Cookeville Regional Medical Center (CRMC), a 309-bed hospital in Tennessee, has confirmed that a July 2025 ransomware attack by the Rhysida group compromised the personal and medical data of 337,917 patients. Breach notification letters began going out on April 14, 2026, more than nine months after the intrusion. The disclosure, filed with the Maine Attorney General's office, ranks as the eighth-largest ransomware breach affecting a US healthcare provider in 2025.

What Happened

On July 11, 2025, an unauthorized third party gained access to CRMC's internal network. The intrusion persisted for four days, from July 11 through July 14, during which attackers viewed or exfiltrated files containing patient data. The attack triggered a technical outage that disrupted hospital computer systems and forced IT teams and external incident responders into an emergency containment effort.

Within weeks of the attack, the Rhysida ransomware group publicly claimed responsibility. The group posted sample files from the breach on its dark web leak site and issued a ransom demand of $1,150,000. CRMC's breach notice states there is currently no evidence that patient data has been misused, though the nine-month gap between compromise and notification leaves a wide window of exposure.

What Was Taken

The compromised dataset potentially includes highly sensitive categories across 337,917 individuals:

This combination of financial, identity, and health data represents the most dangerous class of breach for affected individuals. Medical records cannot be changed like a credit card number, making them a persistent vector for identity fraud, insurance scams, and targeted social engineering for years after exposure.

Who Is Rhysida

Rhysida is a ransomware-as-a-service (RaaS) operation first observed in mid-2023. The group has shown a consistent preference for targeting healthcare, education, and government organizations. Rhysida operators typically gain initial access through phishing campaigns or by exploiting exposed remote services, then deploy their eponymous encryptor after lateral movement and data exfiltration.

The group operates a double-extortion model: encrypting victim systems while simultaneously stealing data and threatening public release. In CRMC's case, Rhysida moved quickly from compromise to public claim, posting sample files to pressure the hospital into payment. CISA and the FBI issued a joint advisory on Rhysida in November 2023, warning specifically about its targeting of the healthcare and public health sector.

Why It Matters

This incident highlights three persistent failures in healthcare cybersecurity posture:

Notification lag remains systemic. Nine months between breach and patient notification is not unusual in healthcare, but it is deeply problematic. Affected individuals had no opportunity to take protective action during the period when their stolen data was most likely to be monetized on criminal marketplaces.

Healthcare remains a soft, high-value target. Hospitals operate under pressure to maintain uptime for patient care, which ransomware operators exploit as leverage. The data they hold is uniquely valuable on dark web markets, where medical records sell for significantly more than financial credentials alone.

Rhysida continues to operate with impunity. Despite federal advisories and public attention, the group shows no signs of slowing its campaigns against critical infrastructure. Each successful healthcare hit validates the playbook and funds further operations.

Rebecca Moody, Head of Data Research at Comparitech, noted that the full scope of these attacks often takes months or years to determine, adding that CRMC should be recognized for the thoroughness of its investigative approach.

The Attack Technique

Based on known Rhysida TTPs and the details available from this incident:

The speed from initial compromise to public claim suggests either a well-rehearsed operational playbook or prior reconnaissance of the target environment.

What Organizations Should Do

Sources: Cookeville hospital notifies 337K after hack - Cybernews