Company Details
multicare-health-system
12,426
68,253
62
multicare.org
0
MUL_1272346
In-progress


MultiCare Health System Company CyberSecurity Posture
multicare.orgMultiCare’s roots in the Pacific Northwest go back to 1882, with the founding of Tacoma’s first hospital. Over the years, we’ve grown from a Tacoma-centric, hospital-based organization into the largest, community-based, locally governed health system in the state of Washington. Today, our comprehensive system of health includes more than 300 primary, urgent, pediatric and specialty care locations across Washington, Idaho and Oregon, as well as 13 hospitals. We welcome patients from the entire Pacific Northwest region and our 20,000-plus team members — including employees, providers and volunteers — proudly care for the communities we serve. Without a doubt, our organization has changed over the years. But what has never changed, throughout our long history, has been our dedication to health and wellness of the people of the Pacific Northwest. Guided by our mission, vision and values, we are on continuous journey to deliver the services that our communities need, and to ensure access to those services, now and in the future.
Company Details
multicare-health-system
12,426
68,253
62
multicare.org
0
MUL_1272346
In-progress
Between 700 and 749

MHS Global Score (TPRM)XXXX

Description: MultiCare Health System in Washington suffered a third-party data breach that originated at its mailing service provider, Kaye-Smith. The breach impacted more than 23,000 individuals at MultiCare. The breached information included Names, addresses, and Social Security numbers.
Description: On August 21, 2020, the Washington State Office of the Attorney General reported a ransomware attack affecting MultiCare Health System, which took place from February 7, 2020, to May 20, 2020. The incident impacted 302,769 Washington residents, with the compromised information including names, addresses, telephone numbers, and medical information.


No incidents recorded for MultiCare Health System in 2026.
No incidents recorded for MultiCare Health System in 2026.
No incidents recorded for MultiCare Health System in 2026.
MHS cyber incidents detection timeline including parent company and subsidiaries

MultiCare’s roots in the Pacific Northwest go back to 1882, with the founding of Tacoma’s first hospital. Over the years, we’ve grown from a Tacoma-centric, hospital-based organization into the largest, community-based, locally governed health system in the state of Washington. Today, our comprehensive system of health includes more than 300 primary, urgent, pediatric and specialty care locations across Washington, Idaho and Oregon, as well as 13 hospitals. We welcome patients from the entire Pacific Northwest region and our 20,000-plus team members — including employees, providers and volunteers — proudly care for the communities we serve. Without a doubt, our organization has changed over the years. But what has never changed, throughout our long history, has been our dedication to health and wellness of the people of the Pacific Northwest. Guided by our mission, vision and values, we are on continuous journey to deliver the services that our communities need, and to ensure access to those services, now and in the future.


Abbott is a global healthcare leader that helps people live more fully at all stages of life. Our portfolio of life-changing technologies spans the spectrum of healthcare, with leading businesses and products in diagnostics, medical devices, nutritional and branded generic medicines. Our 114,000 col

Michigan Medicine, based in Ann Arbor, Michigan, is part of one of the world’s leading universities. Michigan Medicine is a premier, highly ranked academic medical center and award-winning health care system with state-of-the-art facilities. Our vision is to create the future of health care throu
Indiana University Health is Indiana’s largest and most comprehensive system. A unique partnership with the Indiana University School of Medicine—one of the nation’s largest medical schools—gives patients access to groundbreaking research and innovative treatments, and it offers team members acces

Northwell Health is New York State’s largest health care provider and private employer, with 28 hospitals, about 1,000+ outpatient facilities and more than 16,000 affiliated physicians. At Northwell, we focus on cultivating an environment that inspires growth, empowers leadership, and encourages br

UCSF Health is an integrated health care network encompassing several entities, including UCSF Medical Center, one of the nation’s top 10 hospitals according to U.S. News & World Report, and UCSF Benioff Children’s Hospitals, with campuses in Oakland and San Francisco. We are recognized throughout t

Bon Secours Health System, Inc. based in Marriottsville, Maryland, is a $3.2 billion dollar not-for-profit Catholic health system that owns, manages or joint ventures 18 acute care, 5 long term care, 4 assisted living, 6 retirement communities/senior housing, 14 home care and hospice services, and o

OSF HealthCare is an integrated health system founded by The Sisters of the Third Order of St. Francis. Headquartered in Peoria, Illinois, OSF HealthCare has 17 hospitals – 11 acute care, five critical access and one continuing care – with 2,305 licensed beds throughout Illinois and Michigan. OSF e

Atrium Health Wake Forest Baptist is a nationally recognized academic medical center and health system based in Winston-Salem, NC, part of Advocate Health, the third-largest nonprofit health system in the United States. Atrium Health Wake Forest Baptist’s two main components are an integrated clin

