nearly 600,000
Three U.S. healthcare organizations have reported significant data breaches to the U.S. Department of Health and Human Services (HHS), collectively impacting nearly 600,000 patients. The incidents, which occurred in Texas and Illinois, involve network intrusions and compromised business email accounts, leading to the unauthorized access and potential exfiltration of highly sensitive Personally Identifiable Information (PII) and Protected Health Information (PHI). The affected entities are the North Texas Behavioral Health Authority (285,000 individuals), Southern Illinois Dermatology (160,000 individuals), and Saint Anthony Hospital in Chicago (146,000 individuals). The breach at Southern Illinois Dermatology was previously claimed by the Insomnia ransomware group, underscoring the direct link between cyberattacks and large-scale data exposure in the healthcare sector.
The healthcare industry remains a prime target for cybercriminals due to the high value of stolen medical data and the critical nature of its operations, which makes it more likely to pay ransoms. These three incidents showcase different but common attack vectors targeting the sector.
North Texas Behavioral Health Authority: This was a network server breach. Attackers gained access to the network between October 13 and October 15, 2025, and were able to access files containing PII for 285,000 individuals. This type of intrusion often results from an unpatched vulnerability, a phishing attack, or compromised credentials.
Southern Illinois Dermatology: This incident, affecting 160,000 people, was also a network compromise. The Insomnia ransomware group claimed responsibility in February 2026, posting the clinic on its leak site and later leaking the stolen data. This is a classic double-extortion attack where data is both encrypted and stolen.
Saint Anthony Hospital: This breach, impacting 146,000, resulted from a compromised email account. In February 2025, attackers gained access to two employee email inboxes containing patient PII and PHI. While the hospital stated this was unrelated, it has a history of being targeted, having been listed as a victim by the LockBit ransomware group in January 2024.
While technical details are sparse, we can infer the likely TTPs based on the attack types.
Network Intrusion (North Texas BHA, Southern Illinois Dermatology):
T1486).Business Email Compromise (Saint Anthony Hospital):
MITRE ATT&CK TTPs:
T1213 - Data from Information Repositories: Accessing patient data from file servers or databases.T1566 - Phishing: A likely vector for both the email compromise and initial access for the network intrusions.T1567 - Exfiltration Over Web Service: Exfiltrating stolen patient data for double extortion.T1486 - Data Encrypted for Impact: Used by the Insomnia ransomware group against Southern Illinois Dermatology.T1078 - Valid Accounts: Used to access the employee email accounts at Saint Anthony Hospital.The impact on the nearly 600,000 affected individuals is severe. The compromised data, including names, addresses, Social Security numbers, and medical information, can be used for identity theft, financial fraud, and highly targeted phishing scams. For the healthcare providers, the consequences include significant financial costs for incident response, legal fees, regulatory fines under HIPAA, and long-term reputational damage. The disruption caused by such attacks can also impact patient care, leading to canceled appointments and delayed treatments, which poses a direct risk to patient safety.
No specific file hashes, IP addresses, or domains were provided in the source articles.
Security teams in healthcare can hunt for the following general patterns:
New-InboxRule or Set-InboxRule PowerShell commandsvssadmin.exe delete shadowsDetection:
Response:
Crucial for preventing email account takeovers and unauthorized remote access, which were vectors in these breaches.
Mapped D3FEND Techniques:
Regular security awareness training helps staff identify and report phishing attempts, a common initial access vector.
Encrypting patient data at rest on servers and databases can render it useless to attackers even if they manage to exfiltrate it.
To detect incidents like the network intrusions at North Texas BHA and Southern Illinois Dermatology, healthcare organizations should deploy User and Entity Behavior Analytics (UEBA) solutions. These tools baseline normal user activity—such as which files they access, from where, and at what times. The system could have flagged the attacker's activity at North Texas BHA, which occurred over a specific 3-day period, as anomalous. For the Saint Anthony Hospital email compromise, a UEBA tool integrated with Microsoft 365 could have detected the impossible travel scenario (e.g., login from a new country), access to an unusually large number of mail items, or the creation of malicious inbox rules. By alerting security teams to these deviations from normal behavior, UEBA can provide early warning of a compromised account or an intruder moving laterally within the network, enabling faster response before a full-blown data breach occurs.
In the context of the Insomnia ransomware attack on Southern Illinois Dermatology, having a robust file restoration capability is the most critical component of resilience. This goes beyond simple backups. Healthcare organizations must adhere to the 3-2-1 backup rule: three copies of data, on two different media types, with one copy stored offline and immutable (air-gapped). The offline, immutable copy is the key defense against ransomware that actively targets and encrypts connected backups. Restoration procedures must be tested regularly to ensure they are effective and to meet recovery time objectives (RTOs). Had Southern Illinois Dermatology been able to quickly restore their systems from immutable backups, the operational impact of the encryption would have been minimized, reducing the pressure to pay the ransom. While this doesn't prevent the data exfiltration aspect of the double-extortion attack, it ensures continuity of patient care and business operations.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats