HIGH SEVERITYMedical

Crenshaw Community Hospital Data Breach

Crenshaw Community Hospital Breach (2025): 72K Patient SSN & Home Address Records Exposed

Community hospital.

Verified by ObscureIQ Intelligence

7.5Severity
72KRecords
4Fields
2025Year

ObscureIQ Breach Intelligence Scores
16.2
Breach Risk Index
27
Data Value
40
Market Recency
258
days
Since Breach

Risk Interpretation

Severe risk of medical fraud, identity theft, and exposure of sensitive health information. Smaller hospitals may also serve communities where personal information is easier to contextualize and exploit.

🎯 Impact & Downstream Threats

The institutional impact on Crenshaw Community Hospital is significant relative to its size as a small community hospital. Federal HIPAA notification obligations, an Office for Civil Rights review, Alabama attorney-general filings, and emerging class-action litigation discussions are all underway. Payouts King's publication of the full 53 GB dataset on its leak site creates direct evidence of broad data exposure and strengthens future litigation. Operationally, the hospital reported a network di

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat
Full identity theft & synthetic identity fraud

📋 Breach Intelligence

EntityCrenshaw Community Hospital
OrganizationHealthcare Provider • USA
Breach Date2025-07-08
DBC Added2025-08-12
Added Date2025-08-12
Records~72K (72,362 records)
Attack VectorUnknown
Threat ActorPayouts King
SourceDataBreach.com / ObscureIQ
SensitivityStandard
Breach ID341.0
StatusConfirmed

📝 Executive Summary

Crenshaw Community Hospital, a community hospital in Luverne, Alabama, experienced a ransomware attack discovered on June 16, 2025 when a network disruption impacted certain computer systems. The hospital engaged outside cybersecurity specialists, who confirmed that files were copied from CCH systems without authorization. The Payouts King ransomware group, a double-extortion operation that steals data and threatens publication if ransom demands are not met, claimed responsibility by listing CCH on its dark-web leak site and asserting it had exfiltrated 53 GB of data. After ransom demands went unmet, the group reportedly published the entire dataset.

The breach affected approximately 72,000 individuals based on records indexed by breach-tracking services. Compromised fields included Social Security numbers, email addresses, phone numbers, and home addresses. As a community hospital, the underlying records exfiltrated by the attackers also include patient identity, insurance, billing, clinical, and treatment information typical of an integrated hospital operation, beyond the more limited field set surfaced publicly. Crenshaw separately warned patients in late July 2025 about a social-media scam impersonating a law firm and attempting to harvest personal information by referencing the breach.

For affected patients, the practical risk profile combines severe identity-fraud exposure with rural-hospital-specific risks. The combination of name, address, and Social Security number is a strong base for synthetic identity fraud and fraudulent credit applications. Inclusion in the dataset confirms a hospital-care relationship in a small rural community where individuals may be readily identifiable based on name and address alone. Affected patients should freeze credit at all three U.S. bureaus, monitor health-insurance statements, and be especially cautious of solicitations from law firms or 'data breach assistance' services contacting them by social media or phone, which have been used in scams targeting Crenshaw patients. Verified communications from Crenshaw Community Hospital and authentic class-action notices come through formal mail, not Facebook posts or unsolicited messages.

🏢 About Crenshaw Community Hospital

Crenshaw Community Hospital (CCH) is a small community hospital based in Luverne, Alabama, serving Crenshaw County and surrounding rural communities in south-central Alabama. Founded in 1963, the hospital provides emergency care, medical and surgical services, outpatient services, behavioral health, radiology, and home health services to a primarily rural population. As a small community hospital, CCH operates with a limited staff and serves as one of the few local healthcare options in its service area. As a HIPAA-regulated hospital, CCH maintains patient identity, contact, insurance, billing, and clinical records across its emergency, inpatient, outpatient, and home-health operations, alongside diagnosis, treatment, and prescription information typical of a community hospital.

Healthcare provider | Hospital and patient care services | Local medical facility | USA
Healthcare ProviderUSAcrenshawcommunityhospital.com

🗂 Why They Hold Your Data

Local medical facilities collect patient identity, insurance, billing, and treatment data as part of hospital and community care operations.

📰 Recent Developments

Crenshaw Community Hospital experienced a network disruption on June 16, 2025 that impacted the functionality of certain computer systems. The hospital engaged third-party cybersecurity specialists to investigate and secure its environment. The Payouts King ransomware group, which engages in double-extortion tactics, publicly claimed responsibility on its dark-web leak site, asserting it had exfiltrated 53 GB of data and subsequently published the entire dataset after ransom demands went unmet. Crenshaw issued a public notice on its website acknowledging the incident. The hospital also warned patients in late July 2025 about a social-media scam impersonating a law firm and attempting to harvest personal information from breach victims. The file review remained ongoing into the fall of 2025, and class-action investigations by U.S. plaintiff law firms began organizing in October 2025.

🔍 Data Points Exposed

4 verified field types:
Social Security Number
Email
Phone Number
Home Address

Exposure Categories

CredentialsSSN
LocationPHYS ADDR

Canonical Fields

email_address, phone_number, physical_address:home, ssn

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~72K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: crenshaw-community-hospital

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Crenshaw Community Hospital
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom