Nearly 480,000 impacted by Covenant Health data breach

A cyberattack last year exposed the sensitive information of 478,188 people, the Catholic healthcare organization Covenant Health said.

Covenant Health operates three hospitals and multiple rehabilitation centers, assisted living residences, and community-based health and elder care organizations across Maine, Massachusetts, New Hampshire, Pennsylvania, Rhode Island and Vermont. 

In May 2025, hackers breached the organization’s network and stole patients’ names, addresses, dates of birth, medical record numbers, Social Security numbers, health insurance information, and treatment information like diagnoses, dates of treatment, and types of treatment.

Covenant Health began sending breach notification letters to victims on New Year’s Eve. Victims are being offered one year of credit monitoring services. 

The organization said its investigation into the incident finished on December 10 and found that cybercriminals had access to its IT systems from May 18 until about May 26. Federal law enforcement was notified of the attack at the time. 

The cyberattack had a significant impact on two hospitals in Maine — St. Joseph Hospital and St. Mary’s Health System — and one in New Hampshire, which is also called St. Joseph Hospital.

Wait times at St. Mary’s increased and its labs were only able to process paper orders. St. Joseph Hospital in New Hampshire said lab services were only available at the main hospital campus and services could only be provided with a physical order in hand.

The attack was eventually claimed by the Qilin ransomware gang, which previously caused chaos in the U.K. after damaging dozens of hospitals and local clinics in London. 

The group was one of the most destructive ransomware operations in 2025, targeting several U.S. municipalities, Japanese beverage giant Asahi, and one of the largest newspaper chains in the United States. It also launched significant attacks on the governments of Malaysia and Palau

Cisco Talos published a study finding that the gang published the information of about 40 victims per month last year. 

The cybersecurity research firm Comparitech tracked more than 700 Qilin attacks last year, with 118 being confirmed. About half of the attacks targeted the U.S., while France, Canada, South Korea and Spain also had a large proportion of organizations that dealt with Qilin incidents.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Sedgwick confirms cyber incident affecting its major federal contractor subsidiary

Next Post

Pakistan-linked hackers target Indian government, universities in new spying campaign

Related Posts

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. "The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access," AhnLab Security Intelligence Center (ASEC) said in a report published last week. "They then used PowerCat, an open-source
Read More

Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control

Cybersecurity researchers have disclosed details of yet another maximum-severity security flaw in n8n, a popular workflow automation platform, that allows an unauthenticated remote attacker to gain complete control over susceptible instances. The vulnerability, tracked as CVE-2026-21858 (CVSS score: 10.0), has been codenamed Ni8mare by Cyera Research Labs. Security researcher Dor Attias has been
Read More