Baltimore Medical System Data Breach
Baltimore Medical System Community Clinic Breach (2025): 638K Patient SSN & Home Address Records Exposed
Community healthcare provider delivering primary and preventive care.
Risk Interpretation
Severe risk. Combines identity theft, insurance fraud, and medical privacy exposure. Community-health settings may also affect vulnerable populations who are easier to target with convincing scams.
Impact & Downstream Threats
BMS faces substantial institutional exposure given its position as Maryland's largest FQHC. Federal HIPAA notification obligations, an active Office for Civil Rights review, federal grant-recipient compliance obligations, and a class-action litigation pipeline are all underway. The reputational impact is concentrated within Maryland's underserved patient population, where FQHCs are often the only available provider, making patient retention and trust unusually consequential. The Brain Cipher group's leak-site posting of large server-backup samples adds direct evidence of broad-scale data exfiltration that strengthens future litigation. Operationally, BMS engaged cybersecurity specialists, reviewed its security policies, and began offering credit-monitoring services to affected individuals.
- Identity theft and synthetic identity construction using government-issued IDs
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
Threat Vectors
Breach Intelligence
Executive Summary
Baltimore Medical System, the largest Federally Qualified Health Center in Maryland, suffered a ransomware attack between July 2 and July 20, 2025. The Brain Cipher ransomware group claimed responsibility on September 16, 2025 by listing BMS on its dark-web leak site and posting data samples reportedly exceeding 800 GB, including what appeared to be database and file-system backups from BMS servers. BMS publicly disclosed the incident on September 26, 2025 and began notifying affected individuals.
The breach affected approximately 638,000 records across the BMS network. Compromised fields include names, contact details, dates of birth, Social Security numbers, medical record and patient identification numbers, medical and treatment information, lab results, Medicare and Medicaid identifiers, health insurance and claims details, and financial account information. The high record count reflects the scope of stored data on affected systems, which includes current and former patients, family contacts, and historical records, beyond the approximately 90,000 patients BMS actively serves at any given time.
For affected individuals, the practical risk is unusually severe because of the combination of identity, financial, medical, and federal-program identifiers. The pairing of name, address, date of birth, and Social Security number is a strong base for synthetic identity fraud and fraudulent credit applications. Medicare and Medicaid identifiers create additional risk of healthcare-program fraud, including fraudulent claims billed under affected patients' identities. Affected individuals should freeze credit at all three U.S. bureaus, monitor health-insurance and Medicare summary notices closely for unfamiliar charges, and treat unsolicited contact referencing BMS, healthcare benefits, or insurance verification with caution. Patients in vulnerable populations who use FQHCs are particular targets for healthcare-fraud and emotional-manipulation scams, and should rely on calls back to verified BMS phone numbers rather than responding to inbound contact.
About Baltimore Medical System
Baltimore Medical System (BMS) is the largest Federally Qualified Health Center (FQHC) in the state of Maryland, headquartered in Baltimore. The nonprofit healthcare provider operates a network of community-based health centers across Baltimore City and Baltimore County, providing comprehensive primary care, pediatrics, women's health, dental services, and behavioral health to underserved and low-income residents. As an FQHC, BMS receives federal funding to deliver care regardless of patients' ability to pay, and serves approximately 90,000 patients across its facilities. The organization handles substantial volumes of protected health information including patient identity, insurance, billing, and treatment records, alongside Medicare and Medicaid identifiers used for federal-program billing.
Why They Hold Your Data
Community clinic networks collect patient identity, contact, insurance, billing, and treatment records across primary and specialty care services.
Recent Developments
Baltimore Medical System discovered suspicious network activity in late summer 2025 and engaged third-party cybersecurity specialists to investigate. The forensic review concluded that an unauthorized actor accessed and copied files between July 2 and July 20, 2025. BMS issued an initial public notice on September 26, 2025 and began an extended file-review process to identify affected individuals. Notification letters were mailed in two waves, with the second beginning on or around April 2, 2026. The Brain Cipher ransomware group publicly claimed responsibility on September 16, 2025 by listing BMS on its dark-web leak site and posting samples reportedly exceeding 800 GB. Class-action investigations by U.S. plaintiff law firms began following the September disclosure.
Data Points Exposed
Exposure Categories
Canonical Fields
email_address, full_name, phone_number, physical_address:home, ssn
Dark Web Verification
- Dataset containing ~638K records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: baltimore-medical-system-2025
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Baltimore Medical System
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
