Myrtue Medical Center Hospital Data Breach
Myrtue Medical Center Rural Hospital Breach (2025): Patient SSN & Driver's License Exposed
Rural hospital and health system in Iowa.
Risk Interpretation
Severe risk of identity theft, medical fraud, insurance abuse, and targeted healthcare scams. Hospital data can also reveal sensitive treatment relationships.
Impact & Downstream Threats
The institutional impact on Myrtue is substantial relative to the hospital's size. Federal HIPAA notification obligations, an Office for Civil Rights review, Iowa attorney-general filings, and emerging class-action litigation discussions are all underway. As a critical-access hospital with approximately 60 inpatient beds and limited cybersecurity budget and staffing, Myrtue faces operational challenges in remediation that are typical of small rural hospitals. The reputational impact is concentra
- Identity theft and synthetic identity construction using government-issued IDs
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
Threat Vectors
Breach Intelligence
Executive Summary
Myrtue Medical Center, a nonprofit critical-access hospital in Harlan, Iowa, suffered a data exfiltration attack discovered on June 13, 2025 when suspicious network activity was detected. The hospital immediately disconnected remote access, reset administrative credentials, and engaged a third-party cybersecurity firm. The WorldLeaks ransomware group claimed responsibility on June 24, 2025 by posting on its Tor-based leak site and asserting it had exfiltrated approximately 1.2 terabytes of data comprising 806,625 files.\n\nThe breach affected approximately 44,000 individuals based on records indexed by breach-tracking services. Compromised fields included names, email addresses, phone numbers, home addresses, dates of birth, driver's license numbers, and Social Security numbers. The high file count claimed by WorldLeaks (806,625 files) was misinterpreted by some early reporting as the count of affected individuals; the formal patient-individual count is substantially smaller and reflects the patient and employee population served by the hospital.\n\nFor affected patients and employees, the practical risk profile combines severe identity-fraud exposure with rural-hospital-specific risks. The combination of name, date of birth, address, Social Security number, and driver's license number is a strong base for synthetic identity fraud, fraudulent credit applications, and identity-verification bypass at financial institutions. Inclusion in the dataset confirms a hospital-care relationship in a small rural community where individuals may be readily identifiable based on name and address alone. Affected individuals should freeze credit at all three U.S. bureaus, monitor health-insurance statements, place fraud alerts at the major credit bureaus, and treat unsolicited contact referencing Myrtue Medical Center or related care relationships with caution.
About Myrtue Medical Center Hospital
Myrtue Medical Center is a nonprofit critical-access hospital and rural health provider serving Harlan, Iowa, and surrounding Shelby County. Founded as a community hospital, Myrtue offers comprehensive medical, surgical, emergency, laboratory, radiology, and rehabilitation services to a primarily rural agricultural population in west-central Iowa. As a federally designated Critical Access Hospital, Myrtue receives Medicare reimbursement enhancements that support small rural hospitals serving geographically isolated communities. As a HIPAA-regulated rural hospital, Myrtue maintains patient identity, contact, insurance, billing, and clinical records across its emergency, inpatient, outpatient, and rehabilitation operations, alongside employee records typical of a community hospital with several hundred staff.
Why They Hold Your Data
Regional medical centers collect patient identity, contact, insurance, billing, appointment, and clinical records across hospital and administrative workflows.
Recent Developments
Myrtue Medical Center detected suspicious network activity on June 13, 2025 and immediately disconnected remote access, reset administrative credentials, and engaged a third-party cybersecurity firm. The WorldLeaks ransomware group claimed responsibility on June 24, 2025 by listing Myrtue on its Tor-based leak site and asserting it had exfiltrated 1.2 terabytes of data comprising approximately 806,625 files. Myrtue published a public notice on June 27, 2025 and established a toll-free hotline. The hospital has continued to provide patient care throughout the incident and indicated written notifications would be mailed once the forensic investigation concluded. The WorldLeaks group has been active throughout 2025 with multiple healthcare and small-business victims, including Coalinga Regional Medical Center, Family Farm and Home, and Heritage Communities.
Data Points Exposed
Exposure Categories
Canonical Fields
drivers_license, email_address, full_name, phone_number, physical_address:home, ssn
Dark Web Verification
- Dataset containing ~44K records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: myrtue-medical-center-hospital-2025
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Myrtue Medical Center Hospital
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
