Company Details
singingriverhealthsystem
1,643
10,276
62
singingriverhealthsystem.com
2
SIN_1408834
Completed

Singing River Health System Company CyberSecurity Posture
singingriverhealthsystem.comSinging River offers award-winning, comprehensive care for every age and stage. As one of South Mississippi's largest employers and proudly recognized on the Forbes list of America’s Best-In-State Employers, we are committed to the highest quality standards and attracting the best talent available. Singing River provides a seamless approach to healthcare across our three hospitals in Gulfport, Ocean Springs, and Pascagoula, as well as our 10+ primary care clinics and 30+ specialties. We take pride in our Community Benefit and Outreach efforts, offering charitable assistance and participating in numerous educational and community improvement programs. With a team of more than 3,000 employees, we are an asset to the local economy, providing industry-best wages, benefits, and workplace culture. Through this dedication, Singing River improves the health of its community while making it a better place to live and work, and we are honored to be the caregiver of choice. We are dedicated to improving health and saving lives, right here.
Company Details
singingriverhealthsystem
1,643
10,276
62
singingriverhealthsystem.com
2
SIN_1408834
Completed
Between 0 and 549

SRHS Global Score (TPRM)XXXX

Description: The Singing River Health System (SRHS) experienced a severe data breach that affected 895,204 individuals, as reported following updates shared with authorities. A ransomware attack by the group Rhysida in August 2023 disrupted multiple hospitals, leading to a significant data leak which hits nearly one million people. While SRHS has offered credit monitoring and identity restoration services to those impacted, it also faced payment processing issues due to a cyberattack on its payment processor, Change Healthcare.
Description: Singing River Health System experienced a significant data breach affecting 895,204 individuals, with a subsequent update indicating the number impacted was 252,890. This breach was part of a ransomware attack by the Rhysida group, which disrupted hospital systems and leaked a large volume of data. In response, SRHS offered credit monitoring and identity restoration services to those affected. Additionally, Change Healthcare, a payment processor for SRHS, experienced a cyberattack leading to severed ties with SRHS, causing further payment processing issues for the health system.
Description: Singing River Health System discovered strange activity on our network, which led to the shutdown of some internal services. The cyber-attack's nature has been established. All hospitals and clinics have offline computers, and staff personnel are engaged in downtime activities. To ensure that we continue to take care of our patients, the clinical team, the doctors, and all the other professionals at Singing River are literally pulling together and working as a team.
Description: The SRHS suffered a data breach and ransomware attack in 2023, affecting 895,204 individuals. Initially reported in September and updated in December, the breach's impact was significant as personal information of patients was likely compromised. Rhysida ransomware group disrupted hospital systems and released a substantial amount of sensitive data online. Additionally, SRHS faced payment processing issues due to the cyberattack on Change Healthcare, which directly impacted their operations and services.
Description: Singing River Health System (SRHS) experienced a significant data breach and ransomware attack affecting 895,204 individuals, with 420,766 files totaling 754 GB potentially leaked by the Rhysida ransomware group. SRHS reported the breach and provided credit monitoring and identity restoration services to those affected. In addition, the cyberattack caused payment processing issues for SRHS due to the impact on Change Healthcare, their payment processor.
Description: Singing River Health System suffered a data breach and a ransomware attack that affected 895,204 individuals. Initially reported to have impacted 252,890 people, the breach saw Rhysida ransomware group disrupting systems across multiple hospitals, potentially accessing and leaking sensitive health information. Although SRHS has provided credit monitoring and identity restoration services, the full extent of the data compromised remains unclear. The incident has led to ongoing payment processing problems, further complicating the situation for SRHS.
Description: The Singing River Health System experienced a significant data breach and ransomware attack that affected 895,204 individuals. Initially thought to impact 252,890 individuals, the breach and attack disrupted hospital systems and compromised extensive amounts of data. Rhysida, the ransomware group responsible, allegedly leaked about 80% of the data. Despite these issues, there have been no confirmed reports of individual data misuse. SRHS is also grappling with payment processing challenges attributable to a cyberattack on their payment processor, Change Healthcare.
Description: The Vermont Office of the Attorney General reported on January 12, 2024, that Singing River Health System experienced a ransomware attack on August 19, 2023. The attack potentially impacted personal information including names, dates of birth, addresses, Social Security numbers, medical information, and health information. The number of affected individuals is unknown, and no misuse of the data has been reported.


