Medstar Health Data Breach
MedStar Health System Ransomware Breach (2025): 4.6 Million Patient Records Including Medical Diagnoses & SSN Exposed
Nonprofit healthcare system operating hospitals and clinics in the Mid-Atlantic.
Risk Interpretation
Severe risk. Exposure enables identity theft, medical fraud, insurance abuse, and targeted scams exploiting care relationships or treatment status.
Impact & Downstream Threats
Rhysida ransomware attackers gained unauthorized access to MedStar systems between September 12 and September 16, 2025, exfiltrating 3.7 terabytes of data claimed to include over 7 million pieces of patient information. MedStar discovered the intrusion on October 4 and began patient notifications by mail on December 3. Confirmed exposed data includes names, dates of birth, Social Security numbers, and potentially diagnoses, medications, test results, medical images, health insurance information,
- Identity theft and synthetic identity construction using government-issued IDs
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
- Medical identity fraud or insurance abuse using health data
Threat Vectors
Breach Intelligence
Executive Summary
Rhysida, a ransomware group known for targeting healthcare organizations, breached MedStar Health's systems between September 12 and September 16, 2025, exfiltrating 3.7 terabytes of data. MedStar, a nonprofit health system serving patients across Maryland, Virginia, and Washington D.C., discovered the intrusion on October 4. Rhysida listed the stolen data for sale on its dark web site at 25 bitcoin and, when MedStar did not pay, published the files publicly. The breach is estimated to affect 4.6 million patients. The exposed data includes names, home addresses, phone numbers, email addresses, Social Security numbers, and medical diagnoses, along with potentially medications, test results, medical images, insurance information, and treatment records. The combination of Social Security numbers and medical diagnoses creates layered risk. Affected individuals face potential identity theft, fraudulent tax filings, medical identity fraud in which someone uses another person's insurance or benefits, and targeted scams that exploit knowledge of a person's health condition or care history. MedStar began notifying affected patients by mail on December 3, 2025, and is offering complimentary credit monitoring and identity theft protection. The organization engaged third-party cybersecurity experts and notified the FBI. A consolidated federal class-action lawsuit was filed in December 2025, alleging negligence and seeking financial damages and court-ordered security improvements. Individuals who received a breach notice should enroll in the offered monitoring services promptly and remain alert to unsolicited contact referencing their medical care, insurance, or personal finances.
About Medstar Health
MedStar Health is a nonprofit health system operating 10 hospitals and more than 300 care sites across Maryland, Virginia, and Washington D.C. Its network includes MedStar Georgetown University Hospital, MedStar Washington Hospital Center, and several other major facilities across the Baltimore-Washington metropolitan corridor. MedStar is one of the largest healthcare employers in the Mid-Atlantic region.
Why They Hold Your Data
Integrated health systems collect patient identity, contact, insurance, billing, appointment, and clinical records across hospitals, clinics, and administrative operations.
Recent Developments
MedStar has been managing sequential cybersecurity incidents. A prior breach involving compromised employee email accounts led to a $1.35 million class-action settlement finalized in 2024. The 2025 Rhysida ransomware attack occurred against that backdrop. This is also not MedStar's first ransomware encounter — a March 2016 attack forced the system to shut down multiple systems for approximately a week. The pattern of repeated incidents has sustained regulatory and litigation attention on the organization's security posture.
Data Points Exposed
Exposure Categories
Canonical Fields
email_address, full_name, medical_diagnosis, phone_number, physical_address:home, ssn
Dark Web Verification
- Dataset containing ~4.6M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: medstar-health-2025
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Medstar Health
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
