Friday, February 28, 2025
HomeCyber Security NewsAtrium Health Data Breach Affected More than 2 Million Patients

Atrium Health Data Breach Affected More than 2 Million Patients

Published on

SIEM as a Service

Follow Us on Google News

Atrium Health hit with a major data breach which impacted 2.65 million patients, attackers accessed the patient’s personal information. The intrusion occurred between Sept. 22-29.

Hackers gained access to the data stored in a third-party system owned by AccuDoc Solutions Inc., which provides billing services to Atrium and other 50 medical centers.

The personal information including names, addresses, dates of birth, invoice numbers, account balances, dates of service, insurance policy information and Social Security numbers are compromised, Atrium says in a report to Bizjournals.

Atrium confirms no medical records nor financial information was impacted with the data breach as they stored in their core system and not associated with AccuDoc.

The breach was reported by AccuDoc to Atrium on Oct. 1, according to the forensic investigations, the hackers only able to obtain the read-only permission for the data and they were not able to remove or download data.

Affected locations include Atrium Health facilities and partner sites at Blue Ridge Healthcare System, Columbus Regional Health Network, New Regional Medical Center Physician Group, Scotland Physicians Network, and St. Luke’s Physician Network.

“Atrium notifying the patients about the breach and guarantors who may have been impacted by this incident. We take cybersecurity very seriously, and we’ve worked very hard to determine exactly what happened and how to prevent,” reads Atrium statement.

Related Read

These are the Top 5 Publicly Available Hacking Tools Mostly used By Hackers

Hackers Breach HealthCare.gov System and Steal Sensitive Personal Data of 75,000 Customers

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s...

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software...

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s...

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software...