Company Details
rangely-district-hospital
66
238
62
rangelyhospital.org
0
RAN_1076964
In-progress

Rangely District Hospital Company CyberSecurity Posture
rangelyhospital.orgRangely District Hospital is a 25 bed Critical Access Hospital and Level IV Trauma Center, located at 225 Eagle Crest Drive, Rangely, CO, 81648.
Company Details
rangely-district-hospital
66
238
62
rangelyhospital.org
0
RAN_1076964
In-progress
Between 750 and 799

RDH Global Score (TPRM)XXXX

Description: Rangely District Hospital (RDH) experienced a ransomware attack in April 2020. Parts of the hospital’s computer network were attacked by ransomware, including some files containing patients’ health information and other files necessary to view certain patient information. Software used by the hospital to access some database records entered between August 2012 and August 2017 was infected by ransomware, causing a loss of access. Records affected included names, dates of birth, social security numbers, addresses, telephone numbers, driver’s license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, and health insurance and claims and billing information.


No incidents recorded for Rangely District Hospital in 2025.
No incidents recorded for Rangely District Hospital in 2025.
No incidents recorded for Rangely District Hospital in 2025.
RDH cyber incidents detection timeline including parent company and subsidiaries

Rangely District Hospital is a 25 bed Critical Access Hospital and Level IV Trauma Center, located at 225 Eagle Crest Drive, Rangely, CO, 81648.


Atrium Health, part of Advocate Health, is redefining how, when and where care is delivered. We are rethinking methods of care delivery to reach more people and bringing human kindness to every step of their health journey. Our dedication to elevating health care for every individual, every teammate
Select Medical made a commitment more than 20 years ago to deliver an exceptional patient care experience that promotes healing and recovery in a compassionate environment. We have honored that promise by helping define the nation's standard of excellence in specialized hospital and rehabilitative c

We are a strong, passionate team of more than 12,500 who take pride in caring for every person who comes through our doors. We lift each other up so we can provide the very best and safest care to those who need us most. Together. Every day. With the support of our university, we make up an acade
Johns Hopkins Medicine is a governing structure for the University’s School of Medicine and the health system, coordinating their research, teaching, patient care, and related enterprises. The Johns Hopkins Hospital opened in 1889, followed four years later by the university’s School of Medicine
DaVita means “to give life,” reflecting our proud history as leaders in dialysis—an essential, life-sustaining treatment for those living with end stage kidney disease (ESKD). Today, our mission is to minimize the devastating impacts of kidney disease across the full spectrum of kidney health care.

The Mount Sinai Health System is an integrated health system committed to providing distinguished care, conducting transformative research, and advancing biomedical education. Structured around seven hospital campuses and a single medical school, the Health System has an extensive ambulatory netwo

Leading Private Healthcare Provider in the Middle East With a vision to be the most trusted healthcare provider in medical excellence and patient experience globally, Dr. Sulaiman Al-Habib Medical Group (HMG) has become the largest provider of comprehensive healthcare services in the Middle East. A

Molina Healthcare is a FORTUNE 500 company that is focused exclusively on government-sponsored health care programs for families and individuals who qualify for government sponsored health care. Molina Healthcare contracts with state governments and serves as a health plan providing a wide range o
Every day millions of people feel the impact of our intelligent devices, advanced analytics and artificial intelligence. As a leading global medical technology and digital solutions innovator, GE HealthCare enables clinicians to make faster, more informed decisions through intelligent devices, data
.png)
Between data exfiltration and frozen operations, ransomware is compromising the weakest elements of critical infrastructure.
If Debbie Wilmot could turn back time, the city of Lafayette would have scanned its computer network regularly. It would have hunted down...
The medical school was hit by an opportunistic malware attack on June 1, and the encrypted data was "important to some of the academic work...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Rangely District Hospital is http://www.rangelyhospital.org.
According to Rankiteo, Rangely District Hospital’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, Rangely District Hospital currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Rangely District Hospital is not certified under SOC 2 Type 1.
According to Rankiteo, Rangely District Hospital does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Rangely District Hospital is not listed as GDPR compliant.
According to Rankiteo, Rangely District Hospital does not currently maintain PCI DSS compliance.
According to Rankiteo, Rangely District Hospital is not compliant with HIPAA regulations.
According to Rankiteo,Rangely District Hospital is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Rangely District Hospital operates primarily in the Hospitals and Health Care industry.
Rangely District Hospital employs approximately 66 people worldwide.
Rangely District Hospital presently has no subsidiaries across any sectors.
Rangely District Hospital’s official LinkedIn profile has approximately 238 followers.
Rangely District Hospital is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Rangely District Hospital does not have a profile on Crunchbase.
Yes, Rangely District Hospital maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rangely-district-hospital.
As of December 15, 2025, Rankiteo reports that Rangely District Hospital has experienced 1 cybersecurity incidents.
Rangely District Hospital has an estimated 31,246 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: Ransomware Attack on Rangely District Hospital
Description: Rangely District Hospital (RDH) experienced a ransomware attack in April 2020. Parts of the hospital’s computer network were attacked by ransomware, including some files containing patients’ health information and other files necessary to view certain patient information. Software used by the hospital to access some database records entered between August 2012 and August 2017 was infected by ransomware, causing a loss of access. Records affected included names, dates of birth, social security numbers, addresses, telephone numbers, driver’s license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, and health insurance and claims and billing information.
Date Detected: April 2020
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Names, Dates of birth, Social security numbers, Addresses, Telephone numbers, Driver’s license copies, Dates of service or hospital admissions, Diagnoses and conditions, Treatment or procedure notes and orders, Imaging studies, Medications, Health insurance and claims and billing information
Systems Affected: hospital’s computer networksoftware to access database records
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Dates Of Birth, Social Security Numbers, Addresses, Telephone Numbers, Driver’S License Copies, Dates Of Service Or Hospital Admissions, Diagnoses And Conditions, Treatment Or Procedure Notes And Orders, Imaging Studies, Medications, Health Insurance And Claims And Billing Information and .

Entity Name: Rangely District Hospital
Entity Type: Healthcare
Industry: Healthcare

Type of Data Compromised: Names, Dates of birth, Social security numbers, Addresses, Telephone numbers, Driver’s license copies, Dates of service or hospital admissions, Diagnoses and conditions, Treatment or procedure notes and orders, Imaging studies, Medications, Health insurance and claims and billing information
Sensitivity of Data: High

Data Encryption: True
Most Recent Incident Detected: The most recent incident detected was on April 2020.
Most Significant Data Compromised: The most significant data compromised in an incident were names, dates of birth, social security numbers, addresses, telephone numbers, driver’s license copies, dates of service or hospital admissions, diagnoses and conditions, treatment or procedure notes and orders, imaging studies, medications, health insurance and claims and billing information and .
Most Significant System Affected: The most significant system affected in an incident was hospital’s computer networksoftware to access database records.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were social security numbers, imaging studies, dates of service or hospital admissions, names, diagnoses and conditions, medications, dates of birth, health insurance and claims and billing information, addresses, telephone numbers, treatment or procedure notes and orders and driver’s license copies.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.