Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsUS Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach
US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach
CybersecurityDefenseCIO PulseHealthcare

US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach

•February 23, 2026
0
SecurityWeek
SecurityWeek•Feb 23, 2026

Why It Matters

The exposure of sensitive health and payment data threatens patient privacy and could trigger regulatory penalties, while highlighting the risk of third‑party service providers in healthcare operations. Stakeholders must reassess vendor security controls to prevent similar supply‑chain attacks.

Key Takeaways

  • •139,964 individuals' data exposed via ransomware breach.
  • •Breach originated from Catalyst RCM, not directly targeted.
  • •Everest group leaked ~12 GB of medical and payment data.
  • •Vikor rebranded as Vanta Diagnostics amid breach fallout.
  • •HHS tracker lists incident; true affected count may exceed 140k.

Pulse Analysis

The healthcare sector has long been a prime target for cyber‑criminals, but recent incidents reveal a growing focus on supply‑chain weak points. Third‑party vendors that handle billing, coding, or data storage often sit outside the primary security perimeter of hospitals and labs, making them attractive entry points for ransomware groups like Everest. When attackers compromise credentials at a service provider, they can harvest vast troves of protected health information (PHI) and payment details, amplifying the potential fallout across multiple organizations.

In the Vikor Scientific case, the breach originated not from the diagnostic lab itself but from Catalyst RCM, the revenue‑cycle‑management firm that processes billing and coding for Vikor, KorPath, and Korgene. By exploiting stolen login data, the attackers accessed nearly 140,000 records and extracted about 12 GB of files, including names, dates of birth, insurance data, and credit‑card numbers. The incident prompted Vikor’s rebranding to Vanta Diagnostics, a move that may aim to distance the business from the negative publicity while it works to shore up its security posture and reassure patients.

Regulators have responded swiftly, with the U.S. Department of Health and Human Services adding the breach to its national tracker, signaling heightened scrutiny of third‑party risks. Healthcare entities now face pressure to conduct rigorous vendor risk assessments, enforce multi‑factor authentication, and implement continuous monitoring of privileged access. As the industry grapples with tightening privacy laws and the looming threat of further ransomware campaigns, strengthening supply‑chain defenses will be essential to protect patient data and maintain trust.

US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...