HIGH SEVERITYMedical

Myrtue Medical Center Hospital Data Breach

Myrtue Medical Center Rural Hospital Breach (2025): Patient SSN & Driver's License Exposed

Rural hospital and health system in Iowa.

Verified by ObscureIQ Intelligence

7.5Severity
44KRecords
6Fields
2025Year

ObscureIQ Breach Intelligence Scores
10.8
Breach Risk Index
27
Data Value
40
Market Recency
272
days
Since Breach

Risk Interpretation

Severe risk of identity theft, medical fraud, insurance abuse, and targeted healthcare scams. Hospital data can also reveal sensitive treatment relationships.

🎯 Impact & Downstream Threats

The institutional impact on Myrtue is substantial relative to the hospital's size. Federal HIPAA notification obligations, an Office for Civil Rights review, Iowa attorney-general filings, and emerging class-action litigation discussions are all underway. As a critical-access hospital with approximately 60 inpatient beds and limited cybersecurity budget and staffing, Myrtue faces operational challenges in remediation that are typical of small rural hospitals. The reputational impact is concentra

Primary downstream threats:
  • Identity theft and synthetic identity construction using government-issued IDs
  • SIM swap attacks where phone numbers are present
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Identity fraud & vehicle-related crime
Phishing, credential stuffing & account takeover
Name-based social engineering
SIM swapping, vishing & SMS phishing
Physical stalking, mail fraud & identity verification
Home targeting, stalking & physical threat
Full identity theft & synthetic identity fraud

📋 Breach Intelligence

EntityMyrtue Medical Center Hospital (Myrtue Medical Center)
OrganizationHealthcare Provider • USA
Breach Date2025-06-24
DBC Added2025-07-29
Added Date2025-07-29
Records~44K (44,424 records)
Attack VectorRansomware
Threat ActorWorldLeaks
SourceDataBreach.com / ObscureIQ
SensitivityStandard
Breach ID938.0
StatusConfirmed

📝 Executive Summary

Myrtue Medical Center, a nonprofit critical-access hospital in Harlan, Iowa, suffered a data exfiltration attack discovered on June 13, 2025 when suspicious network activity was detected. The hospital immediately disconnected remote access, reset administrative credentials, and engaged a third-party cybersecurity firm. The WorldLeaks ransomware group claimed responsibility on June 24, 2025 by posting on its Tor-based leak site and asserting it had exfiltrated approximately 1.2 terabytes of data comprising 806,625 files.\n\nThe breach affected approximately 44,000 individuals based on records indexed by breach-tracking services. Compromised fields included names, email addresses, phone numbers, home addresses, dates of birth, driver's license numbers, and Social Security numbers. The high file count claimed by WorldLeaks (806,625 files) was misinterpreted by some early reporting as the count of affected individuals; the formal patient-individual count is substantially smaller and reflects the patient and employee population served by the hospital.\n\nFor affected patients and employees, the practical risk profile combines severe identity-fraud exposure with rural-hospital-specific risks. The combination of name, date of birth, address, Social Security number, and driver's license number is a strong base for synthetic identity fraud, fraudulent credit applications, and identity-verification bypass at financial institutions. Inclusion in the dataset confirms a hospital-care relationship in a small rural community where individuals may be readily identifiable based on name and address alone. Affected individuals should freeze credit at all three U.S. bureaus, monitor health-insurance statements, place fraud alerts at the major credit bureaus, and treat unsolicited contact referencing Myrtue Medical Center or related care relationships with caution.

🏢 About Myrtue Medical Center Hospital

Myrtue Medical Center is a nonprofit critical-access hospital and rural health provider serving Harlan, Iowa, and surrounding Shelby County. Founded as a community hospital, Myrtue offers comprehensive medical, surgical, emergency, laboratory, radiology, and rehabilitation services to a primarily rural agricultural population in west-central Iowa. As a federally designated Critical Access Hospital, Myrtue receives Medicare reimbursement enhancements that support small rural hospitals serving geographically isolated communities. As a HIPAA-regulated rural hospital, Myrtue maintains patient identity, contact, insurance, billing, and clinical records across its emergency, inpatient, outpatient, and rehabilitation operations, alongside employee records typical of a community hospital with several hundred staff.

Healthcare provider | Hospital and medical services | Regional medical center | USA
Healthcare ProviderUSAmyrtuemedical.org

🗂 Why They Hold Your Data

Regional medical centers collect patient identity, contact, insurance, billing, appointment, and clinical records across hospital and administrative workflows.

📰 Recent Developments

Myrtue Medical Center detected suspicious network activity on June 13, 2025 and immediately disconnected remote access, reset administrative credentials, and engaged a third-party cybersecurity firm. The WorldLeaks ransomware group claimed responsibility on June 24, 2025 by listing Myrtue on its Tor-based leak site and asserting it had exfiltrated 1.2 terabytes of data comprising approximately 806,625 files. Myrtue published a public notice on June 27, 2025 and established a toll-free hotline. The hospital has continued to provide patient care throughout the incident and indicated written notifications would be mailed once the forensic investigation concluded. The WorldLeaks group has been active throughout 2025 with multiple healthcare and small-business victims, including Coalinga Regional Medical Center, Family Farm and Home, and Heritage Communities.

🔍 Data Points Exposed

6 verified field types:
Social Security Number
Email
Phone Number
Driver Licence
Name
Home Address

Exposure Categories

CredentialsSSN | GOV ID | DL
LocationPHYS ADDR

Canonical Fields

drivers_license, email_address, full_name, phone_number, physical_address:home, ssn

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~44K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: myrtue-medical-center-hospital-2025

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Myrtue Medical Center Hospital
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

RansomwareMedicalEmailPhoneAddress

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom