A series of significant data breaches in the U.S. healthcare sector has exposed the sensitive personal and medical data of an undisclosed number of patients. The incidents affect Modernizing Medicine (ModMed), an EHR provider; Right at Home, a home healthcare company; and LifeBridge Health, a major Baltimore health system. The attack vectors vary, including a direct network intrusion, a ransomware attack claimed by the Sinobi group, and a third-party breach originating from vendor Oracle Health. These breaches highlight the immense pressure on healthcare organizations to protect patient data (PHI) from a variety of threats, from direct attacks to vulnerabilities within their complex supply chains.
The breaches reveal a multi-pronged assault on healthcare data:
Modernizing Medicine (ModMed): This direct breach involved attackers gaining unauthorized access to ModMed's servers between July 9-10, 2025, and copying files containing a wide array of patient data. The breach was identified on July 21, but notification letters were not sent to individuals until October 17, a three-month delay.
Right at Home: This provider of in-home care for seniors and adults with disabilities was targeted by the Sinobi ransomware group. The attackers claimed to have exfiltrated 50 GB of data before encrypting systems. The incident was detected on September 3, 2025, and the ransomware group posted their claim on October 8.
LifeBridge Health: This breach was the result of a supply chain attack. The incident originated at their vendor, Oracle Health. Oracle notified LifeBridge of the breach in March 2025, but public notification was delayed for months at the request of law enforcement, with a final list of affected individuals only provided to LifeBridge on September 19, 2025.
The exposure of Protected Health Information (PHI) carries severe consequences:
M1041 - Encrypt Sensitive Information).Encrypting PHI at rest and in transit is a fundamental HIPAA requirement and can render stolen data useless to attackers.
Strictly controlling and monitoring access to systems containing PHI can prevent unauthorized access and lateral movement.
The LifeBridge Health breach, originating from Oracle Health, underscores the critical need for healthcare organizations to manage supply chain risk. Implement a comprehensive Vendor Asset Management program that includes stringent security assessments for any vendor handling PHI. Business Associate Agreements (BAAs) must contain specific, aggressive timelines for breach notification, far stricter than the 60 days allowed by HIPAA, to prevent the months-long delays seen in this incident. Regularly audit vendors and use third-party risk monitoring services to get continuous visibility into their security posture. Assume that a breach in your vendor's environment is a breach of your own, and build response plans accordingly.
To combat both direct intrusions like the one at ModMed and ransomware attacks like the one at Right at Home, healthcare organizations must monitor for data exfiltration. Deploy Network Traffic Analysis tools with a focus on egress points. Baseline normal data flows and configure high-severity alerts for large, anomalous data transfers from servers containing EHR/PHI data to external IP addresses. Since the Sinobi group exfiltrated 50 GB of data, detecting such a large transfer before the final encryption stage is a critical opportunity for intervention. This allows incident response teams to isolate affected systems and potentially prevent a full-blown ransomware event.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats