University of Hawaii Cancer Center: 1.15M Affected in Ransomware Attack
Breach Details
University of Hawaii Cancer Center: 1.15 Million Affected in Major Ransomware Attack
The University of Hawaii Cancer Center has disclosed a massive data breach that exposed the personal information of approximately 1.15 million individuals following a ransomware attack that occurred in August 2025. This breach, reported to authorities in March 2026, represents one of the largest healthcare data breaches in recent history and highlights the ongoing cybersecurity threats facing medical institutions.
What Happened
According to official reports, a ransomware gang successfully infiltrated the University of Hawaii Cancer Center's Epidemiology Division systems in August 2025. The attackers not only encrypted systems but also exfiltrated sensitive data containing personal and protected health information of patients and research participants.
The breach was classified as a hacking/IT incident under HIPAA breach notification requirements. The University of Hawaii confirmed that cybercriminals gained unauthorized access to their network infrastructure, compromising databases containing years of patient records and research data.
The attack targeted the Cancer Center's Epidemiology Division, which maintains extensive databases for cancer research and patient tracking. This division's systems contained both current patient information and historical research data spanning multiple years, contributing to the unprecedented scale of this breach.
Who Is Affected
The breach impacts approximately 1.15 million individuals, including:
- Current and former cancer patients
- Research study participants
- Individuals involved in epidemiological studies
- Healthcare workers and staff members
The compromised information includes Social Security numbers, which presents significant identity theft risks for affected individuals. Additional personal information likely exposed includes names, dates of birth, addresses, medical record numbers, and protected health information related to cancer diagnoses and treatments.
Given the nature of the Cancer Center's work, many affected individuals participated in long-term research studies, meaning their data may have been stored for extended periods, potentially dating back several years.
Breach Details
This ransomware attack demonstrates the sophisticated tactics employed by modern cybercriminal organizations targeting healthcare institutions. The attackers successfully:
- Penetrated network security defenses
- Gained access to sensitive databases
- Exfiltrated large volumes of personal data
- Deployed ransomware to encrypt systems
The seven-month delay between the August 2025 attack and March 2026 disclosure raises questions about breach detection capabilities and notification timelines. Under HIPAA's Breach Notification Rule (45 CFR §164.404), covered entities must notify the Department of Health and Human Services within 60 days of discovering a breach affecting 500 or more individuals.
The University of Hawaii Cancer Center operates as a healthcare provider subject to HIPAA regulations, making this breach a significant compliance concern. The scale and nature of this incident will likely trigger extensive regulatory scrutiny and potential penalties.
What This Means for Patients
For the 1.15 million affected individuals, this breach creates serious privacy and security concerns:
Immediate Risks:
- Identity theft potential due to exposed Social Security numbers
- Medical identity theft risks
- Fraudulent account creation
- Tax fraud possibilities
Long-term Implications:
- Ongoing monitoring requirements
- Potential discrimination based on health information
- Privacy concerns regarding sensitive medical data
- Possible impact on insurance and employment
The exposure of Social Security numbers is particularly concerning, as these cannot be changed like credit card numbers and provide cybercriminals with permanent identifiers for fraudulent activities.
How to Protect Yourself
If you received treatment or participated in research at the University of Hawaii Cancer Center, take these immediate steps:
1. Monitor Financial Accounts
- Review bank and credit card statements regularly
- Set up account alerts for unusual activity
- Consider freezing credit reports with all three bureaus
2. Watch for Identity Theft Signs
- Unexpected bills or medical statements
- Unfamiliar accounts on credit reports
- IRS notices about unreported income
- Denied credit applications
3. Secure Personal Information
- Never provide Social Security numbers unless absolutely necessary
- Use strong, unique passwords for all accounts
- Enable two-factor authentication where possible
- Be cautious of phishing attempts
4. Medical Identity Protection
- Review medical records and insurance statements
- Report unauthorized medical services immediately
- Monitor explanation of benefits statements
- Verify all medical appointments and procedures
5. Stay Informed
- Monitor official communications from the University of Hawaii
- Watch for updates about available resources
- Keep documentation of all breach-related correspondence
Prevention Lessons for Healthcare Providers
This massive breach offers critical lessons for healthcare organizations:
Network Security Enhancement The University of Hawaii Cancer Center has implemented several improvements following the attack, including:
- Redesigning and hardening network infrastructure
- Extending deployment of modern endpoint protection with 24/7 monitoring
- Upgrading hardware systems
- Migrating sensitive research servers into the UH Information Technology Services data center
Key Prevention Strategies:
-
Implement Zero-Trust Architecture
- Verify all users and devices before granting access
- Segment networks to limit breach impact
- Monitor all network traffic continuously
-
Regular Security Assessments
- Conduct penetration testing
- Perform vulnerability scans
- Review access controls regularly
-
Employee Training Programs
- Provide cybersecurity awareness training
- Simulate phishing attacks
- Establish clear incident response procedures
-
Data Minimization Practices
- Limit data collection to necessary information only
- Implement secure data disposal procedures
- Regular data inventory and classification
-
Backup and Recovery Planning
- Maintain secure, tested backup systems
- Develop comprehensive disaster recovery plans
- Regular testing of recovery procedures
Healthcare providers must recognize that HIPAA compliance requires reasonable safeguards under the Security Rule (45 CFR §164.308), including administrative, physical, and technical safeguards to protect electronic protected health information.
The University of Hawaii breach demonstrates that even well-established healthcare institutions remain vulnerable to sophisticated cyber attacks. Organizations must adopt a proactive, multi-layered approach to cybersecurity that includes both technological solutions and human factors training.
This incident serves as a stark reminder that healthcare data remains a prime target for cybercriminals due to its high value on illegal markets. The combination of personal identifiers, financial information, and sensitive health data makes medical records particularly valuable to attackers.
As healthcare continues digitizing operations and adopting new technologies, the attack surface for potential breaches continues expanding. Organizations must balance accessibility and efficiency with robust security measures to protect patient privacy and maintain regulatory compliance.
Could this happen to your practice?
Most breaches on the Wall of Shame were preventable with proper HIPAA compliance measures. Get AI-powered protection before it is too late.
Related Breaches
Stay Off the Wall of Shame
Get continuous HIPAA compliance monitoring, automated risk assessments, and breach prevention tools.
Get Protected NowView Plans & Pricing