HIGH SEVERITYMedical

Centra Care Data Breach

Centra Care Urgent Care Network Breach (2023): 782K Patient Records Including Medical Diagnoses Exposed

CentraCare – Minnesota regional healthcare network.

Verified by ObscureIQ Intelligence

6.5Severity
782KRecords
6Fields
2023Year

ObscureIQ Breach Intelligence Scores
10.8
Breach Risk Index
40
Data Value
25
Market Recency
509
days
Since Breach

Risk Interpretation

High risk of identity theft, medical fraud, and treatment-themed phishing. Urgent-care context may also expose acute illness or recent medical events.

🎯 Impact & Downstream Threats

The institutional impact on CentraCare is meaningful given the size of the affected population and the public-trust consequences of the limited initial disclosure. Federal HIPAA notification obligations through Welltok as the business associate, an active Office for Civil Rights review covering Welltok and its covered-entity clients, multistate attorney-general filings, and the consolidated MOVEit multidistrict litigation are all underway. The vendor-pathway nature of the breach raises broader s

Primary downstream threats:
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure
  • Medical identity fraud or insurance abuse using health data

🔓 Threat Vectors

High-value targeting
Phishing, credential stuffing & account takeover
Name-based social engineering
Medical extortion, insurance fraud & discrimination
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat

📋 Breach Intelligence

EntityCentra Care
Organization • USA
Breach Date2023-05-31
DBC Added2024-12-04
Added Date2024-12-04
Records~782K (782,282 records)
Attack VectorRansomware
Threat ActorCl0p (via Welltok / MOVEit supply chain; CVE-2023-34362)
Data SubjectsPatient
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityRestricted
Breach ID268.0
StatusConfirmed

📝 Executive Summary

CentraCare Health, a Minnesota-based regional healthcare network operating hospitals, clinics, and the Centra Care urgent-care service line in central Minnesota, was drawn into the broader 2023 MOVEit supply-chain attack carried out by the Cl0p ransomware group. The attack occurred on or around May 30 to 31, 2023 when Cl0p exploited a previously unknown zero-day vulnerability (CVE-2023-34362) in Progress Software's MOVEit Transfer file-sharing platform. CentraCare patient data was held by Welltok, a Virgin Pulse-owned patient engagement vendor that used MOVEit Transfer for large-dataset transfers between Welltok and its health-plan and provider clients. Welltok confirmed the breach in late October 2023.

The breach affected approximately 782,000 CentraCare-attributed records based on records indexed by breach-tracking services, as part of a broader Welltok-wide breach affecting approximately 14.7 million individuals across multiple healthcare clients. Compromised fields for CentraCare patients included names, home addresses, email addresses, phone numbers, account-balance information, and medical diagnosis information. No Social Security numbers or payment-card numbers were included in the CentraCare-specific portion of the data, though other Welltok client portions did include SSN exposure.

For affected CentraCare patients, the practical risk profile combines identity-fraud exposure with medical-context-specific risks. The combination of name, address, contact information, and medical diagnosis is a strong base for medical-themed phishing referencing real diagnoses, prescription-fraud attempts, and insurance-fraud claims billed under affected patients' identities. The inclusion of account-balance data adds direct billing-fraud risk because attackers may reference real outstanding balances to lend credibility to scams. Affected patients should remain alert to unsolicited contact referencing CentraCare, Welltok, or specific medical conditions, and should monitor health-insurance statements closely. Patients should also be aware that they may have been affected by additional unrelated breaches given the multi-vendor nature of healthcare supply chains.

🏢 About Centra Care

CentraCare Health, often referred to in operations as Centra Care for its urgent-care service line, is a Minnesota-based regional nonprofit healthcare network headquartered in St. Cloud, Minnesota. The system operates a network of hospitals, primary-care clinics, urgent-care clinics, surgery centers, and home-health services across central Minnesota. The Centra Care urgent-care brand operates walk-in and outpatient medical services as one of CentraCare Health's service lines. As a HIPAA-regulated regional health system at substantial scale, CentraCare maintains comprehensive protected health information including patient identity, insurance, billing, diagnostic, treatment, and prescription records across hospital, clinic, urgent-care, and home-care operations.

Healthcare Provider | Urgent care and walk-in medical services | Urgent care clinic network | USA
USAcentracare.com

🗂 Why They Hold Your Data

Urgent-care clinic networks collect patient identity, contact, insurance, billing, appointment, and treatment records across walk-in and outpatient care workflows.

📰 Recent Developments

The 2023 MOVEit-related disclosure was one of multiple Welltok-related breach notifications affecting CentraCare's patient engagement processes. CentraCare initially issued a brief public statement attributing the exposure to an unnamed third-party vendor, with limited detail on the number of affected patients or remediation. Privacy advocates and journalists criticized the opacity of the disclosure and the limited credit-monitoring offer typical of MOVEit-related notifications. The MOVEit incident has been subsumed into the consolidated In re MOVEit Customer Data Security Breach multidistrict litigation, in which CentraCare could be named through discovery as the chain-of-custody for stolen files is established. Welltok's parent Virgin Pulse remains a primary defendant in the MDL.

🔍 Data Points Exposed

6 verified field types:
Email
Phone Number
Account Balance
Name
Home Address
Medical Diagnosis

Exposure Categories

LocationPHYS ADDR
MedicalDIAGNOSIS

Canonical Fields

account_balance, email_address, full_name, medical_diagnosis, phone_number, physical_address:home

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~782K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: centracare.com-2024

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Centra Care
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

RansomwareMedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom