Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cookeville Regional Medical Center Data Breach: A Cybersecurity Nightmare for 337,917 Individuals




A major data breach at Cookeville Regional Medical Center (CRMC) has exposed sensitive information from 337,917 individuals. The Rhysida ransomware group, notorious for its brazen tactics, carried out the attack between July 11 and 14, 2025, and made the stolen data available for free on its Tor data leak site. As the healthcare industry grapples with the implications of this incident, it is essential to take proactive measures to protect sensitive information and stay informed about emerging cybersecurity threats.



  • The Cookeville Regional Medical Center (CRMC) has disclosed a major data breach affecting 337,917 individuals.
  • The breach occurred between July 11 and 14, 2025, and involved the theft of approximately 500GB of sensitive information from the hospital's systems by the Rhysida ransomware group.
  • The stolen data includes names, addresses, dates of birth, Social Security numbers, financial account numbers, medical treatment information, and health insurance policy details.
  • No misuse of stolen data has been confirmed at this stage, but affected individuals are advised to take proactive measures to safeguard their personal information.
  • The Rhysida ransomware group added CRMC to its Tor data leak site in August 2025, sparking debate among cybersecurity experts about the motivations behind releasing the data for free.
  • Healthcare organizations must adopt robust cybersecurity measures, including multi-factor authentication and regular security audits, to mitigate the risk of cyberattacks.



  • In a shocking revelation that has left many in the cybersecurity community reeling, Cookeville Regional Medical Center (CRMC) has recently disclosed a major data breach affecting an astonishing 337,917 individuals. The incident, which occurred between July 11 and 14, 2025, involved the theft of approximately 500GB of sensitive information from the hospital's systems by the Rhysida ransomware group.

    This brazen attack, carried out by one of the most notorious cybercrime groups in recent times, has sent shockwaves throughout the healthcare industry. The breach exposed a treasure trove of sensitive data, including names, addresses, dates of birth, Social Security numbers, financial account numbers, medical treatment information, and health insurance policy details, among other personal identifiable information (PII).

    The investigation conducted by CRMC, in collaboration with law enforcement and forensic experts, revealed that an unauthorized party had accessed the hospital's computer network during the specified timeframe. The forensic analysis determined that the third-party access was carried out between July 11 and 14, 2025, potentially resulting in the viewing or acquisition of sensitive data.

    In a move to notify affected individuals and provide guidance on how to protect themselves, CRMC has sent letters detailing the breach and offering free identity theft protection services. While no misuse of stolen data has been confirmed at this stage, it is essential for those impacted to take proactive measures to safeguard their personal information.

    The Rhysida ransomware group, known for its brazen tactics and willingness to leak stolen data, added CRMC to its Tor data leak site in August 2025. However, in a surprising twist, the group chose not to demand payment from the hospital and instead made the data available for free. This decision has sparked debate among cybersecurity experts, who are left wondering about the motivations behind such an unusual move.

    The Cookeville Regional Medical Center data breach serves as a stark reminder of the ever-present threats facing healthcare organizations worldwide. As hospitals and medical facilities continue to grapple with the complexities of digitalization, they must also contend with the increasing risk of cyberattacks.

    In light of this incident, it is crucial for healthcare providers to adopt robust cybersecurity measures, including multi-factor authentication, regular security audits, and employee training programs. Furthermore, patients must remain vigilant in protecting their personal data by monitoring accounts and credit reports, reporting suspicious activity, and contacting authorities if fraud is suspected.

    The Rhysida ransomware group's involvement in this attack highlights the growing menace of cybercrime in the healthcare sector. As the threat landscape continues to evolve, it is essential for organizations like CRMC to stay abreast of the latest security vulnerabilities and take proactive steps to mitigate risks.

    In conclusion, the Cookeville Regional Medical Center data breach has left a trail of concern and uncertainty among those affected. While no explicit details on the ransom demands or potential misuse of stolen data have been disclosed at this stage, it is essential for individuals and organizations alike to remain vigilant in protecting sensitive information.

    As we move forward, it will be crucial to monitor developments in this incident and assess the long-term impact on the healthcare industry as a whole. In the meantime, cybersecurity experts and enthusiasts alike can take solace in the knowledge that such incidents serve as vital reminders of the importance of robust security protocols and ongoing vigilance in an increasingly complex digital landscape.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Cookeville-Regional-Medical-Center-Data-Breach-A-Cybersecurity-Nightmare-for-337917-Individuals-ehn.shtml

  • https://securityaffairs.com/190898/cyber-crime/cookeville-regional-medical-center-hospital-data-breach-impacts-337917-people.html

  • https://www.hipaajournal.com/cookeville-regional-medical-center-data-breach/

  • https://www.comparitech.com/news/cookeville-regional-medical-center-warns-338000-people-of-data-breach/

  • https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a

  • https://en.wikipedia.org/wiki/Rhysida_(hacker_group)


  • Published: Thu Apr 16 15:26:23 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us