DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

More than 1 million patients affected by DaVita ransomware attack; those are preliminary numbers

Posted on August 5, 2025August 22, 2025 by Dissent

UPDATE of August 22, 2025: On August 21, HHS added a listing for this incident that indicates that DaVita reported the incident to HHS on August 1, 2025 as affecting 2,689,826 patients.

Previous post: 

There is an update to the ransomware attack involving DaVita Dialysis first reported in April. According to DaVita’s disclosures this month,  unauthorized access to its servers began on March 24, 2025 and continued until April 12, 2025, when they were able to kick the attacker out and keep them out.

The incident was first reported by Reuters and by the threat actors — InterLock — who claimed that they would leak 1.5 TB of data. From the fact that the data showed up on the group’s leak site, it seems that they did follow through on their threat.

DaVita’s disclosure states that the types of information included names and “provider name, address, date of birth, social security number, health insurance-related information, and other identifiers internal to DaVita, as well as certain clinical information, such as health condition, other treatment information, and certain dialysis lab test results. For some individuals, the information included tax identification numbers, and in limited cases images of checks written to DaVita.”

Since not all states maintain public sites with breach notifications, we only have data on the number of patients affected from five states at the time of this report: South Carolina (11,570), Washington State (13,404), Oregon (915,952), Texas (81,740), and Massachusetts (7,829), which gives us a preliminary total of 1,030,495, but there will undoubtedly be more.

The incident does not yet appear on HHS’s public breach tool.

Past Breaches

DaVita Dialysis has appeared on this site more than half a dozen times over the years. Some of their incidents pre-date HHS’s breach tool:

  • In March 2008, DaVita reported that a laptop stolen from an employee’s car contained unencrypted patient information that included insurance filings for dialysis services for current and former patients, including name, social security number, medical insurance coverage information, and/or other personal and health related information.
  • There was also a second incident in 2008, where DaVita reported a burglary at a Florida facility.
  • In August 2009, DaVita notified Maryland that Renal Treatment Centers Southeast – LP, an affiliate of DaVita, suffered a data loss when a DaVita facility in Dallas was burglarized and multiple desktop computers were stolen. The stolen hard drives contained dialysis insurance documents which contained patients’ names, addresses, SSN, insurance numbers, treatment records, progress notes, and other personal or medical information.
  • In 2013, DaVita reported another laptop stolen from an employee’s car, this one affecting 11,500 patients. There is a lengthy closing statement on HHS’s breach tool about this incident:

DaVita CA Healthcare Provider 11500 11/5/2013 Theft Laptop No “DaVita, the covered entity (CE), reported that on September 6, 2013, an employee’s unencrypted laptop computer was stolen from a locked car. When the laptop was stolen, the CE believed that it was encrypted in accordance with its policy and did not contain any electronic protected health information (ePHI). Upon further investigation, the CE determined that the laptop was not encrypted and contained patient ePHI pertaining to 10,849 individuals, including diagnosis and insurance information, as well as the social security numbers of some patients. The CE provided breach notification to the affected individuals, the media, and HHS. Following the breach, the CE retrained the involved employee on physical security of laptops, retrained relevant IT personnel on standard encryption configuration processes, and issued a company-wide reminder about physical security requirements pertaining to mobile devices. It also ensured that its laptops are encrypted, revised its device management and monitoring policies and procedures and its acceptable use policy (to include “bring your own device” practices). Additionally, the CE revised its security incident response and crisis management plan and trained its security incident response team on the revisions. In the course of its review, OCR provided technical assistance regarding encryption and security management processes.

  • In 2020, we learned about patient records being dumped improperly.
  • In 2022, DaVita reported that 1,092 patients were affected by a phishing attack that compromised an employee’s email account.
  • In July 2024, DaVita reported that 67,443 patients were affected by a breach resulting from the use of tracking pixels.

And now this incident in 2025.

This post was corrected post-publication to change the amount of data InterLock claimed to have.

Category: Breach IncidentsHealth DataU.S.

Post navigation

← Cisco discloses data breach impacting Cisco.com user accounts
Hamilton taxpayers on the hook for full $18.3M cyberattack repair bill after insurance claim denied →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.