HomeNewsBreachesAPIAboutAccount
davita-2025

DaVita Breach

Apr 12, 2025

1,367,074 rows

Added on May 27, 2025
Data Found in the Breach
Social Security Number
Phone Number
Name
Doctor Name
Home Address
Medical Records
Insurance Provider

Search the Leak

Full Name
OR
Phone Number
Social Security Number

What happened in the DaVita Breach?

DataBreach.com Team · May 26th 2025, 8:00 pm EDT

Incident Overview      

In mid-April 2025, Denver-based DaVita Inc., one of the world’s largest kidney dialysis providers, disclosed that it had discovered a ransomware incident on April 12 that encrypted portions of its network and disrupted certain operations, though patient care continued uninterrupted under contingency measures.      
Following the detection, DaVita activated its incident response protocols, proactively isolating affected systems, engaging third-party cybersecurity experts, and notifying law enforcement as part of its containment efforts. As of early May, the full extent and duration of the disruption remained under investigation, with the company working to restore normal operations as swiftly as possible.      
      

Discovery and Containment      

DaVita first alerted investors and regulators to the breach in an 8-k filing with the U.S. Securities and Exchange Commission on April 14, 2025, stating that a ransomware strain had encrypted key network elements and impaired data access across multiple facilities.      
The provider immediately implemented its incident response playbook-isolating compromised systems to limit lateral movement, deploying backup protocols to maintain patient treatments, and enlisting external forensic teams to identify the attack vector and remediate vulnerabilities.      
      

Data Exposure Claims Emerge      

Approximately two weeks after the initial breach, the Interlock ransomware gang claimed responsibility, asserting it had stolen over 20 terabytes of proprietary and patient data. Cybersecurity publication CPO Magazine reports that Interlock began leaking roughly 1.5 terabytes of that haul-comprising nearly 700,000 files-on the dark web after ransom negotiations reportedly broke down. 
      
DaVita confirmed it was aware of the postings and stated it had launched a comprehensive review of the potentially exposed data to determine which individuals and records were implicated.      
      

Impact on Patients      

An independent, ongoing investigation by DataBreach.com has identified that the breach exposed the following types of personally identifiable information (PII):      

  • Full name       
  • Social Security number (SSN)       
  • Phone number       
  • Medical diagnosis       
  • Insurance provider       
  • Treating physician’s name       
    Not every individual’s data was affected in the same way. Determining the precise impact on each person requires a case-by-case review of the compromised records.       
    By using our breach lookup tool, you can easily verify whether specific PII was compromised in the breach.      
          
          

DaVita’s Ongoing Investigation      

DaVita has stated that its forensic investigation remains active, focusing on pinpointing the precise scope of data theft and identifying all affected parties. A company spokesperson reiterated that DaVita will notify any individuals whose information was compromised “as appropriate” and collaborate with vendors and partners to strengthen defenses against future intrusions.      
      

Healthcare Sector Under Siege      

The DaVita breach exemplifies a broader surge in cyberattacks targeting the healthcare ecosystem, where vast repositories of high-value personal and medical data are prime targets for extortion. According to industry reports, two-thirds of healthcare organizations experienced ransomware incidents in 2024-up from 60% in 2023-underscoring systemic vulnerabilities in legacy systems and under-resourced security postures.      

Created and maintained by
For media inquiries, contact us at contact@databreach.com