Nearly 480,000 impacted by Covenant Health data breach

A cyberattack last year exposed the sensitive information of 478,188 people, the Catholic healthcare organization Covenant Health said.

Covenant Health operates three hospitals and multiple rehabilitation centers, assisted living residences, and community-based health and elder care organizations across Maine, Massachusetts, New Hampshire, Pennsylvania, Rhode Island and Vermont. 

In May 2025, hackers breached the organization’s network and stole patients’ names, addresses, dates of birth, medical record numbers, Social Security numbers, health insurance information, and treatment information like diagnoses, dates of treatment, and types of treatment.

Covenant Health began sending breach notification letters to victims on New Year’s Eve. Victims are being offered one year of credit monitoring services. 

The organization said its investigation into the incident finished on December 10 and found that cybercriminals had access to its IT systems from May 18 until about May 26. Federal law enforcement was notified of the attack at the time. 

The cyberattack had a significant impact on two hospitals in Maine — St. Joseph Hospital and St. Mary’s Health System — and one in New Hampshire, which is also called St. Joseph Hospital.

Wait times at St. Mary’s increased and its labs were only able to process paper orders. St. Joseph Hospital in New Hampshire said lab services were only available at the main hospital campus and services could only be provided with a physical order in hand.

The attack was eventually claimed by the Qilin ransomware gang, which previously caused chaos in the U.K. after damaging dozens of hospitals and local clinics in London. 

The group was one of the most destructive ransomware operations in 2025, targeting several U.S. municipalities, Japanese beverage giant Asahi, and one of the largest newspaper chains in the United States. It also launched significant attacks on the governments of Malaysia and Palau

Cisco Talos published a study finding that the gang published the information of about 40 victims per month last year. 

The cybersecurity research firm Comparitech tracked more than 700 Qilin attacks last year, with 118 being confirmed. About half of the attacks targeted the U.S., while France, Canada, South Korea and Spain also had a large proportion of organizations that dealt with Qilin incidents.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Sedgwick confirms cyber incident affecting its major federal contractor subsidiary

Next Post

Pakistan-linked hackers target Indian government, universities in new spying campaign

Related Posts

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 

Featuring: Cybersecurity is being reshaped by forces that extend beyond individual threats or tools. As organizations operate across cloud infrastructure, distributed endpoints, and complex supply chains, security has shifted from a collection of point solutions to a question of architecture, trust, and execution speed. This report examines how core areas of cybersecurity are evolving in
Read More

n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions

Open-source workflow automation platform n8n has warned of a maximum-severity security flaw that, if successfully exploited, could result in authenticated remote code execution (RCE). The vulnerability, which has been assigned the CVE identifier CVE-2026-21877, is rated 10.0 on the CVSS scoring system. "Under certain conditions, an authenticated user may be able to cause untrusted code to be
Read More

When Your $2M Security Detection Fails: Can your SOC Save You?

Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the first line of defense. Yet security leaders struggle to justify dedicating resources further down the alert lifecycle to their superiors. As a result, most organizations' security investments are asymmetrical, robust detection tools paired with an under-resourced SOC,
Read More