Homes and communities are where people thrive. We’ve held this belief since our founding in 1967 and have worked to make it reality for the thousands of individuals we serve. We continue that work today and are using innovation, technology, and collaboration across our organization to do more for mo
.png)
MultiCare Health System is a not-for-profit health system in the Pacific Northwest serving the state of Washington. It includes 13 hospitals...
CHIME Honors 18 Organizations for Achieving Highest Level of Digital Health Excellence in 2025 Digital Health Most Wired (DHMW) Survey...
Renowned investor Vijay Kedia has expanded his portfolio to 16 stocks, now valued over Rs 1320 crore, by acquiring stakes in Yatharth...
Market Master Vijay Kedia has just added two less known stocks to his portfolio, both of which have logged in triple digit compounded profit...
Two Pacific Northwest hospitals systems are planning to come together. Image: Samaritan Health Services. The MultiCare Health System and...
When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn't mince words: "Healthcare loves to...
MVP Health Care members are being targeted by a sophisticated phishing scam involving automated calls that falsely claim to be from the...
The 13-hospital network's CDS system also maintained stable patient experience scores – and data validated that cost reduction was achieved...
Multicare Health System is taking on the nearly $600B in clinical waste spending per year by partnering with IllumiCare to leverage CDS...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of MultiCare Health System is http://jobs.multicare.org.
According to Rankiteo, MultiCare Health System’s AI-generated cybersecurity score is 717, reflecting their Moderate security posture.
According to Rankiteo, MultiCare Health System currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, MultiCare Health System has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, MultiCare Health System is not certified under SOC 2 Type 1.
According to Rankiteo, MultiCare Health System does not hold a SOC 2 Type 2 certification.
According to Rankiteo, MultiCare Health System is not listed as GDPR compliant.
According to Rankiteo, MultiCare Health System does not currently maintain PCI DSS compliance.
According to Rankiteo, MultiCare Health System is not compliant with HIPAA regulations.
According to Rankiteo,MultiCare Health System is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
MultiCare Health System operates primarily in the Hospitals and Health Care industry.
MultiCare Health System employs approximately 12,426 people worldwide.
MultiCare Health System presently has no subsidiaries across any sectors.
MultiCare Health System’s official LinkedIn profile has approximately 68,253 followers.
MultiCare Health System is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, MultiCare Health System does not have a profile on Crunchbase.
Yes, MultiCare Health System maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/multicare-health-system.
As of January 21, 2026, Rankiteo reports that MultiCare Health System has experienced 2 cybersecurity incidents.
MultiCare Health System has an estimated 31,578 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Data Leak.
Title: Data Breach at MultiCare Health System
Description: MultiCare Health System in Washington suffered a third-party data breach that originated at its mailing service provider, Kaye-Smith. The breach impacted more than 23,000 individuals at MultiCare. The breached information included names, addresses, and Social Security numbers.
Type: Data Breach
Attack Vector: Third-party vendor compromise
Title: Ransomware Attack on MultiCare Health System
Description: A ransomware attack on MultiCare Health System impacted 302,769 Washington residents, compromising names, addresses, telephone numbers, and medical information.
Date Detected: 2020-02-07
Date Publicly Disclosed: 2020-08-21
Date Resolved: 2020-05-20
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Mailing service provider and Kaye-Smith.

Data Compromised: Names, Addresses, Social security numbers

Data Compromised: Names, Addresses, Telephone numbers, Medical information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Social Security Numbers, , Names, Addresses, Telephone Numbers, Medical Information and .

Entity Name: MultiCare Health System
Entity Type: Healthcare
Industry: Healthcare
Location: Washington
Customers Affected: 23000

Entity Name: MultiCare Health System
Entity Type: Healthcare
Industry: Healthcare
Location: Washington
Customers Affected: 302769

Type of Data Compromised: Names, Addresses, Social security numbers
Number of Records Exposed: 23000
Personally Identifiable Information: NamesAddressesSocial Security numbers

Type of Data Compromised: Names, Addresses, Telephone numbers, Medical information
Number of Records Exposed: 302769

Source: Washington State Office of the Attorney General
Date Accessed: 2020-08-21
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2020-08-21.

Entry Point: Mailing service provider, Kaye-Smith
Most Recent Incident Detected: The most recent incident detected was on 2020-02-07.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-08-21.
Most Recent Incident Resolved: The most recent incident resolved was on 2020-05-20.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Social Security numbers, , names, addresses, telephone numbers, medical information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were addresses, Addresses, names, Names, medical information, Social Security numbers and telephone numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.3K.
Most Recent Source: The most recent source of information about an incident is Washington State Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Mailing service provider and Kaye-Smith.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.