Company Details
mt.-baker-imaging-llc
55
96
621
mtbakerimaging.com
0
MT._1793822
In-progress


MT. BAKER IMAGING, LLC Company CyberSecurity Posture
mtbakerimaging.comCommitted to delivering precision medicine tools to local providers, while delivering compassionate and comfortable care to our patients.
Company Details
mt.-baker-imaging-llc
55
96
621
mtbakerimaging.com
0
MT._1793822
In-progress
Between 700 and 749

MBIL Global Score (TPRM)XXXX

Description: In January 2024, hackers breached the systems of Northwest Radiologists / Mt. Baker Imaging (MBI), gaining unauthorized access to sensitive patient records of over 348,000 Washington residents. The compromised data included full names, Social Security numbers, diagnoses, treatments, addresses, driver’s license numbers, email addresses, phone numbers, and patient IDs. While the company claimed no evidence of misuse, the breach exposed highly sensitive medical and personally identifiable information (PII), posing long-term risks of identity theft, fraud, and emotional distress.The company delayed notifications for nearly 10 months, initially downplaying the incident as a 'computer network disruption' before admitting it was a data breach. A class-action lawsuit was filed in April 2024, alleging negligence and inadequate cybersecurity, violating state and federal laws. The breach’s scale and the nature of the stolen data including medical histories and financial identifiers heighten the severity, as such information is prime for exploitation in fraud, phishing, or blackmail. The company’s slow response and lack of transparency further exacerbated the fallout.


No incidents recorded for MT. BAKER IMAGING, LLC in 2026.
No incidents recorded for MT. BAKER IMAGING, LLC in 2026.
No incidents recorded for MT. BAKER IMAGING, LLC in 2026.
MBIL cyber incidents detection timeline including parent company and subsidiaries

Committed to delivering precision medicine tools to local providers, while delivering compassionate and comfortable care to our patients.


Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.
.png)
Punjab Governor and UT Administrator Gulab Chand Kataria on Saturday stressed the need to create a dedicated and trained team to strengthen...
Berlin promises to take down bad cyber actors and a new report prompts questions of whether police should carry Tasers to keep them from...
Disappearing topsoil is a big problem for land and bottom line. Expert advice for picking the best bull genetics. Keeping cattle right where...
Introduction. Many security leaders didn't authorize AI expansion. It happened around them. Someone plugged in a copilot in a SaaS tool or...
It's been a busy time for New Zealand's National Cyber Security Centre as it takes an unprecedentedly proactive posture to cyber threats.
Data deletion is a great way to reduce your digital footprint and lower the risk of cybercrime – here's a guide to deleting your data...
This post is also available in: עברית (Hebrew). Organizations are increasingly expected to share data across corporate boundaries, yet cybersecurity risks...
When cybercriminals are designing ways to deliver malware, hiding payloads within files remains one of the most common and, for them,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of MT. BAKER IMAGING, LLC is http://mtbakerimaging.com.
According to Rankiteo, MT. BAKER IMAGING, LLC’s AI-generated cybersecurity score is 700, reflecting their Moderate security posture.
According to Rankiteo, MT. BAKER IMAGING, LLC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, MT. BAKER IMAGING, LLC has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, MT. BAKER IMAGING, LLC is not certified under SOC 2 Type 1.
According to Rankiteo, MT. BAKER IMAGING, LLC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, MT. BAKER IMAGING, LLC is not listed as GDPR compliant.
According to Rankiteo, MT. BAKER IMAGING, LLC does not currently maintain PCI DSS compliance.
According to Rankiteo, MT. BAKER IMAGING, LLC is not compliant with HIPAA regulations.
According to Rankiteo,MT. BAKER IMAGING, LLC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
MT. BAKER IMAGING, LLC operates primarily in the Medical Practices industry.
MT. BAKER IMAGING, LLC employs approximately 55 people worldwide.
MT. BAKER IMAGING, LLC presently has no subsidiaries across any sectors.
MT. BAKER IMAGING, LLC’s official LinkedIn profile has approximately 96 followers.
MT. BAKER IMAGING, LLC is classified under the NAICS code 621, which corresponds to Ambulatory Health Care Services.
No, MT. BAKER IMAGING, LLC does not have a profile on Crunchbase.
Yes, MT. BAKER IMAGING, LLC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mt.-baker-imaging-llc.
As of January 24, 2026, Rankiteo reports that MT. BAKER IMAGING, LLC has experienced 1 cybersecurity incidents.
MT. BAKER IMAGING, LLC has an estimated 9,110 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (worked with fbi and third-party forensic specialists), and third party assistance with fbi, third party assistance with third-party forensic specialists, and law enforcement notified with yes (fbi involved), and recovery measures with review of impacted data and patient notification process, and communication strategy with delayed patient notification (letters sent oct. 31, 2023), incident response line (mon–fri, 9 am–9 pm et)..
Title: Data Breach at Mt. Baker Imaging and Northwest Radiologists
Description: Hackers accessed sensitive patient records at Mt. Baker Imaging and Northwest Radiologists in January 2023, compromising data of over 348,000 Washington residents. The breach included personally identifiable information (PII) such as names, Social Security numbers, diagnoses, treatment details, addresses, driver’s license numbers, email addresses, phone numbers, and patient identification numbers. The company delayed notifying affected individuals and the state for nearly 10 months, citing an ongoing investigation. A class-action lawsuit was filed in April 2023, alleging negligence and inadequate security measures.
Date Detected: 2023-01-20
Date Publicly Disclosed: 2023-03-01
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: First and last names, Social security numbers, Diagnosis and treatment information, Addresses, Driver’s license numbers, Email addresses, Phone numbers, Patient identification numbers
Operational Impact: Computer network disruption (Jan. 20–25, 2023)
Brand Reputation Impact: Significant (delayed disclosure, class-action lawsuit, media scrutiny)
Legal Liabilities: Class-action lawsuit filed (April 25, 2023) for alleged negligence and violation of state/federal laws
Identity Theft Risk: High (PII and sensitive medical data exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Protected Health Information (Phi) and .

