Tennessee Hospital Notifies 337,000 Patients of Data Breach, Nine Months After Rhysida Ransomware Attack

Tennessee Hospital Notifies 337,000 Patients of Data Breach, Months After Rhysida Ransomware Attack

HIGH
April 20, 2026
5m read
RansomwareData BreachThreat Actor

Impact Scope

People Affected

337,917

Industries Affected

Healthcare

Geographic Impact

United States (local)

Related Entities

Threat Actors

Other

Cookeville Regional Medical Center (CRMC)

Full Report

Executive Summary

Cookeville Regional Medical Center (CRMC) in Tennessee has confirmed a massive data breach affecting 337,917 patients, stemming from a ransomware attack that occurred in July 2025. The hospital began sending notification letters on April 14, 2026, a full nine months after the incident. The attack was publicly claimed by the Rhysida ransomware gang in August 2025, who listed the hospital on their dark web leak site and advertised the stolen data for sale. The gang claimed to have exfiltrated 500GB of data, including highly sensitive Personal Identifiable Information (PII) and Protected Health Information (PHI) such as Social Security numbers, financial account details, and medical records. The significant delay in public notification and the severity of the exposed data have drawn criticism and heightened the risk of identity theft and fraud for the affected patients. The hospital is offering one year of identity theft protection services.

Threat Overview

  • Threat Actor: Rhysida, a ransomware-as-a-service (RaaS) group known for targeting the healthcare sector.
  • Incident Timeline:
    • July 11-14, 2025: Rhysida gains access to CRMC's network and exfiltrates data.
    • August 2025: Rhysida lists CRMC on its dark web leak site, claiming the theft of 500GB of data and offering it for sale for 10 Bitcoin.
    • Post-August 2025: When no buyer emerged, the data was reportedly made available for free download.
    • April 14, 2026: CRMC begins sending official breach notification letters to 337,917 affected individuals.
  • TTPs: Rhysida employs a double-extortion strategy. They first exfiltrate sensitive data (T1567 - Exfiltration Over C2 Channel) and then encrypt the victim's systems (T1486 - Data Encrypted for Impact). This puts maximum pressure on the victim to pay the ransom to both restore their files and prevent the public release of stolen data.

Technical Analysis

While the initial access vector for the CRMC attack was not disclosed, Rhysida is known to leverage phishing campaigns (T1566 - Phishing) and exploit vulnerabilities in public-facing services, particularly VPNs. Once inside a network, they often use legitimate tools like PsExec for lateral movement (T1570 - Lateral Tool Transfer) and deploy their ransomware. A key part of their playbook is to disable security software and delete backups (T1490 - Inhibit System Recovery) to ensure maximum impact and hinder recovery efforts. The exfiltration of 500GB of data before encryption is a clear indicator of their double-extortion model.

Impact Assessment

The impact on the 337,917 patients is severe. The compromised data is a goldmine for cybercriminals and can be used for:

  • Medical Identity Theft: Using a patient's identity to fraudulently obtain medical services or prescriptions.
  • Financial Fraud: Opening new lines of credit, filing fraudulent tax returns, or draining bank accounts using stolen SSNs and financial details.
  • Blackmail and Extortion: Threatening to release sensitive medical diagnoses or treatments unless a payment is made.
  • Targeted Phishing: Crafting highly convincing scams using detailed personal and medical information.

The nine-month delay between the breach and the notification significantly exacerbated these risks, as patients were unaware that their data was exposed and could not take proactive steps to protect themselves. For CRMC, the incident has resulted in significant reputational damage, regulatory scrutiny under HIPAA, and substantial financial costs for remediation and identity protection services.

Detection & Response

Detecting a sophisticated ransomware attack requires a multi-layered approach.

  • EDR/XDR: Modern endpoint solutions can detect ransomware behavior, such as the rapid encryption of files or attempts to delete volume shadow copies. This is a form of D3FEND File Analysis (D3-FA).
  • Network Monitoring: Monitor for large, anomalous outbound data transfers, which can be an early indicator of data exfiltration before the ransomware is deployed. This is a critical use case for D3FEND Network Traffic Analysis (D3-NTA).
  • Active Directory Monitoring: Monitor for the creation of new administrative accounts or the escalation of privileges, which are common precursors to a network-wide ransomware deployment.

Mitigation

Healthcare organizations remain a prime target and must prioritize security.

  1. Offline, Immutable Backups: Maintain multiple, tested backups of critical data, with at least one copy stored offline and immutable. This is the most critical defense against the impact of data encryption.
  2. Vulnerability Management: Aggressively patch internet-facing systems and internal software to close the entry points used by ransomware groups. This is a fundamental D3FEND Software Update (D3-SU) control.
  3. Employee Training: Conduct regular security awareness training to help employees recognize and report phishing attempts, which are a primary initial access vector.
  4. Network Segmentation: Segment the network to prevent ransomware from spreading from workstations to critical servers hosting patient data. This D3FEND Network Isolation (D3-NI) strategy can contain the blast radius of an attack.

Timeline of Events

1
July 11, 2025
Rhysida ransomware group gains access to CRMC's network.
2
August 1, 2025
Rhysida lists CRMC on its dark web leak site and claims to have stolen 500GB of data.
3
April 14, 2026
CRMC begins sending breach notification letters to 337,917 individuals.
4
April 20, 2026
This article was published

MITRE ATT&CK Mitigations

Deploy EDR solutions that can detect and block ransomware behaviors like mass file encryption.

Use network security monitoring to detect and alert on large, anomalous data exfiltration attempts.

Train employees to recognize and report phishing emails, a common entry vector for ransomware.

Segment critical systems like EMR databases from the general corporate network to limit the spread of ransomware.

Sources & References

Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack
Infosecurity Magazine (infosecurity-magazine.com) April 19, 2026
Data Breach at Tennessee Hospital Affects 337,000
SecurityWeek (securityweek.com) April 19, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareRhysidaHealthcareData BreachHIPAADouble Extortion

📢 Share This Article

Help others stay informed about cybersecurity threats