CRITICAL SEVERITYMedical

Baltimore Medical System Data Breach

Baltimore Medical System Community Clinic Breach (2025): 638K Patient SSN & Home Address Records Exposed

Community healthcare provider delivering primary and preventive care.

Verified by ObscureIQ Intelligence

8.5Severity
638KRecords
5Fields
2025Year

ObscureIQ Breach Intelligence Scores
46.4
Breach Risk Index
30
Data Value
60
Market Recency
175
days
Since Breach

Risk Interpretation

Severe risk. Combines identity theft, insurance fraud, and medical privacy exposure. Community-health settings may also affect vulnerable populations who are easier to target with convincing scams.

Impact & Downstream Threats

BMS faces substantial institutional exposure given its position as Maryland's largest FQHC. Federal HIPAA notification obligations, an active Office for Civil Rights review, federal grant-recipient compliance obligations, and a class-action litigation pipeline are all underway. The reputational impact is concentrated within Maryland's underserved patient population, where FQHCs are often the only available provider, making patient retention and trust unusually consequential. The Brain Cipher group's leak-site posting of large server-backup samples adds direct evidence of broad-scale data exfiltration that strengthens future litigation. Operationally, BMS engaged cybersecurity specialists, reviewed its security policies, and began offering credit-monitoring services to affected individuals.

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

Threat Vectors

Phishing, credential stuffing & account takeover
Name-based social engineering
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat
Full identity theft & synthetic identity fraud

Breach Intelligence

EntityBaltimore Medical System
OrganizationNonprofit Healthcare Provider • USA
Breach Date2025-07-02
DBC Added2025-11-03
Added Date2025-11-03
Records~638K (637,627 records)
Attack VectorUnknown
Threat ActorBrain Cipher
Data SubjectsPatient
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityElevated
Breach ID161.0
StatusConfirmed

Executive Summary

Baltimore Medical System, the largest Federally Qualified Health Center in Maryland, suffered a ransomware attack between July 2 and July 20, 2025. The Brain Cipher ransomware group claimed responsibility on September 16, 2025 by listing BMS on its dark-web leak site and posting data samples reportedly exceeding 800 GB, including what appeared to be database and file-system backups from BMS servers. BMS publicly disclosed the incident on September 26, 2025 and began notifying affected individuals.

The breach affected approximately 638,000 records across the BMS network. Compromised fields include names, contact details, dates of birth, Social Security numbers, medical record and patient identification numbers, medical and treatment information, lab results, Medicare and Medicaid identifiers, health insurance and claims details, and financial account information. The high record count reflects the scope of stored data on affected systems, which includes current and former patients, family contacts, and historical records, beyond the approximately 90,000 patients BMS actively serves at any given time.

For affected individuals, the practical risk is unusually severe because of the combination of identity, financial, medical, and federal-program identifiers. The pairing of name, address, date of birth, and Social Security number is a strong base for synthetic identity fraud and fraudulent credit applications. Medicare and Medicaid identifiers create additional risk of healthcare-program fraud, including fraudulent claims billed under affected patients' identities. Affected individuals should freeze credit at all three U.S. bureaus, monitor health-insurance and Medicare summary notices closely for unfamiliar charges, and treat unsolicited contact referencing BMS, healthcare benefits, or insurance verification with caution. Patients in vulnerable populations who use FQHCs are particular targets for healthcare-fraud and emotional-manipulation scams, and should rely on calls back to verified BMS phone numbers rather than responding to inbound contact.

About Baltimore Medical System

Baltimore Medical System (BMS) is the largest Federally Qualified Health Center (FQHC) in the state of Maryland, headquartered in Baltimore. The nonprofit healthcare provider operates a network of community-based health centers across Baltimore City and Baltimore County, providing comprehensive primary care, pediatrics, women's health, dental services, and behavioral health to underserved and low-income residents. As an FQHC, BMS receives federal funding to deliver care regardless of patients' ability to pay, and serves approximately 90,000 patients across its facilities. The organization handles substantial volumes of protected health information including patient identity, insurance, billing, and treatment records, alongside Medicare and Medicaid identifiers used for federal-program billing.

Healthcare provider | Community-based healthcare services | Regional clinic network | USA
Nonprofit Healthcare ProviderUSAbmsi.org

Why They Hold Your Data

Community clinic networks collect patient identity, contact, insurance, billing, and treatment records across primary and specialty care services.

Recent Developments

Baltimore Medical System discovered suspicious network activity in late summer 2025 and engaged third-party cybersecurity specialists to investigate. The forensic review concluded that an unauthorized actor accessed and copied files between July 2 and July 20, 2025. BMS issued an initial public notice on September 26, 2025 and began an extended file-review process to identify affected individuals. Notification letters were mailed in two waves, with the second beginning on or around April 2, 2026. The Brain Cipher ransomware group publicly claimed responsibility on September 16, 2025 by listing BMS on its dark-web leak site and posting samples reportedly exceeding 800 GB. Class-action investigations by U.S. plaintiff law firms began following the September disclosure.

Data Points Exposed

5 verified field types:
Social Security Number
Email
Phone Number
Name
Home Address

Exposure Categories

CredentialsSSN
LocationPHYS ADDR

Canonical Fields

email_address, full_name, phone_number, physical_address:home, ssn

Dark Web Verification

Confirmed
  • Dataset containing ~638K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: baltimore-medical-system-2025

Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Baltimore Medical System
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom