337,917
Cookeville Regional Medical Center (CRMC) in Tennessee has confirmed a massive data breach affecting 337,917 patients, stemming from a ransomware attack that occurred in July 2025. The hospital began sending notification letters on April 14, 2026, a full nine months after the incident. The attack was publicly claimed by the Rhysida ransomware gang in August 2025, who listed the hospital on their dark web leak site and advertised the stolen data for sale. The gang claimed to have exfiltrated 500GB of data, including highly sensitive Personal Identifiable Information (PII) and Protected Health Information (PHI) such as Social Security numbers, financial account details, and medical records. The significant delay in public notification and the severity of the exposed data have drawn criticism and heightened the risk of identity theft and fraud for the affected patients. The hospital is offering one year of identity theft protection services.
T1567 - Exfiltration Over C2 Channel) and then encrypt the victim's systems (T1486 - Data Encrypted for Impact). This puts maximum pressure on the victim to pay the ransom to both restore their files and prevent the public release of stolen data.While the initial access vector for the CRMC attack was not disclosed, Rhysida is known to leverage phishing campaigns (T1566 - Phishing) and exploit vulnerabilities in public-facing services, particularly VPNs. Once inside a network, they often use legitimate tools like PsExec for lateral movement (T1570 - Lateral Tool Transfer) and deploy their ransomware. A key part of their playbook is to disable security software and delete backups (T1490 - Inhibit System Recovery) to ensure maximum impact and hinder recovery efforts. The exfiltration of 500GB of data before encryption is a clear indicator of their double-extortion model.
The impact on the 337,917 patients is severe. The compromised data is a goldmine for cybercriminals and can be used for:
The nine-month delay between the breach and the notification significantly exacerbated these risks, as patients were unaware that their data was exposed and could not take proactive steps to protect themselves. For CRMC, the incident has resulted in significant reputational damage, regulatory scrutiny under HIPAA, and substantial financial costs for remediation and identity protection services.
Detecting a sophisticated ransomware attack requires a multi-layered approach.
Healthcare organizations remain a prime target and must prioritize security.
Deploy EDR solutions that can detect and block ransomware behaviors like mass file encryption.
Use network security monitoring to detect and alert on large, anomalous data exfiltration attempts.
Train employees to recognize and report phishing emails, a common entry vector for ransomware.
Segment critical systems like EMR databases from the general corporate network to limit the spread of ransomware.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats