Company Details
providence-hospital_2
371
1,921
62
http://www.provhosp.org
0
PRO_2345425
In-progress

Providence Hospital (Providence Health System) Company CyberSecurity Posture
http://www.provhosp.orgProvidence is a 408-bed hospital in Washington, DC with an expert medical staff of more than 500 providers. Located near the Catholic University of America and Basilica of the National Shrine of the Immaculate Conception, our hospital is situated on a 36-acre campus within a vibrant suburban residential community. Access to the hospital is easy and safe, and parking is plentiful and free of charge. Providence is also easily accessible through the Community Physicians Network, comprised of 17 ambulatory care sites in Washington, D.C. and Maryland. Providence is proud to be part Ascension. Ascension (www.ascension.org) is a faith-based healthcare organization dedicated to transformation through innovation across the continuum of care. As one of the leading non-profit and Catholic health systems in the U.S., Ascension is committed to delivering compassionate, personalized care to all, with special attention to persons living in poverty and those most vulnerable. In FY2018, Ascension provided nearly $2 billion in care of persons living in poverty and other community benefit programs. Ascension includes approximately 156,000 associates and 34,000 aligned providers. The national health system operates more than 2,600 sites of care – including 151 hospitals and more than 50 senior living facilities – in 21 states and the District of Columbia, while providing a variety of services including physician practice management, venture capital investing, investment management, biomedical engineering, facilities management, clinical care management, information services, risk management, and contracting through Ascension’s own group purchasing organization.
Company Details
providence-hospital_2
371
1,921
62
http://www.provhosp.org
0
PRO_2345425
In-progress
Between 700 and 749

PH Global Score (TPRM)XXXX

Description: Ascension Michigan notifies some of its patients of a data breach that happened between Oct. 15, 2015, and Sept. 8, 2021. It noticed suspicious activity in its electronic health record and upon investigation found that an unauthorized individual accessed its patient information. The compromised information included full name, date of birth, address(es), email address(es), phone number(s), health insurance information, health insurance identification number and medical records, Social Security numbers. The Ascension Michigan offered free credit and identity theft protection-monitoring services to the affected patients.
Description: Ascension Health, a Missouri-based hospital system operating 140 hospitals across 19 U.S. states, faced a **May 2024 data breach** exposing the **personal information of over 5 million individuals**. The breach allegedly stemmed from negligent cybersecurity practices, leading to a **proposed class-action lawsuit** for failing to protect sensitive data. Plaintiffs accused Ascension of violating **consumer protection laws in six states**, along with claims of **negligence and negligence per se**. The exposed data—though not explicitly detailed in the article—likely includes **medical, financial, or personally identifiable information (PII)**, given the healthcare context. The breach’s scale and the **legal standing granted by a federal judge** underscore its severity, as it directly threatens **patient trust, regulatory compliance, and potential financial liabilities**. The incident highlights systemic vulnerabilities in healthcare cybersecurity, where data exposures can have **long-term reputational and operational consequences** for providers.
Description: Ascension, one of the largest private healthcare systems in the United States, experienced a data breach that exposed the personal and healthcare information of over 430,000 patients. The incident, disclosed in April, involved a data theft attack impacting a former business partner in December. Attackers accessed personal health information related to inpatient visits, including physician names, admission and discharge dates, diagnosis and billing codes, medical record numbers, and insurance company names. Personal information such as names, addresses, phone numbers, email addresses, dates of birth, race, gender, and Social Security numbers were also compromised. The breach was linked to a vulnerability in third-party software used by the former business partner, likely part of widespread Clop ransomware attacks.
Description: On December 19, 2024, the Maine Office of the Attorney General disclosed a severe data breach affecting **Ascension Health**, stemming from an external hacking incident that occurred on **May 8, 2024**. The breach compromised the personal data of approximately **5,599,699 individuals**, including **658 Maine residents**. The exposed information encompasses highly sensitive details such as **medical records, payment data, insurance information, and government-issued identification documents**.This incident poses a critical threat to the affected individuals, as the leaked data could facilitate **identity theft, financial fraud, and targeted phishing attacks**. The scale of the breach—impacting millions—suggests systemic vulnerabilities in Ascension Health’s cybersecurity defenses, raising concerns about the organization’s ability to safeguard patient confidentiality. The inclusion of **medical and financial data** elevates the risk of long-term harm, including potential **blackmail, fraudulent medical claims, or unauthorized access to healthcare services**. The breach not only undermines trust in Ascension Health but also highlights the broader risks associated with cyberattacks on healthcare providers, where data integrity is paramount for patient safety and operational continuity.
Description: The California Attorney General's Office reported that Ascension Health experienced a ransomware attack on May 8, 2024, affecting personal information of patients and associates. The breach potentially exposed names, medical information, payment information, insurance information, government identification, and other personal information. The number of individuals affected is currently unknown.
Description: On December 19, 2024, the Washington State Office of the Attorney General disclosed a **ransomware attack** targeting **Ascension Health**, initially detected on **May 8, 2024**. The breach compromised the personal data of **5,787 Washington residents**, exposing highly sensitive information, including **Social Security numbers (SSNs) and medical records**. The attack posed severe risks to affected individuals, as exposed SSNs and medical data can facilitate **identity theft, financial fraud, and targeted phishing scams**. Given the nature of the stolen data—health records in particular—the breach also raised concerns about **long-term privacy violations, potential blackmail, and misuse of medical histories**. Ascension Health, a major healthcare provider, faced **reputational damage, regulatory scrutiny, and potential legal liabilities** due to the failure to prevent the attack. The incident underscored vulnerabilities in healthcare cybersecurity, where ransomware groups increasingly target **critical patient data** for extortion. The exposure of such information not only harms individuals but also erodes trust in the organization’s ability to safeguard confidential records. Recovery efforts likely involved **forensic investigations, notification processes, credit monitoring for victims, and system reinforcements** to mitigate future threats.
Description: In February 2024, Ascension, a major healthcare provider, suffered a devastating **ransomware attack** initiated when a contractor clicked a phishing link via Microsoft Bing and Edge. The attack exploited **Kerberoasting**, leveraging Microsoft’s outdated **RC4 encryption** (a 1980s protocol long deemed insecure) to gain administrative privileges through **Active Directory**. Hackers then deployed ransomware across **thousands of systems**, compromising **personal data, medical records, payment/insurance details, and government IDs of over 5.6 million patients**. The breach disrupted hospital operations, delayed critical treatments, and exposed systemic vulnerabilities tied to Microsoft’s default security configurations—including weak password policies for privileged accounts. Despite repeated warnings from **CISA, FBI, and NSA** about RC4 and Kerberoasting risks (notably by state actors like Iran), Microsoft had yet to disable RC4 by default, prolonging exposure. Ascension’s incident underscores the cascading impact of **legacy encryption flaws**, **poor default security settings**, and **third-party contractor risks** in healthcare cybersecurity.
Description: Ascension experienced a ransomware attack involving social engineering which resulted in the data of 5,599,699 individuals being affected. An employee was tricked into downloading malware, resulting in a data breach. Although there was no evidence that data was extracted from their Electronic Health Records (EHR) and other clinical systems where complete patient records are securely kept, personal information was involved and notifications to the affected individuals have been initiated.
Description: Ascension faced a cyber breach where a ransomware attack led to unauthorized disclosure of patient personal information. The incident caused class action lawsuits and disruptions in emergency medical services as well as interruptions to the electronic health records system. Identified as conducted by the Russian-speaking group Black Basta, the attack's consequences included services diversion, posing risks to patient care and data security.
Description: Ascension faced a ransomware attack resulting in severe disruptions across 140 hospitals, implicating patient care and treatment schedules. The recovery was hindered by the need for 'assurance' letters to reconnect systems with suppliers, adding to the operational chaos. The impact extended to canceled appointments and surgeries, and pushed medical staff to revert to manual processes. The organization's swift action towards transparency and reconnection of supplies post-attack mitigated prolonged delays.
Description: Providence Medical Institute experienced a ransomware attack in April 2018 which led to the encryption of ePHI across its systems, affecting 85,000 individuals. The attack exposed significant vulnerabilities, including lack of a business associate agreement and inadequate access controls. As a result, the U.S. Department of Health and Human Services imposed a civil penalty of $240,000 due to the HIPAA Security Rule violations following the series of ransomware attacks. These incidents underline critical lapses in cybersecurity measures necessary to protect sensitive health information.


No incidents recorded for Providence Hospital (Providence Health System) in 2025.
No incidents recorded for Providence Hospital (Providence Health System) in 2025.
No incidents recorded for Providence Hospital (Providence Health System) in 2025.
PH cyber incidents detection timeline including parent company and subsidiaries

Providence is a 408-bed hospital in Washington, DC with an expert medical staff of more than 500 providers. Located near the Catholic University of America and Basilica of the National Shrine of the Immaculate Conception, our hospital is situated on a 36-acre campus within a vibrant suburban residential community. Access to the hospital is easy and safe, and parking is plentiful and free of charge. Providence is also easily accessible through the Community Physicians Network, comprised of 17 ambulatory care sites in Washington, D.C. and Maryland. Providence is proud to be part Ascension. Ascension (www.ascension.org) is a faith-based healthcare organization dedicated to transformation through innovation across the continuum of care. As one of the leading non-profit and Catholic health systems in the U.S., Ascension is committed to delivering compassionate, personalized care to all, with special attention to persons living in poverty and those most vulnerable. In FY2018, Ascension provided nearly $2 billion in care of persons living in poverty and other community benefit programs. Ascension includes approximately 156,000 associates and 34,000 aligned providers. The national health system operates more than 2,600 sites of care – including 151 hospitals and more than 50 senior living facilities – in 21 states and the District of Columbia, while providing a variety of services including physician practice management, venture capital investing, investment management, biomedical engineering, facilities management, clinical care management, information services, risk management, and contracting through Ascension’s own group purchasing organization.


UnitedHealth Group is a health care and well-being company with a mission to help people live healthier lives and help make the health system work better for everyone. We are 340,000 colleagues in two distinct and complementary businesses working to help build a modern, high-performing health syste

Northside Hospital — a certified Great Place To Work® — is one of Georgia’s top health systems. We have acute-care hospitals in Atlanta, Canton, Cumming, Duluth and Lawrenceville and hundreds of outpatient locations across the state. Northside Hospital leads the U.S. in newborn deliveries and is amo

Michigan Medicine, based in Ann Arbor, Michigan, is part of one of the world’s leading universities. Michigan Medicine is a premier, highly ranked academic medical center and award-winning health care system with state-of-the-art facilities. Our vision is to create the future of health care throu

Kindred’s mission is to help our patients reach their highest potential for health and healing with intensive medical and rehabilitative care through a compassionate patient experience. Kindred’s 61 long-term acute care hospitals (LTACHs), along with 18 community-based, short-term acute care hospit

Founded in 2003, Omega Healthcare Management Services® (Omega Healthcare) empowers healthcare to thrive via intelligent solutions that optimize revenue cycle operations, administrative workflows, care coordination, and clinical research on a global scale. The company works with providers, payers, li

ELSAN, groupe leader de l’hospitalisation privée en France, compte aujourd’hui plus de 28 000 collaborateurs et 7500 médecins libéraux qui exercent dans les 212 établissements et centres du groupe. Ils prennent en charge plus de 4,8 millions de patients par an. Notre mission : offrir à chac

From specializing in transplants and pediatric cancer to solving undiagnosed diseases, we know solving the most complex problems prepares us to solve any problem. We are committed to excellence in patient care, research, and medical education and training. We thrive on challenges, embrace collaborat

Boston Children's Hospital is a 404-bed comprehensive center for pediatric health care. As one of the largest pediatric medical centers in the United States, Boston Children's offers a complete range of health care services for children from birth through 21 years of age. (Our services can begin int

