Nearly 600,000 Patients Affected by Data Breaches at Three U.S. Healthcare Providers

Data Breaches at Healthcare Organizations in Illinois and Texas Impact Nearly 600,000

HIGH
April 21, 2026
6m read
Data BreachRansomwarePolicy and Compliance

Impact Scope

People Affected

nearly 600,000

Industries Affected

Healthcare

Geographic Impact

United States (national)

Related Entities

Threat Actors

InsomniaLockBit

Organizations

U.S. Department of Health and Human Services (HHS)

Other

North Texas Behavioral Health AuthoritySouthern Illinois DermatologySaint Anthony Hospital

Full Report

Executive Summary

Three U.S. healthcare organizations have reported significant data breaches to the U.S. Department of Health and Human Services (HHS), collectively impacting nearly 600,000 patients. The incidents, which occurred in Texas and Illinois, involve network intrusions and compromised business email accounts, leading to the unauthorized access and potential exfiltration of highly sensitive Personally Identifiable Information (PII) and Protected Health Information (PHI). The affected entities are the North Texas Behavioral Health Authority (285,000 individuals), Southern Illinois Dermatology (160,000 individuals), and Saint Anthony Hospital in Chicago (146,000 individuals). The breach at Southern Illinois Dermatology was previously claimed by the Insomnia ransomware group, underscoring the direct link between cyberattacks and large-scale data exposure in the healthcare sector.


Threat Overview

The healthcare industry remains a prime target for cybercriminals due to the high value of stolen medical data and the critical nature of its operations, which makes it more likely to pay ransoms. These three incidents showcase different but common attack vectors targeting the sector.

  • North Texas Behavioral Health Authority: This was a network server breach. Attackers gained access to the network between October 13 and October 15, 2025, and were able to access files containing PII for 285,000 individuals. This type of intrusion often results from an unpatched vulnerability, a phishing attack, or compromised credentials.

  • Southern Illinois Dermatology: This incident, affecting 160,000 people, was also a network compromise. The Insomnia ransomware group claimed responsibility in February 2026, posting the clinic on its leak site and later leaking the stolen data. This is a classic double-extortion attack where data is both encrypted and stolen.

  • Saint Anthony Hospital: This breach, impacting 146,000, resulted from a compromised email account. In February 2025, attackers gained access to two employee email inboxes containing patient PII and PHI. While the hospital stated this was unrelated, it has a history of being targeted, having been listed as a victim by the LockBit ransomware group in January 2024.

Technical Analysis

While technical details are sparse, we can infer the likely TTPs based on the attack types.

Network Intrusion (North Texas BHA, Southern Illinois Dermatology):

  1. Initial Access: Likely achieved through exploiting a public-facing vulnerability, a successful phishing campaign, or using stolen remote access credentials.
  2. Lateral Movement & Discovery: Attackers would have moved through the network to identify and access file servers containing patient data.
  3. Data Staging & Exfiltration: Before deploying ransomware (in the Insomnia case), the attackers would have collected and compressed large volumes of data and exfiltrated it to their own servers.
  4. Impact: For the ransomware attack, the final stage would be encrypting the files (T1486).

Business Email Compromise (Saint Anthony Hospital):

  1. Credential Theft: The employee email account credentials were likely stolen via a phishing email or credential stuffing attack.
  2. Unauthorized Access: The attacker logged into the email accounts.
  3. Data Mining: The attacker searched the mailboxes for sensitive information, attachments, and contacts, potentially setting up forwarding rules to monitor communications covertly.

MITRE ATT&CK TTPs:

Impact Assessment

The impact on the nearly 600,000 affected individuals is severe. The compromised data, including names, addresses, Social Security numbers, and medical information, can be used for identity theft, financial fraud, and highly targeted phishing scams. For the healthcare providers, the consequences include significant financial costs for incident response, legal fees, regulatory fines under HIPAA, and long-term reputational damage. The disruption caused by such attacks can also impact patient care, leading to canceled appointments and delayed treatments, which poses a direct risk to patient safety.

IOCs — Directly from Articles

No specific file hashes, IP addresses, or domains were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams in healthcare can hunt for the following general patterns:

Type
Log Source
Value
VPN Logs
Description
Look for logins from unusual geographic locations or multiple failed attempts followed by success.
Context
Remote access logs.
Type
Network Traffic Pattern
Value
Large data transfers from internal file servers to external IP addresses.
Description
This could indicate data staging and exfiltration prior to a ransomware attack.
Context
NetFlow, Firewall logs.
Type
Email Log Pattern
Value
New-InboxRule or Set-InboxRule PowerShell commands
Description
In Exchange/M365 logs, this can detect attackers creating malicious forwarding rules in compromised mailboxes.
Context
Microsoft 365 audit logs.
Type
Process Name
Value
vssadmin.exe delete shadows
Description
A common precursor to ransomware deployment, aimed at preventing easy recovery.
Context
EDR, Windows Event ID 4688.

Detection & Response

Detection:

  1. Email Security: Implement advanced email filtering to detect phishing attempts. Monitor M365/Exchange audit logs for suspicious login activity and inbox rule creation.
  2. Network Monitoring: Use network intrusion detection systems (NIDS) and monitor for large outbound data transfers.
  3. Endpoint Detection: Deploy EDR solutions to detect ransomware-related behaviors like shadow copy deletion and mass file encryption.
  4. Threat Intelligence: Monitor dark web forums and ransomware leak sites for mentions of your organization's name or data.

Response:

  1. Containment: Isolate affected systems or network segments to prevent further damage.
  2. Credential Reset: In an email compromise, immediately reset the password for the affected account, revoke all active sessions, and review for malicious rules.
  3. Investigation: Engage a third-party cybersecurity firm to conduct a forensic investigation to determine the scope and root cause of the breach.
  4. Notification: Comply with all legal and regulatory notification requirements (e.g., HHS, state attorneys general, affected individuals).

Mitigation

  1. Multi-Factor Authentication (MFA): Mandate MFA for all accounts, especially for email, VPN, and other remote access systems.
  2. Patch Management: Maintain a rigorous patch management program to address vulnerabilities in servers, network devices, and endpoints in a timely manner.
  3. Employee Training: Conduct regular security awareness training to help employees recognize and report phishing attempts.
  4. Data Encryption: Encrypt sensitive patient data both at rest and in transit to make it unusable to attackers if stolen.
  5. Backup and Recovery: Maintain regular, tested, and offline backups of critical data to ensure you can recover from a ransomware attack without paying.

Timeline of Events

1
February 1, 2025
Two employee email accounts at Saint Anthony Hospital are compromised.
2
October 13, 2025
Network intrusion begins at North Texas Behavioral Health Authority, lasting until Oct 15.
3
November 30, 2025
Southern Illinois Dermatology becomes aware of a cybersecurity incident on its network.
4
February 1, 2026
The Insomnia ransomware group lists Southern Illinois Dermatology on its leak site.
5
April 21, 2026
This article was published

MITRE ATT&CK Mitigations

Crucial for preventing email account takeovers and unauthorized remote access, which were vectors in these breaches.

Mapped D3FEND Techniques:

Regular security awareness training helps staff identify and report phishing attempts, a common initial access vector.

Encrypting patient data at rest on servers and databases can render it useless to attackers even if they manage to exfiltrate it.

Mapped D3FEND Techniques:

Comprehensive logging and monitoring of network access, file access, and email account activity is essential for early detection of breaches.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect incidents like the network intrusions at North Texas BHA and Southern Illinois Dermatology, healthcare organizations should deploy User and Entity Behavior Analytics (UEBA) solutions. These tools baseline normal user activity—such as which files they access, from where, and at what times. The system could have flagged the attacker's activity at North Texas BHA, which occurred over a specific 3-day period, as anomalous. For the Saint Anthony Hospital email compromise, a UEBA tool integrated with Microsoft 365 could have detected the impossible travel scenario (e.g., login from a new country), access to an unusually large number of mail items, or the creation of malicious inbox rules. By alerting security teams to these deviations from normal behavior, UEBA can provide early warning of a compromised account or an intruder moving laterally within the network, enabling faster response before a full-blown data breach occurs.

In the context of the Insomnia ransomware attack on Southern Illinois Dermatology, having a robust file restoration capability is the most critical component of resilience. This goes beyond simple backups. Healthcare organizations must adhere to the 3-2-1 backup rule: three copies of data, on two different media types, with one copy stored offline and immutable (air-gapped). The offline, immutable copy is the key defense against ransomware that actively targets and encrypts connected backups. Restoration procedures must be tested regularly to ensure they are effective and to meet recovery time objectives (RTOs). Had Southern Illinois Dermatology been able to quickly restore their systems from immutable backups, the operational impact of the encryption would have been minimized, reducing the pressure to pay the ransom. While this doesn't prevent the data exfiltration aspect of the double-extortion attack, it ensures continuity of patient care and business operations.

Sources & References

Three US healthcare orgs disclose size of data breaches
Cybernews (cybernews.com) April 21, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

healthcaredata breachHIPAAransomwareInsomniaLockBitPIIPHI

📢 Share This Article

Help others stay informed about cybersecurity threats