todo el territorio español y atiende a unas 200.0
Mercy, one of the 15 largest U.S. health systems and named the top large system in the U.S. for excellent patient experience by NRC Health, serves millions annually with nationally recognized care and one of the nation’s largest and highest performing Accountable Care Organizations in quality and co
.png)
McLaren Health Care, a healthcare provider, has reported a data breach that compromised the personal and health information of about 2.2...
A record-high number of organizations reported healthcare data breaches in 2024 — and the first half of 2025 forecasts another challenging year...
9/2/2025 -- Editor's note: This story was originally published on July 7, 2025. It was updated on Sept. 2, 2025, to reflect additional large data breaches...
Last summer, hackers accessed sensitive patient information at McLaren Health Care, including medical records and Social Security numbers...
McLaren Health Care, a major nonprofit health system based in Michigan, has confirmed that a ransomware attack last summer led to the compromise of sensitive...
More than 743,000 individuals have been affected by a data breach at Michigan-based McLaren Health Care. The nonprofit health system...
US healthcare organization McLaren Health Care has told nearly three quarters of a million people that their data may have been stolen in a...
The Michigan-based health system has told patients, for the second time in three years, that personal and protected health information has...
PITTSBURGH, June 24, 2025 (GLOBE NEWSWIRE) -- McLaren Health Care (“McLaren”) recently announced a cybersecurity incident, which impacted...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of McLaren Health Care is http://www.mclaren.org.
According to Rankiteo, McLaren Health Care’s AI-generated cybersecurity score is 356, reflecting their Critical security posture.
According to Rankiteo, McLaren Health Care currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, McLaren Health Care is not certified under SOC 2 Type 1.
According to Rankiteo, McLaren Health Care does not hold a SOC 2 Type 2 certification.
According to Rankiteo, McLaren Health Care is not listed as GDPR compliant.
According to Rankiteo, McLaren Health Care does not currently maintain PCI DSS compliance.
According to Rankiteo, McLaren Health Care is not compliant with HIPAA regulations.
According to Rankiteo,McLaren Health Care is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
McLaren Health Care operates primarily in the Hospitals and Health Care industry.
McLaren Health Care employs approximately 9,073 people worldwide.
McLaren Health Care presently has no subsidiaries across any sectors.
McLaren Health Care’s official LinkedIn profile has approximately 32,869 followers.
McLaren Health Care is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, McLaren Health Care does not have a profile on Crunchbase.
Yes, McLaren Health Care maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mclaren-health-care.
As of November 27, 2025, Rankiteo reports that McLaren Health Care has experienced 5 cybersecurity incidents.
McLaren Health Care has an estimated 29,962 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with outside forensic specialists, and communication strategy with notice sent to impacted individuals, and communication strategy with public notification released, free credit monitoring offered..
Title: McLaren Health Care Data Breach
Description: McLaren Health Care (McLaren) suffered a data breach that exposed almost 2.2 million people's sensitive personal data.
Type: Data Breach
Title: McLaren Health Care Ransomware Attack
Description: McLaren Health Care hospitals suffered a ransomware attack by the INC Ransom group, leading to the disruption of IT and phone systems. Patients' sensitive information was compromised, including Social Security numbers, health insurance details, medical records, and more. The breach affected 2,192,515 individuals, risking their personal and medical information, which may lead to fraudulent activities. The hospital experienced operational difficulties, and healthcare services were impacted, as patients were requested to bring their own medication and test information due to the loss of database access.
Type: Ransomware Attack
Threat Actor: INC Ransom group
Title: McLaren Health Care Data Breach
Description: McLaren Health Care suffered a data breach caused by an attack by the INC ransomware gang, affecting 743,000 patients.
Date Detected: 2024-08-05
Date Publicly Disclosed: 2025-05-05
Type: Ransomware
Attack Vector: Unspecified
Threat Actor: INC ransomware gang
Motivation: Financial gain
Title: McLaren Health Care and Karmanos Cancer Institute Data Breach
Description: A ransomware attack between July and August 2024 affecting McLaren Health Care and Karmanos Cancer Institute has resulted in a data breach affecting nearly 750,000 people.
Date Detected: 2024-08-05
Date Publicly Disclosed: 2025-05
Type: Data Breach, Ransomware
Attack Vector: Ransomware
Threat Actor: INC ransomware gang
Motivation: Financial gain, Data theft
Title: McLaren Health Care Data Breach
Description: Unauthorized access to McLaren Health Care's systems resulted in a data breach affecting 2,192,515 individuals, including 77 Maine residents. Compromised information includes names, Social Security numbers, and other health-related data.
Date Detected: 2023-08-23
Date Publicly Disclosed: 2023-11-09
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Sensitive personal data

Data Compromised: Social security numbers, Health insurance details, Medical records
Systems Affected: IT systemsphone systems
Operational Impact: Operational difficulties and impacted healthcare services
Identity Theft Risk: High

Data Compromised: Full names, Potentially other unspecified data
Systems Affected: IT systemsPhone systems
Operational Impact: Patient databases impacted

Data Compromised: Social security numbers, Health insurance information, Driver's license details, Names, Medical data
Systems Affected: IT systemsPhone systems
Downtime: Some surgeries, appointments and treatments were canceled or rescheduled
Operational Impact: Staff resorted to manually managing appointments and medication information

Data Compromised: Names, Social security numbers, Health-related data
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Sensitive Personal Data, , Social Security Numbers, Health Insurance Details, Medical Records, , Full Names, Potentially Other Unspecified Data, , Social Security Numbers, Health Insurance Information, Driver'S License Details, Names, Medical Data, , Names, Social Security Numbers, Health-Related Data and .

Entity Name: McLaren Health Care
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 2.2 million

Entity Name: McLaren Health Care
Entity Type: Hospital
Industry: Healthcare
Customers Affected: 2192515

Entity Name: McLaren Health Care
Entity Type: Healthcare system
Industry: Healthcare
Location: Michigan, USA
Size: 28,000 full-time staff
Customers Affected: 743,000 patients

Entity Name: McLaren Health Care
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 743,131

Entity Name: Karmanos Cancer Institute
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 743,131

Entity Name: McLaren Health Care
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 2192515

Third Party Assistance: Outside Forensic Specialists.

Communication Strategy: Notice sent to impacted individuals

Communication Strategy: Public notification released, Free credit monitoring offered
Third-Party Assistance: The company involves third-party assistance in incident response through Outside forensic specialists, .

Type of Data Compromised: Sensitive personal data
Number of Records Exposed: 2.2 million

Type of Data Compromised: Social security numbers, Health insurance details, Medical records
Number of Records Exposed: 2192515
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Full names, Potentially other unspecified data
Number of Records Exposed: 743,000

Type of Data Compromised: Social security numbers, Health insurance information, Driver's license details, Names, Medical data
Number of Records Exposed: 743,131
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Names, Social security numbers, Health-related data
Number of Records Exposed: 2192515
Sensitivity of Data: High

Ransomware Strain: INC Ransom

Ransomware Strain: INC

Ransomware Strain: INC ransomware
Data Exfiltration: Yes

Regulatory Notifications: Notification submitted to U.S. authorities

Recommendations: Vigilance, Monitoring accounts for suspicious activity
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Vigilance and Monitoring accounts for suspicious activity.

Source: Unspecified source

Source: TechRadar Pro

Source: Maine Office of the Attorney General
Date Accessed: 2023-11-09
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Unspecified source, and Source: TechRadar Pro, and Source: Maine Office of the Attorney GeneralDate Accessed: 2023-11-09.

Investigation Status: Ongoing

Investigation Status: Completed

Investigation Status: Completed
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notice sent to impacted individuals, Public notification released and Free credit monitoring offered.

Customer Advisories: Notice sent to impacted individuals

Customer Advisories: Offered a year of free credit monitoring
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notice sent to impacted individuals and Offered a year of free credit monitoring.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Outside Forensic Specialists, .
Last Attacking Group: The attacking group in the last incident were an INC Ransom group, INC ransomware gang and INC ransomware gang.
Most Recent Incident Detected: The most recent incident detected was on 2024-08-05.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-11-09.
Most Significant Data Compromised: The most significant data compromised in an incident were Sensitive personal data, , Social Security numbers, health insurance details, medical records, , Full names, Potentially other unspecified data, , Social Security numbers, Health insurance information, Driver's license details, Names, Medical data, , names, Social Security numbers, health-related data and .
Most Significant System Affected: The most significant system affected in an incident was IT systemsphone systems and IT systemsPhone systems and IT systemsPhone systems.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was outside forensic specialists, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Sensitive personal data, Social Security numbers, Potentially other unspecified data, Health insurance information, medical records, names, health insurance details, Medical data, Full names, Driver's license details and health-related data.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 3.7M.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Vigilance and Monitoring accounts for suspicious activity.
Most Recent Source: The most recent source of information about an incident are TechRadar Pro, Unspecified source and Maine Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Notice sent to impacted individuals and Offered a year of free credit monitoring.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.