HIGH SEVERITYMedical

Coalinga Regional Medical Center Data Breach

Coalinga Regional Medical Center Critical Access Hospital Breach (2025): Patient SSN Exposed

Critical access hospital and community healthcare provider.

Verified by ObscureIQ Intelligence

7.5Severity
13KRecords
4Fields
2025Year

ObscureIQ Breach Intelligence Scores
16.0
Breach Risk Index
27
Data Value
40
Market Recency
208
days
Since Breach

Risk Interpretation

Severe risk. Exposure enables identity theft, medical fraud, insurance abuse, and targeted scams exploiting patient status or treatment relationships.

🎯 Impact & Downstream Threats

The institutional impact on Coalinga RMC is meaningful given the hospital's status as the primary acute-care provider for its rural region. Federal HIPAA notification obligations, an Office for Civil Rights review, California attorney-general filings, and emerging class-action investigations create a substantial compliance and litigation pipeline. As a critical-access hospital, Coalinga RMC operates with limited cybersecurity budget and staffing relative to larger metropolitan hospitals, which i

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat
Full identity theft & synthetic identity fraud

📋 Breach Intelligence

EntityCoalinga Regional Medical Center
OrganizationHealthcare Provider • USA
Breach Date2025-07-10
DBC Added2025-10-01
Added Date2025-10-01
Records~13K (12,663 records)
Attack VectorUnknown
Threat ActorWorld Leaks
SourceDataBreach.com / ObscureIQ
SensitivityStandard
Breach ID305.0
StatusConfirmed

📝 Executive Summary

Coalinga Regional Medical Center, a critical-access hospital in Coalinga, California, was identified in early July 2025 as a victim of a ransomware attack claimed by the World Leaks ransomware group. The threat actor listed the hospital on its dark-web leak site, indicating data theft from CRMC's systems. The hospital has not extensively detailed the incident in public statements as of this writing.\n\nThe breach affected approximately 13,000 individuals based on records indexed by breach-tracking services. Compromised fields included email addresses, phone numbers, home addresses, and Social Security numbers. As a hospital, the underlying records exfiltrated by the attackers also include patient identity, insurance, billing, and clinical information typical of an emergency, inpatient, and outpatient operation, beyond the more limited field set surfaced publicly.\n\nFor affected patients, the practical risk profile combines identity-fraud exposure with rural-hospital-specific risks. The combination of name, address, and Social Security number is a strong base for synthetic identity fraud and fraudulent credit applications. Inclusion in the dataset confirms a hospital-care relationship in a small rural community where individuals may be readily identifiable based on name and address alone. Patients in rural areas often have fewer financial-fraud detection resources and may face greater difficulty unwinding identity-theft consequences. Affected individuals should freeze credit at all three U.S. bureaus, monitor health-insurance statements, and treat unsolicited contact referencing Coalinga RMC or past hospital visits with caution.

🏢 About Coalinga Regional Medical Center

Coalinga Regional Medical Center (CRMC) is a critical-access hospital in Coalinga, California, providing emergency, inpatient, outpatient, and routine care to residents of western Fresno County and the surrounding rural region. The facility operates under federal Critical Access Hospital designation, which provides Medicare reimbursement enhancements for small rural hospitals serving geographically isolated communities. As a HIPAA-regulated rural hospital, Coalinga RMC maintains patient identity, contact, insurance, billing, and clinical records across its emergency, inpatient, and outpatient operations. The patient base is concentrated in a rural agricultural region of central California where the hospital often serves as the primary local provider for acute and routine care.

Healthcare provider | Hospital and emergency care services | Regional medical center | USA
Healthcare ProviderUSAcoalingarmc.com

🗂 Why They Hold Your Data

Regional hospitals collect patient identity, contact, insurance, billing, and medical records across emergency, inpatient, outpatient, and administrative systems.

📰 Recent Developments

Coalinga Regional Medical Center was identified as a victim of the World Leaks ransomware group in early July 2025, with the threat actor claiming responsibility and listing the hospital on its dark-web leak site. The hospital has continued to operate following the incident, although detailed public disclosure has been limited as of this writing. U.S. plaintiff law firms began organizing class-action investigations following the breach claim. The World Leaks group has been active throughout 2025 with multiple healthcare and senior-care victims, including Family Farm and Home and Heritage Communities earlier in the year. As a critical-access hospital, Coalinga RMC operates under federal Medicare reimbursement rules that include cybersecurity-readiness expectations.

🔍 Data Points Exposed

4 verified field types:
Social Security Number
Email
Phone Number
Home Address

Exposure Categories

CredentialsSSN
LocationPHYS ADDR

Canonical Fields

email_address, phone_number, physical_address:home, ssn

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~13K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: coalinga-regional-medical-center-2025

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Coalinga Regional Medical Center
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom