CRITICAL SEVERITYMedical

Common Spirit Data Breach

CommonSpirit Health System Breach (2023): 11 Million Patient Records Including Medical Diagnoses Exposed

CommonSpirit Health – nonprofit Catholic hospital network operating 140+ hospitals across 21 states.

Verified by ObscureIQ Intelligence

8.0Severity
11.4MRecords
6Fields
2023Year

ObscureIQ Breach Intelligence Scores
10.0
Breach Risk Index
40
Data Value
25
Market Recency
509
days
Since Breach

Risk Interpretation

Severe risk of identity theft, medical fraud, insurance abuse, and targeted scams exploiting care relationships or treatment status.

🎯 Impact & Downstream Threats

The 2023 incident reflects Cl0p's exploitation of a zero-day vulnerability in Progress Software's MOVEit Transfer platform at Nuance Communications, a transcription vendor serving CommonSpirit facilities. The attack window ran May 28–29, 2023. CommonSpirit posted an initial notice in September 2023 characterizing the exposure as limited — patient name, facility name, date and type of service, and for some patients a medical record number. A far broader dataset of 11.4 million records — including

Primary downstream threats:
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure
  • Medical identity fraud or insurance abuse using health data

🔓 Threat Vectors

High-value targeting
Phishing, credential stuffing & account takeover
Name-based social engineering
Medical extortion, insurance fraud & discrimination
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat

📋 Breach Intelligence

EntityCommon Spirit (CommonSpirit Health)
Organization • USA
Breach Date2023-05-31
DBC Added2024-12-04
Added Date2024-12-04
Records~11.4M (11,432,572 records)
Attack VectorRansomware
Threat ActorCl0p
Data SubjectsPatient
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityRestricted
Breach ID321.0
StatusConfirmed

📝 Executive Summary

CommonSpirit Health, one of the largest nonprofit hospital networks in the United States, was swept up in the Cl0p ransomware gang's 2023 assault on the MOVEit file transfer platform. Attackers exploited a zero-day vulnerability in Progress Software's MOVEit Transfer tool during a window spanning May 28 to 31, 2023. The breach reached CommonSpirit through Nuance Communications, a transcription vendor used by several of its facilities that was routing files through the compromised platform. The full scale of the exposure did not become clear until December 2024, when a database labeled "commonspirit.org-2024" appeared on an underground marketplace containing 11,432,572 rows of patient records, roughly twice the number CommonSpirit had initially disclosed as at risk. The exposed data includes full names, home addresses, phone numbers, email addresses, treating physician names, diagnosis and treatment codes, insurance provider details, and patient account balances. Medical diagnosis data was present for the full 11.4 million records. The combination of clinical and contact information creates serious risk for affected individuals. Security analysts have warned that this type of data can be used to carry out medical identity theft, prescription fraud, and highly targeted phishing attacks that exploit a person's specific treatment history or care relationships. CommonSpirit's September 2023 disclosure characterized the exposure as limited to basic service information, drawing criticism that the true scope was significantly understated. The company offered one year of credit monitoring to affected individuals. Multiple class-action lawsuits were filed alleging negligence and inadequate notification; some were dismissed for lack of standing, though CommonSpirit remains a named defendant in the consolidated MOVEit multidistrict litigation pending in the District of Massachusetts. Affected patients face long-term exposure to fraud and scams and should monitor their insurance claims, medical records, and financial accounts for unauthorized activity.

🏢 About Common Spirit

CommonSpirit Health is one of the largest nonprofit Catholic hospital networks in the United States, formed through the 2019 merger of Dignity Health and Catholic Health Initiatives. The system operates more than 140 hospitals and 1,000 care sites across 21 states, serving approximately 20 million patients annually. It is headquartered in Chicago and employs more than 150,000 people. Regional operations include CHI Health, Virginia Mason Franciscan Health, and dozens of other affiliated networks.

Healthcare System | Hospital, clinic, and community health services | Nonprofit health system | USA
USAcommonspirit.org

🗂 Why They Hold Your Data

Large nonprofit health systems collect patient identity, contact, insurance, billing, appointment, and clinical records across hospitals, clinics, and community-care operations.

📰 Recent Developments

CommonSpirit has been managing financial and operational recovery across its large hospital portfolio. The system reported a $160 million estimated cost from a major 2022 ransomware attack — separate from the 2023 MOVEit incident in this database — related to business interruption and remediation. The organization has continued its mission-driven care delivery model while facing sustained pressure from the combined costs of two significant security incidents in consecutive years.

🔍 Data Points Exposed

6 verified field types:
Email
Phone Number
Account Balance
Name
Home Address
Medical Diagnosis

Exposure Categories

LocationPHYS ADDR
MedicalDIAGNOSIS

Canonical Fields

account_balance, email_address, full_name, medical_diagnosis, phone_number, physical_address:home

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~11.4M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: commonspirit.org-2024

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Common Spirit
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

RansomwareMedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom