Cookeville Regional Medical Center Data Breach
Cookeville Regional Medical Center Hospital Breach (2025): Patient SSN & Home Address Exposed
Regional medical center providing hospital and specialty care.
Risk Interpretation
Severe risk of identity theft, medical fraud, insurance abuse, and targeted scams exploiting care relationships or treatment status.
Impact & Downstream Threats
CRMC faces significant institutional exposure given the size of the affected population relative to its regional service area. Federal HIPAA notification obligations, an Office for Civil Rights review, multistate attorney-general filings, and active class-action litigation discussions are all underway. The CRMC incident ranks as the eighth-largest U.S. healthcare ransomware breach of 2025 by records compromised. Operationally, the ransomware attack caused a technical outage that disrupted schedu
- Identity theft and synthetic identity construction using government-issued IDs
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
Threat Vectors
Breach Intelligence
Executive Summary
Cookeville Regional Medical Center, a 309-bed hospital in Cookeville, Tennessee, suffered a ransomware attack between July 11 and July 14, 2025. The hospital discovered the incident on July 14 when the attack caused a technical outage of computer systems. The Rhysida ransomware-as-a-service group claimed responsibility on August 2, 2025 by listing CRMC on its dark-web leak site, demanding a 10 Bitcoin ransom worth approximately \$1.15 million at the time. After failing to find a buyer, Rhysida published the stolen data freely; the published archive reportedly comprised approximately 538 gigabytes across more than 372,000 files.\n\nThe publicly circulating dataset analysed by breach-tracking services included approximately 13,300 unique Social Security numbers, 20,500 street addresses, 8,500 phone numbers, and 7,700 email addresses. The CRMC formal disclosure to the Maine Attorney General put the total individuals affected at 337,917. Compromised fields per the official disclosure included names, dates of birth, addresses, Social Security numbers, driver's license numbers, financial account numbers, medical treatment information, medical record numbers, and health insurance policy information. Notification letters were mailed beginning April 14, 2026.\n\nFor affected patients, the practical risk profile combines severe identity-fraud exposure with hospital-specific risks. The combination of name, date of birth, address, Social Security number, and driver's license number is a strong base for synthetic identity fraud and fraudulent credit applications. Financial account number exposure raises direct payment-fraud risk. Inclusion in the dataset confirms a hospital-care relationship and may include sensitive treatment information that supports medical-themed scams. Affected patients should accept the Experian identity-theft protection offered by CRMC, freeze credit at all three U.S. bureaus, monitor financial accounts and health-insurance statements closely, and treat unsolicited contact referencing CRMC or any past hospital visit with caution.
About Cookeville Regional Medical Center
Cookeville Regional Medical Center (CRMC) is a 309-bed regional hospital based in Cookeville, Tennessee, serving the Upper Cumberland region across fourteen counties. The hospital provides emergency care, inpatient services, and a broad set of outpatient programs, with the surrounding system handling approximately 47,000 emergency room visits, 13,000 inpatient admissions, and nearly 200,000 outpatient visits annually. CRMC employs around 2,660 staff including 285 physicians. As a HIPAA-regulated regional hospital, CRMC maintains substantial volumes of protected health information including patient identity, insurance, billing, diagnostic, and treatment records across its hospital and outpatient operations.
Why They Hold Your Data
Regional medical centers collect patient identity, contact, insurance, billing, appointment, and clinical records across hospital and administrative workflows.
Recent Developments
CRMC discovered the ransomware attack on July 14, 2025 when unusual network activity caused a technical outage. The hospital reported the incident publicly on July 15, 2025, secured systems with assistance from outside cybersecurity experts, and notified law enforcement. The Rhysida ransomware-as-a-service group claimed responsibility on August 2, 2025 by listing CRMC on its dark-web leak site and demanding a ransom of 10 Bitcoin (worth approximately \$1.15 million at the time). Rhysida subsequently published the stolen data freely after failing to find a buyer. CRMC mailed breach notification letters to affected individuals on April 14, 2026, approximately nine months after detection. The hospital is offering twelve months of complimentary identity theft protection through Experian.
Data Points Exposed
Exposure Categories
Canonical Fields
email_address, phone_number, physical_address:home, ssn
Dark Web Verification
- Dataset containing ~21K records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: cookeville-regional-medical-center-2025
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Cookeville Regional Medical Center
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
