Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Stormous Hits North Country Health

July 18, 2025
Reading Time: 3 mins read
in Incidents
Co-op Data Stolen of 6.5M Members

A significant cybersecurity incident has unfolded in northern Arizona, with the pro-Russia ransomware group Stormous asserting that it has stolen extensive patient data from North Country HealthCare. The breach allegedly impacts 600,000 patients across the organization’s 14 sites, raising serious concerns about the privacy and security of sensitive personal and health information. North Country HealthCare, a federally qualified health center, provides a wide array of primary healthcare services, making the potential exposure of such a large volume of patient data particularly alarming for the region.

The Stormous group officially listed North Country HealthCare on its data leak site on July 13, 2025. Their claims specify the theft of “full personally identifiable information (PII), Protected Health Information (PHI), diagnostic codes (ICD), clinic data, [and] provider details.” This encompasses a comprehensive range of sensitive data, including patients’ full names, dates of birth, contact information, details of clinic visits, insurance providers, and medical diagnoses. Such information, if verified, could be highly valuable for malicious activities, including identity theft and various forms of fraud.

Adding to the gravity of the situation, the ransomware group initially announced a two-tiered approach to monetizing the stolen data.

They declared their intention to sell the data of 100,000 patients on the dark web, while the remaining 500,000 patient records would be made publicly available for free. According to a July 15, 2025, update reported by the HIPAA Journal, the files have indeed been published. This public release significantly escalates the risk for affected individuals, as their highly personal medical and identification details are now potentially accessible to a wide audience.

Stormous, known for its “double extortion” model, has been active since early 2022. This model involves both encrypting an organization’s systems and exfiltrating data, then demanding payment to restore access and prevent the public release of stolen information. The group has a history of targeting at least 150 organizations globally, with a particular focus on sectors such as healthcare, hospitality, technology, business services, and government. Their primary geographical targets include Spain, the U.S., UAE, France, and Brazil.

As of now, North Country HealthCare has not yet issued a public statement confirming the cyberattack or data breach, leaving patients and the wider community seeking official information and guidance.

The alleged breach underscores the persistent and evolving threat that ransomware groups pose to healthcare providers, highlighting the critical need for robust cybersecurity measures and prompt communication with affected individuals in the event of a compromise.

Reference:

  • https://www.hipaajournal.com/ransomware-group-claims-600000-patients-data/
Tags: cyber incidentsCyber Incidents 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

Smishing targets routers in Belgium 2025

Dealership Software Breach Hits 766k

October 2, 2025
Smishing targets routers in Belgium 2025

Allianz Life July Breach Hits 1.5M

October 2, 2025
Smishing targets routers in Belgium 2025

Suffolk Website Down After Cyber-Attack

October 2, 2025
WestJet Confirms Data Breach

Ransomware Gang Recruits Reporter

October 1, 2025
WestJet Confirms Data Breach

WestJet Confirms Data Breach

October 1, 2025
WestJet Confirms Data Breach

US Surveillance Hack Exposes Data

October 1, 2025

Latest Alerts

Outlook Bug Causes Repeated Crashes

Smishing targets routers in Belgium 2025

MatrixPDF Toolkit Turns PDFs Into Lures

Tesla Fixes TCU Bug With USB Risk

Apple Pushes iPhone and Mac Updates

EvilAI Malware Posing As AI Tools

Subscribe to our newsletter

    Latest Incidents

    Allianz Life July Breach Hits 1.5M

    Dealership Software Breach Hits 766k

    Suffolk Website Down After Cyber-Attack

    WestJet Confirms Data Breach

    Ransomware Gang Recruits Reporter

    US Surveillance Hack Exposes Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial