Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Stormous Hits North Country Health

July 18, 2025
Reading Time: 3 mins read
in Incidents
Co-op Data Stolen of 6.5M Members

A significant cybersecurity incident has unfolded in northern Arizona, with the pro-Russia ransomware group Stormous asserting that it has stolen extensive patient data from North Country HealthCare. The breach allegedly impacts 600,000 patients across the organization’s 14 sites, raising serious concerns about the privacy and security of sensitive personal and health information. North Country HealthCare, a federally qualified health center, provides a wide array of primary healthcare services, making the potential exposure of such a large volume of patient data particularly alarming for the region.

The Stormous group officially listed North Country HealthCare on its data leak site on July 13, 2025. Their claims specify the theft of “full personally identifiable information (PII), Protected Health Information (PHI), diagnostic codes (ICD), clinic data, [and] provider details.” This encompasses a comprehensive range of sensitive data, including patients’ full names, dates of birth, contact information, details of clinic visits, insurance providers, and medical diagnoses. Such information, if verified, could be highly valuable for malicious activities, including identity theft and various forms of fraud.

Adding to the gravity of the situation, the ransomware group initially announced a two-tiered approach to monetizing the stolen data.

They declared their intention to sell the data of 100,000 patients on the dark web, while the remaining 500,000 patient records would be made publicly available for free. According to a July 15, 2025, update reported by the HIPAA Journal, the files have indeed been published. This public release significantly escalates the risk for affected individuals, as their highly personal medical and identification details are now potentially accessible to a wide audience.

Stormous, known for its “double extortion” model, has been active since early 2022. This model involves both encrypting an organization’s systems and exfiltrating data, then demanding payment to restore access and prevent the public release of stolen information. The group has a history of targeting at least 150 organizations globally, with a particular focus on sectors such as healthcare, hospitality, technology, business services, and government. Their primary geographical targets include Spain, the U.S., UAE, France, and Brazil.

As of now, North Country HealthCare has not yet issued a public statement confirming the cyberattack or data breach, leaving patients and the wider community seeking official information and guidance.

The alleged breach underscores the persistent and evolving threat that ransomware groups pose to healthcare providers, highlighting the critical need for robust cybersecurity measures and prompt communication with affected individuals in the event of a compromise.

Reference:

  • https://www.hipaajournal.com/ransomware-group-claims-600000-patients-data/
Tags: cyber incidentsCyber Incidents 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

GitHub Hack Triggers Salesloft Breach

DDoS Defender Hit by Massive Attack

September 11, 2025
GitHub Hack Triggers Salesloft Breach

Vienna VA Reports Data Breach Leak

September 11, 2025
GitHub Hack Triggers Salesloft Breach

GitHub Hack Triggers Salesloft Breach

September 11, 2025
Nexar Dashcam Database Breached

Nexar Dashcam Database Breached

September 10, 2025
Nexar Dashcam Database Breached

Cornwell Tools Data Breach Hits 104k

September 10, 2025
Nexar Dashcam Database Breached

Wealthsimple Platform Data Breach

September 10, 2025

Latest Alerts

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Unreported Domains Expose Salt Typhoon

Hackers Exploit Adobe Commerce Bug

Microsoft Warns of AD DS Flaw

Subscribe to our newsletter

    Latest Incidents

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    Nexar Dashcam Database Breached

    Wealthsimple Platform Data Breach

    Cornwell Tools Data Breach Hits 104k

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial