Nearly 480,000 impacted by Covenant Health data breach

A cyberattack last year exposed the sensitive information of 478,188 people, the Catholic healthcare organization Covenant Health said.

Covenant Health operates three hospitals and multiple rehabilitation centers, assisted living residences, and community-based health and elder care organizations across Maine, Massachusetts, New Hampshire, Pennsylvania, Rhode Island and Vermont. 

In May 2025, hackers breached the organization’s network and stole patients’ names, addresses, dates of birth, medical record numbers, Social Security numbers, health insurance information, and treatment information like diagnoses, dates of treatment, and types of treatment.

Covenant Health began sending breach notification letters to victims on New Year’s Eve. Victims are being offered one year of credit monitoring services. 

The organization said its investigation into the incident finished on December 10 and found that cybercriminals had access to its IT systems from May 18 until about May 26. Federal law enforcement was notified of the attack at the time. 

The cyberattack had a significant impact on two hospitals in Maine — St. Joseph Hospital and St. Mary’s Health System — and one in New Hampshire, which is also called St. Joseph Hospital.

Wait times at St. Mary’s increased and its labs were only able to process paper orders. St. Joseph Hospital in New Hampshire said lab services were only available at the main hospital campus and services could only be provided with a physical order in hand.

The attack was eventually claimed by the Qilin ransomware gang, which previously caused chaos in the U.K. after damaging dozens of hospitals and local clinics in London. 

The group was one of the most destructive ransomware operations in 2025, targeting several U.S. municipalities, Japanese beverage giant Asahi, and one of the largest newspaper chains in the United States. It also launched significant attacks on the governments of Malaysia and Palau

Cisco Talos published a study finding that the gang published the information of about 40 victims per month last year. 

The cybersecurity research firm Comparitech tracked more than 700 Qilin attacks last year, with 118 being confirmed. About half of the attacks targeted the U.S., while France, Canada, South Korea and Spain also had a large proportion of organizations that dealt with Qilin incidents.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Sedgwick confirms cyber incident affecting its major federal contractor subsidiary

Next Post

Pakistan-linked hackers target Indian government, universities in new spying campaign

Related Posts

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution. The vulnerability in question is CVE-2025-24893 (CVSS score: 9.8), an eval injection bug that could allow any guest user to perform arbitrary remote code execution through a request to the "/bin/get/Main/
Read More

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were leaked within Visual Studio Code (VS Code) extensions published in the marketplace. The action comes following a report from cloud security company Wiz earlier this month, which found several extensions from both Microsoft's VS Code Marketplace and Open VSX
Read More

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access
Read More