Texas Children’s Hospital is a world-class pediatric facility, nationally recognized as a top children’s hospital, and voted one of the best places to work in Houston for nine years running. We’re committed to creating a healthy community for children by providing the best pediatric care possible, t
.png)
The University of Montana and Missoula-based St. Patrick Hospital, part of the Providence health system, are working together to develop...
By launching a shared interoperability framework, Providence and Humana are addressing a long-standing challenge in health care: the...
Erik Wexler talks about leading the Catholic health system, the struggle to get on solid financial footing, clashes with insurers,...
SPOKANE, Wash. (WKRC) — Fifteen nurses were terminated from their positions after a child took her own life while in the care of...
Witnesses at a Senate hearing Wednesday connected One Big Beautiful Bill provisions to potential cyber issues in the health care sector,...
Operating revenues popped across fiscal 2024 as many of the largest nonprofits combined strong demand with capacity increases.
Erik Wexler stepped into the top leadership role at 51-hospital Providence at a “tumultuous” time in healthcare, as he described.
A debt collection company formerly contracted by Providence Swedish was affected by a data breach in July 2024, the medical groups announced Tuesday.
Providence Swedish said it was recently notified of a security event at a former collections vendor, Nationwide Recovery Services (NRS), affecting the records...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Providence Hospital (Providence Health System) is http://www.provhosp.org.
According to Rankiteo, Providence Hospital (Providence Health System)’s AI-generated cybersecurity score is 725, reflecting their Moderate security posture.
According to Rankiteo, Providence Hospital (Providence Health System) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Providence Hospital (Providence Health System) is not certified under SOC 2 Type 1.
According to Rankiteo, Providence Hospital (Providence Health System) does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Providence Hospital (Providence Health System) is not listed as GDPR compliant.
According to Rankiteo, Providence Hospital (Providence Health System) does not currently maintain PCI DSS compliance.
According to Rankiteo, Providence Hospital (Providence Health System) is not compliant with HIPAA regulations.
According to Rankiteo,Providence Hospital (Providence Health System) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Providence Hospital (Providence Health System) operates primarily in the Hospitals and Health Care industry.
Providence Hospital (Providence Health System) employs approximately 371 people worldwide.
Providence Hospital (Providence Health System) presently has no subsidiaries across any sectors.
Providence Hospital (Providence Health System)’s official LinkedIn profile has approximately 1,921 followers.
Providence Hospital (Providence Health System) is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Providence Hospital (Providence Health System) does not have a profile on Crunchbase.
Yes, Providence Hospital (Providence Health System) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/providence-hospital_2.
As of November 30, 2025, Rankiteo reports that Providence Hospital (Providence Health System) has experienced 11 cybersecurity incidents.
Providence Hospital (Providence Health System) has an estimated 30,085 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Ransomware and Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $240 thousand.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with free credit and identity theft protection-monitoring services, and communication strategy with notified affected patients, and recovery measures with transparency, recovery measures with reconnection of supplies, and communication strategy with transparency, and communication strategy with notifications to affected individuals..
Title: Ascension Michigan Data Breach
Description: Ascension Michigan notifies some of its patients of a data breach that happened between Oct. 15, 2015, and Sept. 8, 2021. It noticed suspicious activity in its electronic health record and upon investigation found that an unauthorized individual accessed its patient information. The compromised information included full name, date of birth, address(es), email address(es), phone number(s), health insurance information, health insurance identification number and medical records, Social Security numbers. Ascension Michigan offered free credit and identity theft protection-monitoring services to the affected patients.
Date Detected: 2021-09-08
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Unauthorized Individual
Title: Ransomware Attack on Ascension
Description: Ascension faced a ransomware attack resulting in severe disruptions across 140 hospitals, implicating patient care and treatment schedules. The recovery was hindered by the need for 'assurance' letters to reconnect systems with suppliers, adding to the operational chaos. The impact extended to canceled appointments and surgeries, and pushed medical staff to revert to manual processes. The organization's swift action towards transparency and reconnection of supplies post-attack mitigated prolonged delays.
Type: Ransomware
Title: Ascension Ransomware Attack
Description: Ascension experienced a ransomware attack involving social engineering which resulted in the data of 5,599,699 individuals being affected.
Type: Ransomware Attack
Attack Vector: Social Engineering
Vulnerability Exploited: Human Error
Motivation: Financial
Title: Ascension Ransomware Attack
Description: Ascension faced a cyber breach where a ransomware attack led to unauthorized disclosure of patient personal information. The incident caused class action lawsuits and disruptions in emergency medical services as well as interruptions to the electronic health records system. Identified as conducted by the Russian-speaking group Black Basta, the attack's consequences included services diversion, posing risks to patient care and data security.
Type: Ransomware Attack
Threat Actor: Black Basta
Title: Ransomware Attack on Providence Medical Institute
Description: Providence Medical Institute experienced a ransomware attack in April 2018 which led to the encryption of ePHI across its systems, affecting 85,000 individuals. The attack exposed significant vulnerabilities, including lack of a business associate agreement and inadequate access controls. As a result, the U.S. Department of Health and Human Services imposed a civil penalty of $240,000 due to the HIPAA Security Rule violations following the series of ransomware attacks. These incidents underline critical lapses in cybersecurity measures necessary to protect sensitive health information.
Date Detected: April 2018
Type: Ransomware Attack
Vulnerability Exploited: Lack of a business associate agreementInadequate access controls
Title: Ascension Healthcare Data Breach
Description: Ascension, one of the largest private healthcare systems in the United States, experienced a data breach that exposed the personal and healthcare information of over 430,000 patients. The incident, disclosed in April, involved a data theft attack impacting a former business partner in December. Attackers accessed personal health information related to inpatient visits, including physician names, admission and discharge dates, diagnosis and billing codes, medical record numbers, and insurance company names. Personal information such as names, addresses, phone numbers, email addresses, dates of birth, race, gender, and Social Security numbers were also compromised. The breach was linked to a vulnerability in third-party software used by the former business partner, likely part of widespread Clop ransomware attacks.
Date Detected: December
Date Publicly Disclosed: April
Type: Data Breach
Attack Vector: Vulnerability in third-party software
Vulnerability Exploited: Third-party software vulnerability
Threat Actor: Clop ransomware group
Motivation: Data theft
Title: Ascension Health Ransomware Attack
Description: The California Attorney General's Office reported that Ascension Health experienced a ransomware attack on May 8, 2024, affecting personal information of patients and associates. The breach potentially exposed names, medical information, payment information, insurance information, government identification, and other personal information. The number of individuals affected is currently unknown.
Date Detected: 2024-05-08
Type: Ransomware Attack
Title: Ascension Health Data Breach (2024)
Description: The Maine Office of the Attorney General reported a data breach involving Ascension Health on December 19, 2024. The breach occurred on May 8, 2024, due to an external hacking incident, affecting approximately 5,599,699 individuals in total, with 658 Maine residents specifically impacted. Personal data potentially compromised includes medical, payment, insurance, and government identification information.
Date Detected: 2024-05-08
Date Publicly Disclosed: 2024-12-19
Type: Data Breach
Attack Vector: External Hacking
Title: Ascension Hospital Ransomware Attack (2024)
Description: A ransomware attack on Ascension hospital in 2024 resulted in the theft of personal data, medical data, payment information, insurance information, and government IDs for over 5.6 million patients. The attack originated from a contractor clicking a phishing link via Microsoft Bing and Edge, exploiting vulnerabilities in Microsoft's Active Directory (Kerberoasting technique) due to outdated RC4 encryption support. Hackers gained administrative privileges and deployed ransomware across thousands of systems.
Date Detected: 2024-02
Type: ransomware
Attack Vector: phishingexploitation of outdated encryption (RC4)Kerberoastingprivilege escalation via Active Directory
Vulnerability Exploited: RC4 encryption (obsolete since 1980s)Kerberoasting in Active Directorydefault weak password policies (privileged accounts <14 characters)
Motivation: financial gain (ransomware)data theft
Title: Ascension Health Ransomware Attack and Data Breach (2024)
Description: On December 19, 2024, the Washington State Office of the Attorney General reported a data breach involving Ascension Health, discovered on May 8, 2024. The breach was caused by a ransomware attack affecting approximately 5,787 Washington residents and potentially exposing personal information, including social security numbers and medical data.
Date Detected: 2024-05-08
Date Publicly Disclosed: 2024-12-19
Type: ransomware
Title: Ascension Health Data Breach (May 2024)
Description: Missouri-based Ascension Health faced a proposed class action alleging negligent failure to protect the personal information of over 5 million people exposed in a May 2024 data breach. Plaintiffs claimed violations of consumer protection laws in six states, negligence, and negligence per se. The breach affected Ascension, a hospital system with 140 hospitals across 19 states.
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Social Engineering and phishing link clicked via Microsoft Bing/Edge on contractor’s laptop.

Data Compromised: Full name, Date of birth, Address(es), Email address(es), Phone number(s), Health insurance information, Health insurance identification number, Medical records, Social security numbers
Systems Affected: Electronic Health Record
Identity Theft Risk: High

Systems Affected: 140 hospitals
Operational Impact: Canceled appointmentsCanceled surgeriesReverted to manual processes

Data Compromised: Personal information
Systems Affected: Electronic Health Records (EHR)Other Clinical Systems

Data Compromised: Patient personal information
Systems Affected: Electronic health records systemEmergency medical services
Downtime: Services diversion
Operational Impact: Disruptions in emergency medical services and interruptions to the electronic health records system
Legal Liabilities: Class action lawsuits

Data Compromised: Personal health information, Physician names, Admission and discharge dates, Diagnosis and billing codes, Medical record numbers, Insurance company names, Names, Addresses, Phone numbers, Email addresses, Dates of birth, Race, Gender, Social security numbers

Data Compromised: Names, Medical information, Payment information, Insurance information, Government identification, Other personal information

Data Compromised: Medical information, Payment information, Insurance information, Government identification information
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Personal data, Medical records, Payment information, Insurance information, Government ids
Systems Affected: thousands of computers
Operational Impact: severe (healthcare operations disrupted)
Brand Reputation Impact: high (public scrutiny, regulatory concern)
Identity Theft Risk: high (5.6M records exposed)
Payment Information Risk: high

Data Compromised: Social security numbers, Medical information
Identity Theft Risk: high

Data Compromised: Personal information
Customer Complaints: Class action lawsuit filed
Brand Reputation Impact: Significant (class action alleging negligence)
Legal Liabilities: Proposed class action for negligence, negligence per se, and violations of consumer protection laws in six states
Identity Theft Risk: High (personal information of 5M+ exposed)
Average Financial Loss: The average financial loss per incident is $21.82 thousand.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information, Health Information, , Personal Information, , Patient personal information, ePHI, Personal Health Information, Personal Information, , Names, Medical Information, Payment Information, Insurance Information, Government Identification, Other Personal Information, , Medical, Payment, Insurance, Government Identification, , Personal Data, Medical Records, Payment Information, Insurance Details, Government Ids, , Personally Identifiable Information (Pii), Protected Health Information (Phi), and Personal Information.

Entity Name: Ascension Michigan
Entity Type: Healthcare Provider
Industry: Healthcare
Location: Michigan

Entity Name: Ascension
Entity Type: Healthcare
Industry: Healthcare
Size: 140 hospitals

Entity Name: Ascension
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 5599699

Entity Name: Ascension
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Providence Medical Institute
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 85,000

Entity Name: Ascension
Entity Type: Healthcare System
Industry: Healthcare
Location: United States
Customers Affected: 430000

Entity Name: Ascension Health
Entity Type: Healthcare Provider
Industry: Healthcare

Entity Name: Ascension Health
Entity Type: Healthcare Provider
Industry: Healthcare
Location: United States
Customers Affected: 5,599,699 (658 in Maine)

Entity Name: Ascension
Entity Type: healthcare provider
Industry: healthcare
Location: United States
Customers Affected: 5.6 million patients

Entity Name: Ascension Health
Entity Type: healthcare provider
Industry: healthcare
Location: United States (Washington residents affected)
Customers Affected: 5,787

Entity Name: Ascension Health
Entity Type: Hospital System
Industry: Healthcare
Location: Missouri, USA (operates in 19 states)
Size: 140 hospitals
Customers Affected: 5,000,000+

Remediation Measures: Free credit and identity theft protection-monitoring services
Communication Strategy: Notified affected patients

Recovery Measures: TransparencyReconnection of supplies
Communication Strategy: Transparency

Communication Strategy: Notifications to affected individuals

Type of Data Compromised: Personally identifiable information, Health information
Sensitivity of Data: High
Personally Identifiable Information: full namedate of birthaddress(es)email address(es)phone number(s)Social Security numbers

Type of Data Compromised: Personal information
Number of Records Exposed: 5599699
Sensitivity of Data: High

Type of Data Compromised: Patient personal information

Type of Data Compromised: ePHI
Number of Records Exposed: 85,000
Sensitivity of Data: High

Type of Data Compromised: Personal health information, Personal information
Number of Records Exposed: 430000
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesPhone numbersEmail addressesDates of birthRaceGenderSocial Security numbers

Type of Data Compromised: Names, Medical information, Payment information, Insurance information, Government identification, Other personal information

Type of Data Compromised: Medical, Payment, Insurance, Government identification
Number of Records Exposed: 5,599,699
Sensitivity of Data: High

Type of Data Compromised: Personal data, Medical records, Payment information, Insurance details, Government ids
Number of Records Exposed: 5.6 million
Sensitivity of Data: high (PII, PHI, financial data)
Data Exfiltration: yes
Data Encryption: no (RC4 encryption exploited)
Personally Identifiable Information: yes

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: 5,787
Sensitivity of Data: high
Personally Identifiable Information: social security numbersmedical information

Type of Data Compromised: Personal Information
Number of Records Exposed: 5,000,000+
Sensitivity of Data: High
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Free credit and identity theft protection-monitoring services, .

Data Encryption: True

Data Encryption: True

Ransomware Strain: Clop

Data Encryption: yes (ransomware deployed across systems)
Data Exfiltration: yes
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Transparency, Reconnection of supplies, .

Legal Actions: Class action lawsuits

Regulations Violated: HIPAA Security Rule
Fines Imposed: $240,000

Regulatory Notifications: Maine Office of the Attorney General

Legal Actions: Sen. Ron Wyden's call for FTC investigation into Microsoft's default security configurations,
Regulatory Notifications: CISA, FBI, NSA warnings (2023–2024) about RC4/Kerberoasting exploits in healthcare

Regulatory Notifications: Washington State Office of the Attorney General

Regulations Violated: Consumer Protection Laws (six states),
Legal Actions: Proposed class action lawsuit (negligence, negligence per se, consumer protection violations)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class action lawsuits, Sen. Ron Wyden's call for FTC investigation into Microsoft's default security configurations, , Proposed class action lawsuit (negligence, negligence per se, consumer protection violations).

Lessons Learned: Default configurations in enterprise software (e.g., Microsoft Active Directory) can enable large-scale breaches if outdated protocols (e.g., RC4) are retained., Kerberoasting exploits persist due to legacy encryption support, despite decades of warnings., Organizations rarely modify default security settings, placing burden on vendors to enforce secure defaults., Phishing remains a critical initial access vector, especially via default applications (e.g., Microsoft Edge/Bing).

Recommendations: Microsoft should disable RC4 by default immediately (planned for Q1 2026 is insufficient)., Enforce stronger default password policies for privileged accounts (e.g., 14+ characters)., Healthcare sector should prioritize patching Active Directory vulnerabilities and monitoring for Kerberoasting., Vendors must proactively deprecate obsolete encryption standards, even if it risks breaking legacy systems., Public disclosure of timelines for security fixes should be accelerated to reduce exposure windows.Microsoft should disable RC4 by default immediately (planned for Q1 2026 is insufficient)., Enforce stronger default password policies for privileged accounts (e.g., 14+ characters)., Healthcare sector should prioritize patching Active Directory vulnerabilities and monitoring for Kerberoasting., Vendors must proactively deprecate obsolete encryption standards, even if it risks breaking legacy systems., Public disclosure of timelines for security fixes should be accelerated to reduce exposure windows.Microsoft should disable RC4 by default immediately (planned for Q1 2026 is insufficient)., Enforce stronger default password policies for privileged accounts (e.g., 14+ characters)., Healthcare sector should prioritize patching Active Directory vulnerabilities and monitoring for Kerberoasting., Vendors must proactively deprecate obsolete encryption standards, even if it risks breaking legacy systems., Public disclosure of timelines for security fixes should be accelerated to reduce exposure windows.Microsoft should disable RC4 by default immediately (planned for Q1 2026 is insufficient)., Enforce stronger default password policies for privileged accounts (e.g., 14+ characters)., Healthcare sector should prioritize patching Active Directory vulnerabilities and monitoring for Kerberoasting., Vendors must proactively deprecate obsolete encryption standards, even if it risks breaking legacy systems., Public disclosure of timelines for security fixes should be accelerated to reduce exposure windows.Microsoft should disable RC4 by default immediately (planned for Q1 2026 is insufficient)., Enforce stronger default password policies for privileged accounts (e.g., 14+ characters)., Healthcare sector should prioritize patching Active Directory vulnerabilities and monitoring for Kerberoasting., Vendors must proactively deprecate obsolete encryption standards, even if it risks breaking legacy systems., Public disclosure of timelines for security fixes should be accelerated to reduce exposure windows.
Key Lessons Learned: The key lessons learned from past incidents are Default configurations in enterprise software (e.g., Microsoft Active Directory) can enable large-scale breaches if outdated protocols (e.g., RC4) are retained.,Kerberoasting exploits persist due to legacy encryption support, despite decades of warnings.,Organizations rarely modify default security settings, placing burden on vendors to enforce secure defaults.,Phishing remains a critical initial access vector, especially via default applications (e.g., Microsoft Edge/Bing).

Source: California Attorney General's Office

Source: Maine Office of the Attorney General
Date Accessed: 2024-12-19

Source: CyberScoop

Source: Sen. Ron Wyden’s letter to FTC Chair Andrew Ferguson

Source: CISA, FBI, NSA joint advisory (2023–2024) on RC4/Kerberoasting

Source: Washington State Office of the Attorney General
Date Accessed: 2024-12-19

Source: US District Court for the Eastern District of Missouri (Judge John A. Ross ruling)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Attorney General's Office, and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-12-19, and Source: CyberScoop, and Source: Sen. Ron Wyden’s letter to FTC Chair Andrew Ferguson, and Source: CISA, FBI, NSA joint advisory (2023–2024) on RC4/Kerberoasting, and Source: Washington State Office of the Attorney GeneralDate Accessed: 2024-12-19, and Source: US District Court for the Eastern District of Missouri (Judge John A. Ross ruling).

Investigation Status: ongoing (FTC investigation requested by Sen. Wyden)

Investigation Status: Ongoing (class action lawsuit in progress)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified Affected Patients, Transparency and Notifications To Affected Individuals.

Customer Advisories: Notifications to affected individuals

Stakeholder Advisories: Sen. Wyden’S Oversight Findings Shared With Ascension And Microsoft.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notifications To Affected Individuals, and Sen. Wyden’S Oversight Findings Shared With Ascension And Microsoft.

