News: 1755889506

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Kidney dialysis giant DaVita tells 2.4M people they were snared in ransomware data theft nightmare

(2025/08/22)


Ransomware scum breached kidney dialysis firm Davita's labs database in April and stole about 2.4 million people's personal and health-related information.

In a filing with the US Department of Health and Human Services, the global healthcare provider, which operates 2,661 dialysis centers in America, reported that the breach affected [1]nearly 2.7 million individuals .

However, The Register has learned that after submitting the report, DaVita finalized the total number of people impacted, and HHS is expected to update the number to 2.4 million.

[2]

According to the most recent [3]cyber incident update on the company's website, the attack began on March 24 and continued until DaVita booted the ransomware scum from its servers on April 12, which is also when it informed the US Securities and Exchange Commission about the digital intrusion in a [4]Form 8-K report .

[5]

[6]

The update explained that criminals stole a grab bag of sensitive information, including:

…certain demographic information, such as name, address, date of birth, social security number, health insurance-related information, and other identifiers internal to DaVita, as well as certain clinical information, such as health condition, other treatment information, and certain dialysis lab test results. For some individuals, the information included tax identification numbers, and in limited cases images of checks written to DaVita.

"Our teams, working with external experts, took swift action to address and recover from a cyber incident earlier this year," a DaVita spokesperson said in an emailed statement.

"Regrettably, we have determined that the threat actor gained unauthorized access to our labs database, which contained some patients' sensitive personal information," the statement continued. "As a result, we're notifying current and former patients and providing them with resources, including complimentary credit monitoring, to help safeguard their data."

The digital intrusion did not interrupt patient care, according to DaVita. "We remain steadfast in our commitment to supporting our patients and contributing to the advancement of cybersecurity within the healthcare sector by sharing our experience," the spokesperson said.

[7]

Davita filed its SEC form April 12, telling federal regulators that a "ransomware incident … encrypted certain elements of our network." Any public company that suffers a material incident because of a breach is required to file a form with the SEC.

While the dialysis company hasn't attributed the attack to a particular criminal group, the Interlock ransomware gang previously claimed to be responsible for the infection and posted DaVita to its leak site.

Last month, the FBI, Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC) [8]published a joint advisory warning about Interlock ransomware affiliates infecting a "wide range" of critical infrastructure and other business sectors across North America and Europe since September 2024.

[9]

"These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim's ability to provide their essential services," the security advisory noted.

[10]Ransomware scum leak patient data after disrupting chemo treatments at Kettering

[11]Ransomware crew spills Saint Paul's 43GB of secrets after city refuses to cough up cash

[12]Minnesota governor calls in the troops after St Paul cyberattack

[13]For healthcare orgs, DR means making sure docs can save lives during ransomware infections

Since it started its operations, Interlock has taken credit for [14]23 confirmed ransomware attacks , plus 31 unconfirmed claims, according to Comparitech research.

Earlier this summer, [15]Kettering Health confirmed that Interlock was responsible for a ransomware attack in May that canceled patients' chemotherapy sessions and pre-surgery appointments.

In June, [16]Interlock claimed to have dumped 941 GB of data belonging to the healthcare provider. Stolen information allegedly included ID cards, payment data, purchasing and financial reports, and a ton of other patient and staff details. It encompassed 732,490 files across 20,418 folders, according to the leak site.

Interlock was also behind the late-July cyberattack on the city of Saint Paul, Minnesota, that forced the state's governor to activate the Minnesota National Guard and [17]declare a state of emergency .

Earlier this month, [18]Interlock claimed to dump a 43 GB haul of files stolen from Saint Paul, including scans of passports, employee records, and other internal documents. ®

Get our [19]Tech Resources



[1] https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aKjodoKBSEbwgfM-heCw7QAAARQ&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://davitasystemsoutage.com/

[4] https://www.sec.gov/Archives/edgar/data/927066/000119312525079593/d948299d8k.htm

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aKjodoKBSEbwgfM-heCw7QAAARQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aKjodoKBSEbwgfM-heCw7QAAARQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aKjodoKBSEbwgfM-heCw7QAAARQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[8] https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a

[9] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aKjodoKBSEbwgfM-heCw7QAAARQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[10] https://www.theregister.com/2025/06/04/ransomware_scum_leak_kettering_patient_data/

[11] https://www.theregister.com/2025/08/13/ransomware_crew_spills_saint_pauls/

[12] https://www.theregister.com/2025/07/30/minnesota_gov_calls_in_national/

[13] https://www.theregister.com/2025/04/02/disaster_recovery_healthcare/

[14] https://www.comparitech.com/news/dialysis-firm-davita-notifies-915k-people-of-data-breach-that-compromised-ssns-and-medical-info/

[15] https://ketteringhealth.org/cybersecurity-incident-faq/

[16] https://www.theregister.com/2025/06/04/ransomware_scum_leak_kettering_patient_data/

[17] https://www.theregister.com/2025/07/30/minnesota_gov_calls_in_national/

[18] https://www.theregister.com/2025/08/13/ransomware_crew_spills_saint_pauls/

[19] https://whitepapers.theregister.com/



"What shall we do?" said Twoflower.
"Panic?" said Rincewind hopefully. He always held that panic was
the best means of survival; back in the olden days, his theory went, people
faced with hungry sabretoothed tigers could be divided very simply into
those who panicked and those who stood there saying "What a magnificent
brute!" and "Here, pussy."
-- Terry Pratchett, "The Light Fantastic"