Critical Severity (Score: 10/10)

Horizon Healthcare RCM Data Breach Exposes 210,901 Patient Records

Share:𝕏fin

Breach Details

Entity
Horizon Healthcare RCM
Individuals Affected
210,901
State
IN
Breach Type
Hacking/IT Incident
Location
Network Server
Date Reported
June 27, 2025
Entity Type
Healthcare Clearing House
Business Associate
No

Horizon Healthcare RCM Data Breach: 210,901 Patients Impacted by Cyberattack

A significant cybersecurity incident at Horizon Healthcare RCM, an Indiana-based healthcare clearing house, has exposed the personal health information of 210,901 individuals. The breach, reported to the Department of Health and Human Services on June 27, 2025, represents one of the larger healthcare data breaches of the year and highlights the ongoing cybersecurity challenges facing healthcare organizations.

What Happened

Horizon Healthcare RCM experienced a hacking incident that compromised their network server systems. As a healthcare clearing house, the company processes electronic healthcare transactions between healthcare providers and insurance companies, making it a valuable target for cybercriminals seeking access to large volumes of sensitive health data.

The breach was classified as a "Hacking/IT Incident" affecting the organization's network server infrastructure. While specific details about the attack methodology remain limited, the incident follows a concerning trend of cyberattacks targeting healthcare clearing houses and revenue cycle management companies that handle vast amounts of patient data on behalf of multiple healthcare providers.

The breach was officially reported to HHS on June 27, 2025, appearing on the agency's Wall of Shame database that tracks major healthcare data breaches affecting 500 or more individuals.

Who Is Affected

The cyberattack impacted 210,901 individuals whose personal health information was stored on Horizon Healthcare RCM's compromised network servers. This substantial number of affected patients reflects the company's role as a healthcare clearing house that processes transactions for multiple healthcare providers across Indiana and potentially other states.

Patients affected by this breach likely include individuals who received healthcare services from providers that utilize Horizon Healthcare RCM's services for:

  • Claims processing
  • Payment transactions
  • Electronic health record management
  • Revenue cycle management
  • Insurance verification services

The broad scope of impact demonstrates how third-party healthcare service providers can create systemic risks across the healthcare ecosystem when their systems are compromised.

Breach Details

While official details remain limited, the breach targeted Horizon Healthcare RCM's network server infrastructure. Healthcare clearing houses like Horizon typically store and process several types of sensitive information that may have been compromised:

Potentially Exposed Information:

  • Patient names and addresses
  • Social Security numbers
  • Health insurance information
  • Medical record numbers
  • Treatment and diagnosis codes
  • Provider information
  • Claims and billing data
  • Electronic health records

The attack on network servers suggests cybercriminals may have gained unauthorized access to the company's core data processing systems. This type of breach often involves sophisticated attack methods such as:

  • Ransomware deployment
  • Advanced persistent threats (APTs)
  • Credential stuffing attacks
  • Exploitation of unpatched vulnerabilities
  • Social engineering tactics

What This Means for Patients

For the 210,901 individuals affected by this breach, the exposure of personal health information creates several immediate and long-term risks:

Identity Theft Concerns: With access to names, addresses, Social Security numbers, and health insurance information, cybercriminals can commit various forms of identity fraud, including opening fraudulent accounts and filing false insurance claims.

Medical Identity Theft: Criminals may use stolen health information to obtain medical services, prescription drugs, or submit fraudulent insurance claims under victims' names, potentially affecting their medical records and insurance benefits.

Financial Impact: Unauthorized use of health insurance information can lead to unexpected bills, insurance claim denials, and disruption of legitimate healthcare services.

Privacy Violations: The exposure of sensitive medical information represents a fundamental violation of patient privacy rights protected under HIPAA regulations.

Affected individuals should receive breach notification letters from Horizon Healthcare RCM within 60 days of the incident discovery, as required by HIPAA breach notification rules.

How to Protect Yourself

If you believe your information may have been compromised in this breach, take these immediate protective steps:

Monitor Your Accounts:

  • Review all medical bills and insurance statements carefully
  • Check credit reports for unauthorized accounts or activity
  • Monitor bank and credit card statements regularly
  • Set up fraud alerts with credit reporting agencies

Protect Your Information:

  • Place a credit freeze on your credit reports
  • Consider identity theft monitoring services
  • Keep detailed records of all medical treatments and bills
  • Report suspicious activity immediately to providers and insurers

Stay Vigilant:

  • Be cautious of phishing emails or calls requesting personal information
  • Verify the legitimacy of any medical bills or insurance communications
  • Report potential medical identity theft to your healthcare providers
  • File complaints with appropriate regulatory agencies if needed

Prevention Lessons for Healthcare Providers

The Horizon Healthcare RCM breach offers critical lessons for healthcare organizations seeking to strengthen their cybersecurity posture:

Third-Party Risk Management: Healthcare providers must carefully vet and monitor their business associates, including clearing houses and revenue cycle management companies. Regular security assessments and contractual security requirements are essential.

Network Security: Robust network security measures, including firewalls, intrusion detection systems, and network segmentation, can help prevent and contain cyberattacks.

Regular Security Updates: Maintaining current security patches and software updates is crucial for protecting against known vulnerabilities that cybercriminals commonly exploit.

Employee Training: Comprehensive cybersecurity awareness training helps staff recognize and respond appropriately to potential threats like phishing emails and social engineering attempts.

Incident Response Planning: Having a well-defined incident response plan enables organizations to respond quickly to breaches, minimizing damage and ensuring compliance with notification requirements.

Encryption and Access Controls: Implementing strong encryption for data at rest and in transit, along with strict access controls and multi-factor authentication, provides additional layers of protection.

The healthcare industry continues to face escalating cyber threats, with clearing houses and other third-party service providers representing attractive targets due to the large volumes of data they process. This incident underscores the critical importance of comprehensive cybersecurity strategies and the shared responsibility of all healthcare ecosystem participants to protect patient information.

Protect your practice with AI-powered HIPAA compliance. Get started with HIPAA Agent.

Share:𝕏fin
Source: This breach was reported to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) Breach Portal. Data sourced from ocrportal.hhs.gov. Analysis and article generated by HIPAA Agent.

Could this happen to your practice?

Most breaches on the Wall of Shame were preventable with proper HIPAA compliance measures. Get AI-powered protection before it is too late.

Stay Off the Wall of Shame

Get continuous HIPAA compliance monitoring, automated risk assessments, and breach prevention tools.

Get Protected NowView Plans & Pricing
← All Breach Reports