Kettering Health Data Breach
Status: Confirmed
Breach Intelligence Summary
Entity: Kettering Health · Actor: Play · Source: DataBreach.com / ObscureIQ intelligence
Attack: Ransomware via Network intrusion / ransomware deployment
Timeline: Breach (May, 2025) · Reported (Jun, 2025) · Leak (6/16/25)
Exposure: 57K+ records · Social Security Number, Email, Phone Number, Home Address, Medical Diagnosis
Status: Confirmed · Risk: High (Identity theft + Medical identity fraud)
Summary
Incident Overview On May 20 2025 , Kettering Health-a not-for-profit network of 14 hospitals and 120+ outpatient sites in western Ohio-discovered a ransomware attack that triggered a “system-wide technology outage.” Phone lines the Epic electronic health-record (EHR) system scheduling platforms and other clinical applications were abruptly encrypted forcing clinicians to revert to paper charts and reroute some ambulances. Emergency rooms however stayed open under downtime protocols. Kettering immediately initiated its incident-response playbook: it segmented affected networks pulled critical servers offline and brought in third-party forensics specialists while notifying federal law-enforcement partners. By June 2 -less than two weeks later-the core components of Epic were back online and on June 13 the organization declared “normal operations” for key services such as surgery imaging retail pharmacy and outpatient visits. Discovery and Containment The June 5 status report confirmed that investigators had “eradicated all of the ransomware group’s tools and persistence mechanisms ” applied emergency patches and hardened segmentation access-control and monitoring rules across its environment. More than 200 internal IT and clinical personnel-along with Epic engineers-worked around the clock to rebuild infrastructure and clear backlogs of manually captured patient data. Data-Exposure Claims Emerge On June 4 2025 the Interlock ransomware gang publicly claimed responsibility boasting on its leak site that it had exfiltrated about 941 GB-roughly 732 000 files stored in 20 000 folders -before launching encryption. Early leaked samples reviewed by journalists and researchers included:
Patient names medical-record numbers clinical summaries medication lists mental-health notes Scans of identity documents and payroll files for employees Financial revenue reports insurance files blood-bank and pharmacy documents When negotiations stalled Interlock began publishing portions of the haul on the dark web. Kettering acknowledged the postings but emphasized that only “a small subset” of patient data appears affected and that a file-by-file review is under way to determine whose information was involved. Impact on Patients The breach’s immediate operational fallout was significant:
Diversions & cancellations: Several facilities temporarily diverted ambulances and cancelled elective procedures the week of May 20. Communication outages: Phone lines and the MyChart patient portal were intermittently unusable until mid-June. Scam activity: Kettering warned of fraudulent calls demanding credit-card payments for medical bills and advised patients to hang up and contact police. Based on leaked samples and court filings the following categories of personally identifiable information (PII) may have been compromised: Full name Date of birth & Social Security number Health-insurance details Clinical notes / diagnosis information Payment-card or banking data Employee HR and payroll records Not every individual’s data was exposed; you can search DataBreach.com’s lookup tool to check specific records. Separately a class-action lawsuit filed in Montgomery County on June 16 alleges that Kettering’s security controls were inadequate and that service disruptions caused missed appointments-even for oncology and orthopedic patients. Kettering Health’s Ongoing Investigation Kettering says its forensic investigation “remains active.” Notices will be mailed directly to affected individuals including offers of credit-monitoring or identity-theft protection where warranted. The health system is also collaborating with vendors to tighten network segmentation and implement additional zero-trust controls, while law-enforcement agencies pursue Interlock.
About Kettering Health
Kettering Health is the organization affected by this breach. User data may have been generated through account creation, service usage, or business operations.
If you have interacted with Kettering Health in any capacity, your data may be included in this breach.
Threat Actor: Play
This breach has been attributed to Play. The group is known for data theft campaigns targeting organizations through various intrusion methods.
- Network intrusion / ransomware deployment
Breach Exploitation Status
High
Status
Detected
Possible
Detected
Possible
Unknown
Indefinite (critical identifiers)
SSNs and government IDs never expire. This data can be used for identity theft years or decades after exposure.
Data Points Exposed
Dark Web Verification
Status: Confirmed
- Dataset containing approximately 57K+ records has been identified in breach intelligence sources.
- The data is indexed and searchable across breach notification platforms.
Impact
This breach carries high risk due to the nature of exposed data fields and the scale of affected records.
- Targeted phishing referencing Kettering Health accounts or services
- Identity theft using exposed Social Security Numbers
- Medical identity fraud and insurance scams
- SIM-swap attempts where phone numbers are present
- Physical mail scams and address-based identity verification fraud
- Data broker enrichment and resale
Recommendations for Impacted Individuals
If you believe your information may be included:
Non-clients may request a breach impact review.
Kettering Health account updates
Medical billing or insurance notices
Password reset requests
Verify directly through official channels.
Email compromise is often the first pivot point.
Frequently Asked Questions
In May, 2025, Kettering Health experienced a data breach that resulted in the exposure of approximately 57K+ records containing personal information.
The exposed data includes Social Security Number, Email, Phone Number, Home Address, Medical Diagnosis.
Approximately 57K+ records were affected based on current breach intelligence.
Yes. This breach is treated as confirmed based on data observed in breach intelligence platforms.
Data circulation has been detected across breach-sharing channels. Downstream exploitation risk exists based on the nature of the exposed fields.
Rotate passwords associated with Kettering Health, enable multi-factor authentication on email and financial accounts, and monitor for suspicious activity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed. Free forever.
High-Risk? Get an Exposure Audit
Executives, public figures, and high-net-worth individuals face elevated risk. Our team provides full-spectrum exposure audits and threat monitoring.
Corporate Accountability
Organizations that collect personal data have a duty to implement reasonable safeguards and to notify affected individuals when breaches occur.
Scope assessments may evolve as investigations continue. Users should not rely solely on early estimates when making risk decisions.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Kettering Health
- Or simply concerned about credential reuse
We can confirm whether your information is circulating and evaluate downstream threat vectors.
