Ransomware disrupts some operations of kidney dialysis company DaVita

Avatar

Kidney dialysis company DaVita said a ransomware attack on Saturday has impacted some of its operations and encrypted parts of its network. 

The company notified the U.S. Securities and Exchange Commission of the incident on Monday morning, warning that contingency plans have been implemented but they continue to provide care to patients. 

“Upon discovery, we activated our response protocols and implemented containment measures, including proactively isolating impacted systems,” officials explained. “However, the incident is impacting some of our operations, and while we have implemented interim measures to allow for the restoration of certain functions, we cannot estimate the duration or extent of the disruption at this time.”

DaVita said it is still too early to determine the overall effect of the attack on the company.  

The company, which reported $12.8 billion in revenue last year, is one of the largest kidney care providers, with about 281,100 patients at 3,166 outpatient dialysis centers worldwide. DaVita operates more than 2,500 centers in the U.S. and hundreds more across 13 other countries. 

Its primary function is treating end-stage renal disease which necessitates kidney dialysis three times per week until patients receive a new kidney. 

No ransomware gang had taken credit for the attack on DaVita as of Monday morning. The company did not respond to requests for comment about what group launched the attack or whether a ransom would be paid. 

Cybersecurity experts have tracked more than 100 ransomware attacks on healthcare organizations in 2025, with dozens of hospitals, clinics, labs and more facing operational issues due to security incidents.

Microsoft warned last month that ransomware attacks continue to be the primary concern for rural hospitals because of the disruptions to patient care and inability to pay ransoms compared to larger hospital networks. 

Ransomware attacks often “represent a tipping point toward closure, impacting not just the hospital, but the communities they serve with potentially life-threatening consequences,” said Microsoft official Kate Behncken.

CybercrimeNewsNews BriefsIndustry
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

Next Post

Rep. Green on CISA cuts, China hacking and cyber as a bipartisan issue

Related Posts

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it possible to extract
Avatar
Read More

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

A new global phishing threat called "Meta Mirage" has been uncovered, targeting businesses using Meta's Business Suite. This campaign specifically aims at hijacking high-value accounts, including those managing advertising and official brand pages. Cybersecurity researchers at CTM360 revealed that attackers behind Meta Mirage impersonate official Meta communications, tricking users into handing
Avatar
Read More

CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The vulnerability in question is CVE-2025-0994 (CVSS v4 score: 8.6), a deserialization of untrusted data bug that could permit an attacker to conduct remote code execution. "This could
Avatar
Read More