No incidents recorded for Singing River Health System in 2025.
No incidents recorded for Singing River Health System in 2025.
No incidents recorded for Singing River Health System in 2025.
SRHS cyber incidents detection timeline including parent company and subsidiaries

Singing River offers award-winning, comprehensive care for every age and stage. As one of South Mississippi's largest employers and proudly recognized on the Forbes list of America’s Best-In-State Employers, we are committed to the highest quality standards and attracting the best talent available. Singing River provides a seamless approach to healthcare across our three hospitals in Gulfport, Ocean Springs, and Pascagoula, as well as our 10+ primary care clinics and 30+ specialties. We take pride in our Community Benefit and Outreach efforts, offering charitable assistance and participating in numerous educational and community improvement programs. With a team of more than 3,000 employees, we are an asset to the local economy, providing industry-best wages, benefits, and workplace culture. Through this dedication, Singing River improves the health of its community while making it a better place to live and work, and we are honored to be the caregiver of choice. We are dedicated to improving health and saving lives, right here.

Community Health Systems is one of the nation’s leading healthcare providers. Developing and operating healthcare delivery systems across 14 states, CHS is committed to helping people get well and live healthier. CHS affiliates operate 70 acute-care hospitals and more than 1,000 other sites of care,

NorthShore University HealthSystem, Swedish Hospital, Northwest Community Healthcare and Edward-Elmhurst Health are now united under one name: Endeavor Health. Together, we’re driven by our mission to help everyone in our communities be their best and our commitment to setting a new standard for he

Since 1875, the Hospital Sisters of St. Francis have been caring for patients in Illinois, Wisconsin and other locations in the United States and across the world. Today, Hospital Sisters Health System (HSHS) is a multi-institutional health care system that cares for patients in 14 communities in Il

Com cerca de 80 anos de experiência, a Hapvida é hoje a maior empresa de saúde integrada da América Latina. A companhia, que possui mais de 69 mil colaboradores, atende quase 16 milhões de beneficiários de saúde e odontologia espalhados pelas cinco regiões do Brasil. Todo o aparato foi construído a

Kindred’s mission is to help our patients reach their highest potential for health and healing with intensive medical and rehabilitative care through a compassionate patient experience. Kindred’s 61 long-term acute care hospitals (LTACHs), along with 18 community-based, short-term acute care hospit

Ramsay Health Care is a trusted provider of private hospital and healthcare services in Australia, Europe and the United Kingdom. Every year, millions of patients put their trust in Ramsay, confident in our ability to deliver safe, high-quality healthcare with outstanding clinical outcomes. We ope

When it comes to your health, everything matters. That’s why UnitedHealthcare is helping people live healthier lives and making the health system work better for everyone. Our health plans are there for you in moments big and small, delivering a simple experience, affordable coverage, and supportive
Tenet Healthcare Corporation (NYSE: THC) is a diversified healthcare services company headquartered in Dallas. Our care delivery network includes United Surgical Partners International, the largest ambulatory platform in the country, which operates ambulatory surgery centers and surgical hospitals.

Cincinnati Children’s, a nonprofit academic medical center established in 1883, offers services from well-child care to treatment for the most rare and complex conditions. It is the Department of Pediatrics at the University of Cincinnati College of Medicine and trains more than 600 residents and cl
.png)
Plaintiffs are facing a higher bar on what constitutes 'harm' when their personal data is exposed, lawyers say.
A data breach affecting Pennsylvania's largest workers and teachers' union, the Pennsylvania State Education Association (PSEA), has exposed the personal...
In this period, ransomware activities displayed dynamic trends, with prominent shifts observed among top groups, with LockBit experiencing...
The impact of last year's ransomware attack on a Mississippi health system was larger than initially thought.
In today's cybersecurity news… Singing River patient data was swiped in ransomware attack. Mississippi-based Singing River Health System has...
Singing River Hospital System said this week close to 900,000 patients had their personal information disclosed to hackers as the result of...
At least two lawsuits have been filed over a data breach at Singing River Health System that compromised the personal information of 250000...
Franciscan Missionaries of Our Lady Health System had been in talks to buy the Singing River Health System, but both sides have ended the...
The operators of the Rhysida ransomware-as-a-service have claimed credit for a crippling attack on Mississippi's Singing River health...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Singing River Health System is http://www.singingriverhealthsystem.com.
According to Rankiteo, Singing River Health System’s AI-generated cybersecurity score is 100, reflecting their Critical security posture.
According to Rankiteo, Singing River Health System currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Singing River Health System is not certified under SOC 2 Type 1.
According to Rankiteo, Singing River Health System does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Singing River Health System is not listed as GDPR compliant.
According to Rankiteo, Singing River Health System does not currently maintain PCI DSS compliance.
According to Rankiteo, Singing River Health System is not compliant with HIPAA regulations.
According to Rankiteo,Singing River Health System is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Singing River Health System operates primarily in the Hospitals and Health Care industry.
Singing River Health System employs approximately 1,643 people worldwide.
Singing River Health System presently has no subsidiaries across any sectors.
Singing River Health System’s official LinkedIn profile has approximately 10,276 followers.
Singing River Health System is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Singing River Health System does not have a profile on Crunchbase.
Yes, Singing River Health System maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/singingriverhealthsystem.
As of November 27, 2025, Rankiteo reports that Singing River Health System has experienced 8 cybersecurity incidents.
Singing River Health System has an estimated 29,962 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Ransomware and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with offered credit monitoring and identity restoration services, and remediation measures with credit monitoring, remediation measures with identity restoration services, and remediation measures with credit monitoring and identity restoration services, and communication strategy with provided credit monitoring and identity restoration services..
Title: Cyber Attack on Singing River Health System
Description: Singing River Health System discovered strange activity on our network, which led to the shutdown of some internal services. The cyber-attack's nature has been established. All hospitals and clinics have offline computers, and staff personnel are engaged in downtime activities. To ensure that we continue to take care of our patients, the clinical team, the doctors, and all the other professionals at Singing River are literally pulling together and working as a team.
Type: Cyber Attack
Title: Singing River Health System Ransomware Data Breach
Description: The Singing River Health System (SRHS) experienced a severe data breach that affected 895,204 individuals, as reported following updates shared with authorities. A ransomware attack by the group Rhysida in August 2023 disrupted multiple hospitals, leading to a significant data leak which hits nearly one million people. While SRHS has offered credit monitoring and identity restoration services to those impacted, it also faced payment processing issues due to a cyberattack on its payment processor, Change Healthcare.
Date Detected: August 2023
Type: Ransomware
Attack Vector: Ransomware Attack
Threat Actor: Rhysida
Title: SRHS Data Breach and Ransomware Attack
Description: The SRHS suffered a data breach and ransomware attack in 2023, affecting 895,204 individuals. Initially reported in September and updated in December, the breach's impact was significant as personal information of patients was likely compromised. Rhysida ransomware group disrupted hospital systems and released a substantial amount of sensitive data online. Additionally, SRHS faced payment processing issues due to the cyberattack on Change Healthcare, which directly impacted their operations and services.
Date Detected: 2023-09
Date Publicly Disclosed: 2023-09
Type: Data Breach
Threat Actor: Rhysida ransomware group
Title: Singing River Health System Data Breach and Ransomware Attack
Description: Singing River Health System experienced a significant data breach affecting 895,204 individuals, with a subsequent update indicating the number impacted was 252,890. This breach was part of a ransomware attack by the Rhysida group, which disrupted hospital systems and leaked a large volume of data. In response, SRHS offered credit monitoring and identity restoration services to those affected. Additionally, Change Healthcare, a payment processor for SRHS, experienced a cyberattack leading to severed ties with SRHS, causing further payment processing issues for the health system.
Type: Data Breach and Ransomware Attack
Threat Actor: Rhysida group
Title: Singing River Health System Data Breach and Ransomware Attack
Description: Singing River Health System (SRHS) experienced a significant data breach and ransomware attack affecting 895,204 individuals, with 420,766 files totaling 754 GB potentially leaked by the Rhysida ransomware group. SRHS reported the breach and provided credit monitoring and identity restoration services to those affected. In addition, the cyberattack caused payment processing issues for SRHS due to the impact on Change Healthcare, their payment processor.
Type: Data Breach
Threat Actor: Rhysida ransomware group
Title: Singing River Health System Data Breach and Ransomware Attack
Description: The Singing River Health System experienced a significant data breach and ransomware attack that affected 895,204 individuals. Initially thought to impact 252,890 individuals, the breach and attack disrupted hospital systems and compromised extensive amounts of data. Rhysida, the ransomware group responsible, allegedly leaked about 80% of the data. Despite these issues, there have been no confirmed reports of individual data misuse. SRHS is also grappling with payment processing challenges attributable to a cyberattack on their payment processor, Change Healthcare.
Type: Data Breach, Ransomware Attack
Threat Actor: Rhysida
Title: Singing River Health System Data Breach and Ransomware Attack
Description: Singing River Health System suffered a data breach and a ransomware attack that affected 895,204 individuals. Initially reported to have impacted 252,890 people, the breach saw Rhysida ransomware group disrupting systems across multiple hospitals, potentially accessing and leaking sensitive health information. Although SRHS has provided credit monitoring and identity restoration services, the full extent of the data compromised remains unclear. The incident has led to ongoing payment processing problems, further complicating the situation for SRHS.
Type: Data Breach
Threat Actor: Rhysida ransomware group
Title: Singing River Health System Ransomware Attack
Description: The Vermont Office of the Attorney General reported on January 12, 2024, that Singing River Health System experienced a ransomware attack on August 19, 2023, potentially impacting personal information including names, dates of birth, addresses, Social Security numbers, medical information, and health information. The number of affected individuals is unknown, and no misuse of the data has been reported.
Date Detected: 2023-08-19
Date Publicly Disclosed: 2024-01-12
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Yes
Systems Affected: Multiple hospitals
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Personal information of patients
Systems Affected: Hospital systems
Operational Impact: Payment processing issuesDisrupted hospital systems

Data Compromised: Personally identifiable information, Payment information
Systems Affected: Hospital Systems
Operational Impact: Disruption of Hospital SystemsPayment Processing Issues

Data Compromised: 420,766 files totaling 754 GB
Operational Impact: Payment processing issues

Data Compromised: Extensive amounts of data
Systems Affected: Hospital systems
Payment Information Risk: Payment processing challenges

Data Compromised: Sensitive health information
Systems Affected: Multiple hospitals
Operational Impact: Ongoing payment processing problems

Data Compromised: Names, Dates of birth, Addresses, Social security numbers, Medical information, Health information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal information, Personally Identifiable Information, Payment Information, , Sensitive Health Information, , Names, Dates Of Birth, Addresses, Social Security Numbers, Medical Information, Health Information and .

Entity Name: Singing River Health System
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Singing River Health System
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 895204

Entity Name: SRHS
Entity Type: Hospital
Industry: Healthcare
Customers Affected: 895204

Entity Name: Singing River Health System
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 895204, 252890

Entity Name: Singing River Health System
Entity Type: Healthcare System
Industry: Healthcare
Customers Affected: 895,204 individuals

Entity Name: Singing River Health System
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 895,204 individuals

Entity Name: Singing River Health System
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: 895,204

Entity Name: Singing River Health System
Entity Type: Healthcare
Industry: Healthcare

Remediation Measures: Offered credit monitoring and identity restoration services

Remediation Measures: Credit MonitoringIdentity Restoration Services

Remediation Measures: Credit monitoring and identity restoration services

Communication Strategy: Provided credit monitoring and identity restoration services

Number of Records Exposed: 895204

Type of Data Compromised: Personal information
Number of Records Exposed: 895204

Type of Data Compromised: Personally identifiable information, Payment information
Number of Records Exposed: 895204, 252890

Number of Records Exposed: 895,204

Number of Records Exposed: 895,204
Data Exfiltration: 80% of the data

Type of Data Compromised: Sensitive health information
Number of Records Exposed: 895,204

Type of Data Compromised: Names, Dates of birth, Addresses, Social security numbers, Medical information, Health information
Sensitivity of Data: High
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Offered credit monitoring and identity restoration services, Credit Monitoring, Identity Restoration Services, , Credit monitoring and identity restoration services.

Ransomware Strain: Rhysida

Ransomware Strain: Rhysida

Ransomware Strain: Rhysida
Data Exfiltration: 80% of the data

Ransomware Strain: Rhysida

Source: Vermont Office of the Attorney General
Date Accessed: 2024-01-12
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney GeneralDate Accessed: 2024-01-12.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Provided Credit Monitoring And Identity Restoration Services.
Last Attacking Group: The attacking group in the last incident were an Rhysida, Rhysida ransomware group, Rhysida group, Rhysida ransomware group, Rhysida and Rhysida ransomware group.
Most Recent Incident Detected: The most recent incident detected was on August 2023.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-01-12.
Most Significant Data Compromised: The most significant data compromised in an incident were Yes, Personal information of patients, Personally Identifiable Information, Payment Information, , 420,766 files totaling 754 GB, Extensive amounts of data, Sensitive health information, , names, dates of birth, addresses, Social Security numbers, medical information, health information and .
Most Significant System Affected: The most significant system affected in an incident was internal servicescomputers and and and Hospital Systems and and Multiple hospitals.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were dates of birth, names, health information, medical information, Payment Information, Sensitive health information, Personal information of patients, Personally Identifiable Information, 420,766 files totaling 754 GB, Extensive amounts of data, Social Security numbers, addresses and Yes.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.7M.
Most Recent Source: The most recent source of information about an incident is Vermont Office of the Attorney General.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.