Entry Point: Social Engineering

Entry Point: phishing link clicked via Microsoft Bing/Edge on contractor’s laptop
High Value Targets: Active Directory Administrative Privileges,
Data Sold on Dark Web: Active Directory Administrative Privileges,

Root Causes: Human Error,

Root Causes: Use Of Obsolete Rc4 Encryption In Active Directory (Enabled By Default)., Default Weak Password Policies For Privileged Accounts., Phishing Attack Via Default Microsoft Applications (Edge/Bing)., Lack Of Network Segmentation Allowing Lateral Movement To Thousands Of Systems.,
Corrective Actions: Microsoft’S Planned Deprecation Of Rc4 (Q1 2026 For Active Directory)., Ascension Likely Implemented Stricter Password Policies And Active Directory Monitoring Post-Breach.,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Microsoft’S Planned Deprecation Of Rc4 (Q1 2026 For Active Directory)., Ascension Likely Implemented Stricter Password Policies And Active Directory Monitoring Post-Breach., .
Last Attacking Group: The attacking group in the last incident were an Unauthorized Individual, Black Basta and Clop ransomware group.
Most Recent Incident Detected: The most recent incident detected was on 2021-09-08.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-12-19.
Highest Financial Loss: The highest financial loss from an incident was $240,000.
Most Significant Data Compromised: The most significant data compromised in an incident were full name, date of birth, address(es), email address(es), phone number(s), health insurance information, health insurance identification number, medical records, Social Security numbers, , Personal Information, , Patient personal information, ePHI, Personal health information, Physician names, Admission and discharge dates, Diagnosis and billing codes, Medical record numbers, Insurance company names, Names, Addresses, Phone numbers, Email addresses, Dates of birth, Race, Gender, Social Security numbers, , names, medical information, payment information, insurance information, government identification, other personal information, , Medical Information, Payment Information, Insurance Information, Government Identification Information, , personal data, medical records, payment information, insurance information, government IDs, , social security numbers, medical information, , Personal Information and .
Most Significant System Affected: The most significant system affected in an incident was Electronic Health Record and and Electronic Health Records (EHR)Other Clinical Systems and Electronic health records systemEmergency medical services and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Payment Information, Patient personal information, Insurance Information, Government Identification Information, ePHI, Gender, address(es), email address(es), medical information, Insurance company names, Personal health information, Physician names, Email addresses, phone number(s), Admission and discharge dates, Race, names, government IDs, health insurance identification number, Medical record numbers, Names, Dates of birth, full name, Medical Information, Social Security numbers, payment information, social security numbers, other personal information, personal data, insurance information, Phone numbers, government identification, Diagnosis and billing codes, date of birth, Addresses, Personal Information, medical records and health insurance information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 16.3M.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was $240,000.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class action lawsuits, Sen. Ron Wyden's call for FTC investigation into Microsoft's default security configurations, , Proposed class action lawsuit (negligence, negligence per se, consumer protection violations).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Phishing remains a critical initial access vector, especially via default applications (e.g., Microsoft Edge/Bing).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enforce stronger default password policies for privileged accounts (e.g., 14+ characters)., Public disclosure of timelines for security fixes should be accelerated to reduce exposure windows., Microsoft should disable RC4 by default immediately (planned for Q1 2026 is insufficient)., Healthcare sector should prioritize patching Active Directory vulnerabilities and monitoring for Kerberoasting., Vendors must proactively deprecate obsolete encryption standards and even if it risks breaking legacy systems..
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General, CyberScoop, US District Court for the Eastern District of Missouri (Judge John A. Ross ruling), Sen. Ron Wyden’s letter to FTC Chair Andrew Ferguson, Washington State Office of the Attorney General, CISA, FBI, NSA joint advisory (2023–2024) on RC4/Kerberoasting and California Attorney General's Office.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (FTC investigation requested by Sen. Wyden).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Sen. Wyden’s oversight findings shared with Ascension and Microsoft, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Notifications to affected individuals.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an phishing link clicked via Microsoft Bing/Edge on contractor’s laptop and Social Engineering.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Human Error, Use of obsolete RC4 encryption in Active Directory (enabled by default).Default weak password policies for privileged accounts.Phishing attack via default Microsoft applications (Edge/Bing).Lack of network segmentation allowing lateral movement to thousands of systems..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Microsoft’s planned deprecation of RC4 (Q1 2026 for Active Directory).Ascension likely implemented stricter password policies and Active Directory monitoring post-breach..
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.