Entity Name: Mt. Baker Imaging and Northwest Radiologists
Entity Type: Healthcare Provider
Industry: Diagnostic Imaging
Location: Whatcom County, Washington, USA
Size: 6 locations
Customers Affected: 348,000+ Washington residents

Incident Response Plan Activated: Yes (worked with FBI and third-party forensic specialists)
Third Party Assistance: Fbi, Third-Party Forensic Specialists.
Law Enforcement Notified: Yes (FBI involved)
Recovery Measures: Review of impacted data and patient notification process
Communication Strategy: Delayed patient notification (letters sent Oct. 31, 2023), incident response line (Mon–Fri, 9 AM–9 PM ET)
Incident Response Plan: The company's incident response plan is described as Yes (worked with FBI and third-party forensic specialists).
Third-Party Assistance: The company involves third-party assistance in incident response through FBI, Third-party forensic specialists, .

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: 348,000+
Sensitivity of Data: High (includes SSNs, medical diagnoses, treatment details)
Data Exfiltration: Yes
Personally Identifiable Information: NamesSocial Security numbersAddressesDriver’s license numbersEmail addressesPhone numbersPatient IDsDiagnosis/treatment records

Data Exfiltration: Yes (data breach confirmed)
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Review of impacted data and patient notification process.

Regulations Violated: Washington State data breach notification law (delayed disclosure), Potential HIPAA violations (unauthorized access to PHI),
Legal Actions: Class-action lawsuit filed (April 25, 2023) in Whatcom County Superior Court
Regulatory Notifications: Washington State Office of the Attorney General (notified in July 2023, ~7 months after breach)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class-action lawsuit filed (April 25, 2023) in Whatcom County Superior Court.

Source: Cascadia Daily News

Source: Washington State Office of the Attorney General (data breach report)

Source: Class-action lawsuit filing (Whatcom County Superior Court)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cascadia Daily News, and Source: Washington State Office of the Attorney General (data breach report), and Source: Class-action lawsuit filing (Whatcom County Superior Court).

Investigation Status: Ongoing (as of October 2023, per delayed notification)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Delayed patient notification (letters sent Oct. 31, 2023), incident response line (Mon–Fri and 9 AM–9 PM ET).

Stakeholder Advisories: Patient notification letters (dated Oct. 31, 2023)
Customer Advisories: Incident response line (Mon–Fri, 9 AM–9 PM ET)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Patient notification letters (dated Oct. 31, 2023), Incident response line (Mon–Fri and 9 AM–9 PM ET).

High Value Targets: Patient records (PII/PHI)
Data Sold on Dark Web: Patient records (PII/PHI)

Root Causes: Alleged negligence and inadequate cybersecurity measures (per lawsuit)
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Fbi, Third-Party Forensic Specialists, .
Most Recent Incident Detected: The most recent incident detected was on 2023-01-20.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-03-01.
Most Significant Data Compromised: The most significant data compromised in an incident were First and last names, Social Security numbers, Diagnosis and treatment information, Addresses, Driver’s license numbers, Email addresses, Phone numbers, Patient identification numbers and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was fbi, third-party forensic specialists, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Phone numbers, Email addresses, Social Security numbers, Diagnosis and treatment information, First and last names, Driver’s license numbers, Patient identification numbers and Addresses.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 348.0K.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class-action lawsuit filed (April 25, 2023) in Whatcom County Superior Court.
Most Recent Source: The most recent source of information about an incident are Washington State Office of the Attorney General (data breach report), Cascadia Daily News and Class-action lawsuit filing (Whatcom County Superior Court).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (as of October 2023, per delayed notification).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Patient notification letters (dated Oct. 31, 2023), .
Most Recent Customer Advisory: The most recent customer advisory issued were an Incident response line (Mon–Fri and 9 AM–9 PM ET).
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.