Critical Severity (Score: 10/10)

Episource HIPAA Breach: 5.4M Patients Hit by Ransomware Attack

Share:𝕏fin

Breach Details

Entity
Episource (UnitedHealth Subsidiary)
Individuals Affected
5,418,866
State
CA
Breach Type
Hacking/IT Incident
Location
Network Server
Date Reported
January 15, 2026
Entity Type
Business Associate
Business Associate
No

Episource HIPAA Breach: 5.4M Patients Hit by Ransomware Attack

A massive ransomware attack on Episource, a UnitedHealth subsidiary specializing in medical coding and risk adjustment, has exposed the personal health information of over 5.4 million individuals. The California-based business associate reported the breach to the Department of Health and Human Services on January 15, 2026, making it one of the largest healthcare data breaches of the year.

What Happened

Episource fell victim to a sophisticated ransomware attack that compromised their network servers between January 27 and February 6, 2025. The cybercriminals maintained unauthorized access to the company's systems for approximately 10 days, during which they were able to infiltrate sensitive patient data stored on the network.

As a business associate of UnitedHealth Group, Episource processes vast amounts of healthcare data for risk adjustment and medical coding purposes. This positioning within the healthcare ecosystem made them an attractive target for cybercriminals seeking access to valuable personal health information (PHI).

The attack represents a significant IT security incident that highlights the ongoing vulnerabilities faced by healthcare organizations and their business associates in an increasingly digital healthcare landscape.

Who Is Affected

The breach impacts a staggering 5,418,866 individuals whose personal health information was stored on Episource's compromised network servers. This makes it one of the most significant healthcare data breaches reported to the HHS Wall of Shame in recent memory.

Affected individuals likely include:

  • Current and former patients of healthcare providers that contract with Episource
  • Members of health insurance plans that utilize Episource's risk adjustment services
  • Individuals whose medical records were processed through Episource's coding systems

As a business associate operating across multiple healthcare networks, Episource's client base spans numerous healthcare providers and insurance companies, exponentially increasing the scope of potential victims.

Breach Details

The ransomware attack specifically targeted Episource's network servers, where the company stored extensive amounts of patient data necessary for their medical coding and risk adjustment operations. The compromised information includes:

  • Personal identifiers: Full names and contact information
  • Medical information: Health records, diagnoses, and treatment data
  • Health insurance information: Plan details, member IDs, and coverage data

The 10-day window during which cybercriminals maintained access to the network provided ample opportunity for data exfiltration. Ransomware attacks typically involve both data encryption (making systems unusable) and data theft (for potential sale or further exploitation).

The location of the breach on network servers suggests that the attackers gained access to centralized data repositories, potentially affecting multiple clients and their patients simultaneously.

What This Means for Patients

For the millions of affected individuals, this breach poses several immediate and long-term risks:

Identity Theft Concerns: The combination of personal identifiers and health information creates a comprehensive profile that cybercriminals can exploit for identity theft or medical fraud.

Medical Identity Theft: Stolen health insurance information can be used to obtain fraudulent medical services, potentially contaminating victims' medical records with incorrect information.

Financial Impact: Unauthorized use of health insurance benefits can result in claim denials for legitimate medical services and unexpected out-of-pocket expenses.

Privacy Violations: The exposure of sensitive medical information represents a fundamental breach of patient privacy that may have lasting psychological and social impacts.

Affected individuals should expect to receive breach notification letters from Episource or their healthcare providers explaining the incident and outlining available resources for protection.

How to Protect Yourself

If you believe your information may have been affected by this breach, take these immediate steps:

  1. Monitor Your Accounts: Regularly review health insurance statements and explanation of benefits (EOB) forms for unauthorized services or charges.

  2. Check Credit Reports: Obtain free credit reports from all three major credit bureaus and look for suspicious activity.

  3. Set Up Fraud Alerts: Place fraud alerts on your credit files to make it harder for identity thieves to open new accounts.

  4. Review Medical Records: Request copies of your medical records from healthcare providers to ensure accuracy and identify any fraudulent entries.

  5. Report Suspicious Activity: Contact your insurance company immediately if you notice unauthorized claims or services.

  6. Consider Credit Freezes: For enhanced protection, consider freezing your credit files to prevent new account openings.

Prevention Lessons for Healthcare Providers

This massive breach offers critical lessons for healthcare organizations and their business associates:

Vendor Risk Management: Healthcare providers must thoroughly vet business associates and ensure they maintain robust cybersecurity measures commensurate with the sensitivity of the data they handle.

Network Segmentation: Implementing proper network segmentation can limit the scope of breaches by preventing attackers from accessing multiple systems through a single entry point.

Incident Response Planning: Organizations need comprehensive incident response plans that enable rapid detection, containment, and remediation of cyber attacks.

Regular Security Assessments: Ongoing vulnerability assessments and penetration testing can identify weaknesses before cybercriminals exploit them.

Employee Training: Human error remains a leading cause of successful cyber attacks, making regular security awareness training essential.

Business Associate Agreements: Ensure BAAs include specific cybersecurity requirements and regular compliance monitoring.

The Episource breach serves as a stark reminder that no healthcare organization is immune to cyber threats. As the industry continues to digitize, robust cybersecurity measures and HIPAA compliance programs become not just regulatory requirements, but business imperatives.

Protect your practice with AI-powered HIPAA compliance. Get started with HIPAA Agent.

Share:𝕏fin
Source: This breach was reported to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) Breach Portal. Data sourced from ocrportal.hhs.gov. Analysis and article generated by HIPAA Agent.

Could this happen to your practice?

Most breaches on the Wall of Shame were preventable with proper HIPAA compliance measures. Get AI-powered protection before it is too late.

Stay Off the Wall of Shame

Get continuous HIPAA compliance monitoring, automated risk assessments, and breach prevention tools.

Get Protected NowView Plans & Pricing
← All Breach Reports