HIGH SEVERITYMedical

Cookeville Regional Medical Center Data Breach

Cookeville Regional Medical Center Hospital Breach (2025): Patient SSN & Home Address Exposed

Regional medical center providing hospital and specialty care.

Verified by ObscureIQ Intelligence

7.5Severity
21KRecords
4Fields
2025Year

ObscureIQ Breach Intelligence Scores
16.0
Breach Risk Index
27
Data Value
40
Market Recency
242
days
Since Breach

Risk Interpretation

Severe risk of identity theft, medical fraud, insurance abuse, and targeted scams exploiting care relationships or treatment status.

🎯 Impact & Downstream Threats

CRMC faces significant institutional exposure given the size of the affected population relative to its regional service area. Federal HIPAA notification obligations, an Office for Civil Rights review, multistate attorney-general filings, and active class-action litigation discussions are all underway. The CRMC incident ranks as the eighth-largest U.S. healthcare ransomware breach of 2025 by records compromised. Operationally, the ransomware attack caused a technical outage that disrupted schedu

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat
Full identity theft & synthetic identity fraud

📋 Breach Intelligence

EntityCookeville Regional Medical Center
OrganizationHealthcare Provider • USA
Breach Date2025-08-02
DBC Added2025-08-28
Added Date2025-08-28
Records~21K (20,521 records)
Attack VectorRansomware
Threat ActorRhysida
SourceDataBreach.com / ObscureIQ
SensitivityStandard
Breach ID324.0
StatusConfirmed

📝 Executive Summary

Cookeville Regional Medical Center, a 309-bed hospital in Cookeville, Tennessee, suffered a ransomware attack between July 11 and July 14, 2025. The hospital discovered the incident on July 14 when the attack caused a technical outage of computer systems. The Rhysida ransomware-as-a-service group claimed responsibility on August 2, 2025 by listing CRMC on its dark-web leak site, demanding a 10 Bitcoin ransom worth approximately \$1.15 million at the time. After failing to find a buyer, Rhysida published the stolen data freely; the published archive reportedly comprised approximately 538 gigabytes across more than 372,000 files.\n\nThe publicly circulating dataset analysed by breach-tracking services included approximately 13,300 unique Social Security numbers, 20,500 street addresses, 8,500 phone numbers, and 7,700 email addresses. The CRMC formal disclosure to the Maine Attorney General put the total individuals affected at 337,917. Compromised fields per the official disclosure included names, dates of birth, addresses, Social Security numbers, driver's license numbers, financial account numbers, medical treatment information, medical record numbers, and health insurance policy information. Notification letters were mailed beginning April 14, 2026.\n\nFor affected patients, the practical risk profile combines severe identity-fraud exposure with hospital-specific risks. The combination of name, date of birth, address, Social Security number, and driver's license number is a strong base for synthetic identity fraud and fraudulent credit applications. Financial account number exposure raises direct payment-fraud risk. Inclusion in the dataset confirms a hospital-care relationship and may include sensitive treatment information that supports medical-themed scams. Affected patients should accept the Experian identity-theft protection offered by CRMC, freeze credit at all three U.S. bureaus, monitor financial accounts and health-insurance statements closely, and treat unsolicited contact referencing CRMC or any past hospital visit with caution.

🏢 About Cookeville Regional Medical Center

Cookeville Regional Medical Center (CRMC) is a 309-bed regional hospital based in Cookeville, Tennessee, serving the Upper Cumberland region across fourteen counties. The hospital provides emergency care, inpatient services, and a broad set of outpatient programs, with the surrounding system handling approximately 47,000 emergency room visits, 13,000 inpatient admissions, and nearly 200,000 outpatient visits annually. CRMC employs around 2,660 staff including 285 physicians. As a HIPAA-regulated regional hospital, CRMC maintains substantial volumes of protected health information including patient identity, insurance, billing, diagnostic, and treatment records across its hospital and outpatient operations.

Healthcare provider | Hospital and clinical services | Regional medical center | USA
Healthcare ProviderUSAcrmchealth.org

🗂 Why They Hold Your Data

Regional medical centers collect patient identity, contact, insurance, billing, appointment, and clinical records across hospital and administrative workflows.

📰 Recent Developments

CRMC discovered the ransomware attack on July 14, 2025 when unusual network activity caused a technical outage. The hospital reported the incident publicly on July 15, 2025, secured systems with assistance from outside cybersecurity experts, and notified law enforcement. The Rhysida ransomware-as-a-service group claimed responsibility on August 2, 2025 by listing CRMC on its dark-web leak site and demanding a ransom of 10 Bitcoin (worth approximately \$1.15 million at the time). Rhysida subsequently published the stolen data freely after failing to find a buyer. CRMC mailed breach notification letters to affected individuals on April 14, 2026, approximately nine months after detection. The hospital is offering twelve months of complimentary identity theft protection through Experian.

🔍 Data Points Exposed

4 verified field types:
Social Security Number
Email
Phone Number
Home Address

Exposure Categories

CredentialsSSN
LocationPHYS ADDR

Canonical Fields

email_address, phone_number, physical_address:home, ssn

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Cookeville Regional Medical Center
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

RansomwareMedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom