Common Spirit Data Breach
Status: Confirmed
Breach Intelligence Summary
Entity: Common Spirit · Actor: Cl0p · Source: DataBreach.com / ObscureIQ intelligence
Attack: Ransomware via SSO/identity provider compromise
Timeline: Breach (May, 2023) · Reported (Dec, 2024) · Leak (12/4/24)
Exposure: 11.4M+ records · Email, Phone Number, Account Balance, Name, Home Address, Medical Diagnosis
Status: Confirmed · Risk: High (Medical identity fraud + Phishing / SIM swap)
Summary
In May 2023 nationwide Catholic hospital network CommonSpirit Health -whose regional arms include CHI Health and Virginia Mason Franciscan-became one of hundreds of organizations ensnared in the Cl0p ransomware gang’s zero-day assault on Progress Software’s MOVEit Transfer platform . During a 48-hour window (May 28-31) attackers quietly siphoned off files that Nuance Communications a transcription vendor used by several CommonSpirit facilities was shuttling through MOVEit. What surfaced later On 4 December 2024 a database titled commonspirit.org-2024 appeared on an underground breach marketplace. It contained 11 432 572 rows -roughly twice the head-count of patients that CommonSpirit initially said were at risk. Data points exposed,
Full names (11.4 M) Home addresses (11.4 M) Phone numbers (11.3 M) Email addresses (10.0 M) Treating-doctor names (10.4 M) Diagnosis and treatment codes (11.4 M) Insurance-provider details (2.9 M) Patient-account balances (5.3 M) Although Social Security and payment-card numbers were not in the dump security analysts warned that the mix of contact information plus granular clinical data could power medical-identity theft prescription fraud and highly convincing spear-phishing. Timeline-and transparency questions
13 Sep 2023: CommonSpirit posted a bare-bones “Progress Software Security Incident” notice emphasizing that only limited PHI (patient name facility date/type of service MRN for some) had been affected. Dec 2024 leak: The far broader 11.4-million-record trove contradicted those early assurances sparking fresh criticism that the system had understated the scope and waited more than three months to alert many patients. Remediation offer: One year of credit monitoring-derided by privacy advocates as inadequate given the lifelong value of health-care data on the dark web.
Early legal fallout , CommonSpirit (under the CHI Health name) is now a named defendant in the sweeping In re MOVEit Customer Data Security Breach MDL (No. 3083 D. Mass.) which consolidates dozens of class actions against Progress Software Nuance Welltok/Virgin Pulse and their health-system clients. Plaintiffs allege negligence and violations of HIPAA and state consumer-protection statutes for failing to patch MOVEit servers promptly and for providing delayed incomplete notice. Why this breach matters
Scale & sensitivity: At 11 million patients it rivals Anthem 2015 and Premera Blue Cross 2015 in PHI magnitude-but with richer clinical context. Third-party risk spotlight: The incident underscores how a single vulnerable file-transfer tool at a vendor can cascade across health-system giants bound by shared EHRs and business-associate agreements. Legal precedent: How the MDL allocates liability between software maker vendor and covered-entity could redefine the duty-of-care standard for HIPAA “downstream” partners handling protected health information. Hospitals have long been prized ransomware targets for their lifesaving urgency. The CommonSpirit MOVEit episode shows that even when care delivery isn’t disrupted the aftershocks of mass PHI leakage-regulatory scrutiny class actions and reputational damage-can last far longer than any operating-room outage .
About Common Spirit
Common Spirit is the organization affected by this breach. User data may have been generated through account creation, service usage, or business operations.
If you have interacted with Common Spirit in any capacity, your data may be included in this breach.
Threat Actor: Cl0p
This breach has been attributed to Cl0p. The group is known for data theft campaigns targeting organizations through various intrusion methods.
- SSO/identity provider compromise
Breach Exploitation Status
High
Status
Detected
Possible
Detected
Unknown
Unknown
3–5 years
Phone numbers and addresses change over time but remain valid long enough for sustained exploitation campaigns.
Data Points Exposed
Dark Web Verification
Status: Confirmed
- Dataset containing approximately 11.4M+ records has been identified in breach intelligence sources.
- The data is indexed and searchable across breach notification platforms.
Impact
This breach carries high risk due to the nature of exposed data fields and the scale of affected records.
- Targeted phishing referencing Common Spirit accounts or services
- Medical identity fraud and insurance scams
- SIM-swap attempts where phone numbers are present
- Physical mail scams and address-based identity verification fraud
- Data broker enrichment and resale
Recommendations for Impacted Individuals
If you believe your information may be included:
Non-clients may request a breach impact review.
Common Spirit account updates
Medical billing or insurance notices
Password reset requests
Verify directly through official channels.
Email compromise is often the first pivot point.
Frequently Asked Questions
In May, 2023, Common Spirit experienced a data breach that resulted in the exposure of approximately 11.4M+ records containing personal information.
The exposed data includes Email, Phone Number, Account Balance, Name, Home Address, Medical Diagnosis.
Approximately 11.4M+ records were affected based on current breach intelligence.
Yes. This breach is treated as confirmed based on data observed in breach intelligence platforms.
Data circulation has been detected across breach-sharing channels. Downstream exploitation risk exists based on the nature of the exposed fields.
Rotate passwords associated with Common Spirit, enable multi-factor authentication on email and financial accounts, and monitor for suspicious activity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed. Free forever.
High-Risk? Get an Exposure Audit
Executives, public figures, and high-net-worth individuals face elevated risk. Our team provides full-spectrum exposure audits and threat monitoring.
Corporate Accountability
Organizations that collect personal data have a duty to implement reasonable safeguards and to notify affected individuals when breaches occur.
Scope assessments may evolve as investigations continue. Users should not rely solely on early estimates when making risk decisions.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Common Spirit
- Or simply concerned about credential reuse
We can confirm whether your information is circulating and evaluate downstream threat vectors.
