1,294,769+ (incomplete data)
At first glance, September 2025 appeared to be a quiet month for healthcare cybersecurity, with only 26 data breaches affecting 500 or more individuals reported to the federal government. This figure represents a 56% drop from August and the lowest monthly count in nearly seven years. However, a report from The HIPAA Journal provides a critical caveat: these numbers are artificially low. A US government shutdown has prevented the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) from processing its backlog and updating the public breach portal. The 26 breaches that were posted before the shutdown still impacted nearly 1.3 million people, with hacking remaining the dominant cause. The true scale of healthcare breaches for the month remains unknown and is expected to rise sharply once government operations resume.
The data, as of October 22, 2025, presents a skewed picture of the threat landscape.
CRITICAL CAVEAT: The HIPAA Journal, a leading authority on healthcare compliance and breach reporting, explicitly states these figures are incomplete due to the government shutdown. The OCR is not updating its portal, and a significant backlog of breach reports is accumulating. The final numbers for September will be much higher.
Despite the incomplete data, a year-to-date comparison shows 469 breaches in 2025 versus 554 in the same period of 2024, suggesting a potential (though now uncertain) downward trend prior to this reporting anomaly.
Hacking and IT incidents continue to be the overwhelming cause of large-scale healthcare data breaches. This category typically includes:
T1486 - Data Encrypted for Impact and T1041 - Exfiltration Over C2 Channel).T1566 - Phishing).T1190 - Exploit Public-Facing Application).The fact that these incidents accounted for nearly 99% of individuals affected in the partial September data underscores that proactive, technical security controls are paramount for protecting patient data.
Even with incomplete data, the impact is significant. The exposure of over 1.2 million patient records in just a fraction of the month's incidents is substantial. The consequences of healthcare data breaches include:
Healthcare organizations must assume they are being targeted and focus on early detection.
Given that hacking is the primary threat vector, healthcare organizations must prioritize technical defenses.
M1051 - Update Software).M1032 - Multi-factor Authentication).M1030 - Network Segmentation).Prioritize patching of internet-facing systems like VPNs and web servers, as these are common entry points for ransomware attacks in healthcare.
Mapped D3FEND Techniques:
Enforce MFA on email and EMR systems to prevent account takeovers via phishing.
Mapped D3FEND Techniques:
Segment networks to isolate critical clinical systems from general business systems, limiting the spread of malware.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats