New York Hospital Ransomware Attack Exposes Data of Over 670,000 Patients
Richmond University Medical Center (RUMC) in Staten Island, New York, has disclosed a massive data breach stemming from a ransomware attack initially detected in May 2023. The attack, which compromised sensitive data belonging to over 670,000 individuals, is a stark reminder of the growing cybersecurity risks facing healthcare institutions.

Table of Contents
Timeline of the Incident
The ransomware attack disrupted hospital operations for several weeks, forcing the facility to work tirelessly to restore affected services. Early investigations suggested that electronic health record systems were not compromised. However, a deeper forensic analysis uncovered that other files on the hospital's network were accessed or stolen in early May.
On December 1, 2024, investigators confirmed that some of the exposed files contained highly sensitive information, including:
- Names
- Social Security numbers
- Driver’s license or state ID numbers
- Dates of birth
- Financial and payment card information
- Biometric data
- User credentials
- Medical and health insurance information
This combination of data is a treasure trove for cybercriminals, enabling identity theft, financial fraud, and other malicious activities.
Delayed Discovery Raises Concerns
Richmond University Medical Center’s response underscores the challenges of uncovering the full scope of a ransomware attack. The hospital undertook a manual review of each potentially compromised file—a time-consuming process that contributed to significant delays in notifying affected individuals.
While RUMC is offering 12 months of free credit monitoring to individuals whose Social Security numbers were exposed, the prolonged timeline between the breach and its discovery raises critical concerns. If the stolen data was indeed accessed or exfiltrated over 18 months ago, cybercriminals have had ample time to exploit it.
Ransom Payments and Speculation
The breach has sparked speculation about whether the hospital paid a ransom. Typically, ransomware groups publicly leak stolen data if no ransom is paid. However, the delayed discovery of the sensitive information complicates this narrative.
Regardless of ransom payment, the incident highlights the devastating potential of ransomware attacks. The healthcare sector remains a prime target for cybercriminals due to the value of patient data and the high stakes involved in service disruptions.
Regulatory Reporting
In mid-December 2024, RUMC informed state attorney generals about the breach but withheld the exact number of individuals impacted. However, reports to the U.S. Department of Health and Human Services confirmed that 674,033 people were affected, making this one of the largest healthcare data breaches in recent years.
Protecting Patients and Preventing Future Attacks
The Richmond University Medical Center incident emphasizes the need for healthcare organizations to bolster their cybersecurity defenses. To reduce the risk of similar breaches:
- Invest in Advanced Threat Detection: Proactively monitor network traffic and detect unusual activity before it escalates into a full-blown attack.
- Implement Multi-Factor Authentication (MFA): Strengthen access controls to protect sensitive systems and data.
- Regular Data Backups: Maintain encrypted backups and ensure rapid recovery capabilities to mitigate the impact of ransomware attacks.
- Employee Training: Educate staff on identifying phishing attempts and other common attack vectors.
Conclusion
The ransomware attack on Richmond University Medical Center is a cautionary tale for the healthcare industry and beyond. With over 670,000 individuals potentially impacted, the stakes couldn’t be higher. Organizations must prioritize robust cybersecurity measures to safeguard sensitive data and prevent the devastating consequences of cyberattacks.
If you believe your information may have been compromised in this breach, take immediate steps to protect yourself. Monitor your financial accounts for suspicious activity, consider placing a credit freeze, and take advantage of any credit monitoring services offered by the hospital.