Company Details
umc-health-system
1,914
9,055
62
https://www.umchealthsystem.com/
87
UMC_2859587
Completed

UMC Health System Company CyberSecurity Posture
https://www.umchealthsystem.com/UMC Health System is comprised of over 4,600 team members who have made our organization “One of the Best Companies to Work for in Texas®” by Texas Monthly. Together with medical staff, volunteers, and leadership, we share a strong commitment to our patients—Our Passion is You! Why choose UMC? Because we are teaching the leaders of tomorrow while offering a culture of service today.
Company Details
umc-health-system
1,914
9,055
62
https://www.umchealthsystem.com/
87
UMC_2859587
Completed
Between 650 and 699

UHS Global Score (TPRM)XXXX

Description: UMC Health System, based in Lubbock, Texas and affiliated with Texas Tech University Health Sciences Center, suffered a ransomware attack leading to a network outage. The incident forced the healthcare provider to divert incoming emergency and non-emergency patients to nearby facilities, causing disruptions to their operations and potentially impacting patient care. The hospital took IT systems offline to contain the threat and engaged third-party cybersecurity experts to assist with the investigation and response. Some systems were restored by Monday following the attack, but the complete extent of the breach, including whether patient data was exfiltrated, remains unclear.


No incidents recorded for UMC Health System in 2025.
No incidents recorded for UMC Health System in 2025.
No incidents recorded for UMC Health System in 2025.
UHS cyber incidents detection timeline including parent company and subsidiaries

UMC Health System is comprised of over 4,600 team members who have made our organization “One of the Best Companies to Work for in Texas®” by Texas Monthly. Together with medical staff, volunteers, and leadership, we share a strong commitment to our patients—Our Passion is You! Why choose UMC? Because we are teaching the leaders of tomorrow while offering a culture of service today.

Northwestern Medicine is the collaboration between Northwestern Memorial HealthCare and Northwestern University Feinberg School of Medicine around a strategic vision to transform the future of health care. It encompasses the research, teaching, and patient care activities of the academic medical cen

At UCHealth, we do things differently. We strive to promote individual and community health and leave no question unanswered along the way. We’re driven to improve and optimize health care. Our network of nationally-recognized hospitals, clinic locations and health care providers extends throughout

Welcome to the official LinkedIn page for McKesson Corporation. We're an impact-driven healthcare organization dedicated to “Advancing Health Outcomes For All.” As a global healthcare company, we touch virtually every aspect of health. Our leaders empower our people to lead with a growth mindset an

The Medical University of South Carolina (MUSC) is a public institution of higher learning the purpose of which is to preserve and optimize human life in South Carolina and beyond. The university provides an interprofessional environment for learning and discovery through education of health care p

We provide quality, compassionate health care at more than 40 hospitals and care centers that are serving communities across California, Arizona and Nevada every minute of every day. And while not everyone may live near a major medical facility, Dignity Health is making health care more accessible b

Formed in 1994, Brown University Health (Formerly Lifespan) is a not-for-profit health system based in Providence, RI comprising three teaching hospitals of The Warren Alpert Medical School of Brown University: Rhode Island Hospital and its Hasbro Children's; The Miriam Hospital; and Bradley Hospita

OSF HealthCare is an integrated health system founded by The Sisters of the Third Order of St. Francis. Headquartered in Peoria, Illinois, OSF HealthCare has 17 hospitals – 11 acute care, five critical access and one continuing care – with 2,305 licensed beds throughout Illinois and Michigan. OSF e

We are Erasmus MC. Our roots lie in Rotterdam, a city and port of international standing. We are the most innovative university medical center in the Netherlands and one of the world’s leading centers of scientific research. We are committed to achieving a healthy population and pursuing excellence

Com cerca de 80 anos de experiência, a Hapvida é hoje a maior empresa de saúde integrada da América Latina. A companhia, que possui mais de 69 mil colaboradores, atende quase 16 milhões de beneficiários de saúde e odontologia espalhados pelas cinco regiões do Brasil. Todo o aparato foi construído a
.png)
The FBI confirmed it is helping the state of Nevada with an investigation after the state closed its offices early over a “network security...
Lee Health is pleased to announce that Chris Akeroyd has been selected to serve as the health system's new Chief Information Officer.
A cybersecurity attack against the Texas Tech Health Sciences Centers (HSCs) in Lubbock and El Paso last year cost $2 million plus an unknown amount in lost...
University Medical Center (UMC) paid a ransom (via insurance) to get its computer data back after a security breach in September.
The Cyber Express brings the healthcare cybersecurity trends of 2024, highlighting the top ransomware attacks, and key incidents of this year.
LUBBOCK, Texas (KCBD) - We now know how many people may have been affected by recent cyberattacks in Lubbock.
A large volume of patient data was exfiltrated in a September ransomware attack involving systems shared by Texas Tech University Health Sciences Center.
LUBBOCK, Texas — On Monday, the CEO of UMC Health System released a statement of gratitude to the community after a cybersecurity incident,...
Last week in ransomware news we saw the Blue Yonder attack disrupt supply chains, challenges continue following UMC Health attack,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of UMC Health System is https://www.umchealthsystem.com/.
According to Rankiteo, UMC Health System’s AI-generated cybersecurity score is 691, reflecting their Weak security posture.
According to Rankiteo, UMC Health System currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, UMC Health System is not certified under SOC 2 Type 1.
According to Rankiteo, UMC Health System does not hold a SOC 2 Type 2 certification.
According to Rankiteo, UMC Health System is not listed as GDPR compliant.
According to Rankiteo, UMC Health System does not currently maintain PCI DSS compliance.
According to Rankiteo, UMC Health System is not compliant with HIPAA regulations.
According to Rankiteo,UMC Health System is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
UMC Health System operates primarily in the Hospitals and Health Care industry.
UMC Health System employs approximately 1,914 people worldwide.
UMC Health System presently has no subsidiaries across any sectors.
UMC Health System’s official LinkedIn profile has approximately 9,055 followers.
UMC Health System is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, UMC Health System does not have a profile on Crunchbase.
Yes, UMC Health System maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/umc-health-system.
As of December 18, 2025, Rankiteo reports that UMC Health System has experienced 1 cybersecurity incidents.
UMC Health System has an estimated 31,342 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with engaged third-party cybersecurity experts, and containment measures with took it systems offline, and recovery measures with some systems were restored by monday..
Title: Ransomware Attack on UMC Health System
Description: UMC Health System, based in Lubbock, Texas and affiliated with Texas Tech University Health Sciences Center, suffered a ransomware attack leading to a network outage. The incident forced the healthcare provider to divert incoming emergency and non-emergency patients to nearby facilities, causing disruptions to their operations and potentially impacting patient care. The hospital took IT systems offline to contain the threat and engaged third-party cybersecurity experts to assist with the investigation and response. Some systems were restored by Monday following the attack, but the complete extent of the breach, including whether patient data was exfiltrated, remains unclear.
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Operational Impact: Disruptions to operations and potential impact on patient care

Entity Name: UMC Health System
Entity Type: Healthcare Provider
Industry: Healthcare
Location: Lubbock, Texas

Third Party Assistance: Engaged third-party cybersecurity experts
Containment Measures: Took IT systems offline
Recovery Measures: Some systems were restored by Monday
Third-Party Assistance: The company involves third-party assistance in incident response through Engaged third-party cybersecurity experts.

Data Exfiltration: Unclear if patient data was exfiltrated
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by took it systems offline.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Some systems were restored by Monday.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Engaged third-party cybersecurity experts.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Engaged third-party cybersecurity experts.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Took IT systems offline.
.png)
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.