Hackers focus on medical records because the combination of demographic data, insurance details, clinical information, and financial identifiers creates a dataset that can be misused in multiple ways.
Medical records contain a broad range of identifiers. A single file can include a person’s name, address, date of birth, Social Security number, treatment history, prescription details, insurance information, and more. This concentration of Protected Health Information allows attackers to commit several forms of fraud without needing to combine data from multiple sources. The same record can support identity theft, insurance fraud, tax fraud, and the creation of synthetic identities. Because the information is detailed and stable over time, it retains value long after the initial theft.
Financial data such as credit card numbers lose value quickly once a breach is detected. Banks can cancel cards, reverse transactions, and block further activity. Medical information does not have an equivalent cancellation mechanism. A diagnosis, a date of birth, or a Social Security number remains constant. Attackers can use the same information repeatedly, and the victim may not discover the misuse for years. This long period of usefulness increases the appeal of medical data in underground markets.
The Operational Environment is Also a Factor
Healthcare organizations rely on interconnected networks that support clinical workflows, diagnostic equipment, scheduling systems, billing platforms, and communication tools. Many of these networks were not designed with modern security expectations in mind. Legacy software, outdated operating systems, and specialized medical devices can be difficult to update or replace. These conditions create opportunities for attackers to exploit vulnerabilities that remain unpatched for extended periods.
Healthcare organizations also face operational pressures that influence how they respond to incidents. Interruptions to clinical systems can delay treatment, disrupt the administration of medication, and affect patient safety. This creates leverage for extortion attempts, particularly in ransomware incidents. When systems are encrypted and no reliable, well-tested backup and recovery plan exists, the urgency to restore operations can narrow the organization’s options and influence decision‑making.
Attackers Often Target Organizations with Extensive Networks
Healthcare organizations store large volumes of data, and attackers know that a single intrusion can yield thousands or millions of records. This scale increases the potential return on effort. A breach affecting a small clinic can expose hundreds of records, while a breach affecting a large health system can expose millions. Attackers often target organizations with extensive networks because a single point of entry can provide access to multiple facilities, subsidiaries, or business partners.
The presence of business associates also contributes to the risk. Healthcare organizations rely on billing companies, transcription services, cloud platforms, and other external partners. Each partner may have access to medical information or systems that store it. Attackers frequently target business associates because a compromise at one point in the chain can provide access to multiple clients. When a business associate experiences a breach, the impact can extend across many organizations.
How Hackers Misuse Medical Records
Medical records can reveal vulnerabilities that attackers can use to manipulate individuals via targeted social engineering. Knowledge of a diagnosis, a recent procedure, or a prescription can be used to craft convincing messages that appear legitimate. Attackers may impersonate insurers, pharmacies, or healthcare providers to obtain additional information or gain access to accounts. Because the information appears credible, victims may not recognize the deception.
The misuse of medical records can also extend into areas unrelated to financial fraud. Clinical data can be used to impersonate individuals to obtain controlled substances or to take over patients’ portal accounts. It can also be used to submit false insurance claims for services never provided. In some cases, attackers use stolen identities to receive medical treatment under another person’s name. This can lead to inaccurate entries in the victim’s medical record, which may affect future care.
Examples of How Hackers Misuse Medical Records
Record Contamination and Financial Fallout
In one widely reported incident, a San Diego woman discovered that another individual had used her identity to obtain treatment at Scripps Memorial Hospital. The imposter’s clinical history — including behavioral‑health notes and diagnostic information — was added directly into the victim’s medical record. The victim only learned of the theft after receiving a bill exceeding $100,000. Beyond the financial impact, the contamination of her medical record created uncertainty about which entries reflected her actual health status, complicating future care and insurance interactions.
Kidney Transplant Obtained Under a Stolen Identity
In another documented case, a Guatemalan national used a stolen identity to obtain a kidney transplant in the United States. Prosecutors later noted that the victim “missed out on the chance to get the kidney” because the transplant was recorded under his name. The fraudulent procedure altered the victim’s medical history, created confusion about his transplant status, and introduced long‑term risks related to organ‑matching, eligibility, and continuity of care.
Insurance Benefits Exhausted by a Fraudster
The Federal Trade Commission has documented a case involving a New York woman whose insurance benefits were used up by an unknown individual receiving care under her identity. When she later sought legitimate treatment, her insurer initially denied coverage because her benefits had already been exhausted. She then faced unexpected out‑of‑pocket costs, collection notices, and months of administrative work to correct her records and restore her coverage.
Strengthen Defenses Against Hackers with Cybersecurity Training
Under the HIPAA Security Rule, healthcare organizations must provide workforce training that equips employees to recognize and mitigate threats to medical records. Effective cybersecurity training goes beyond technical instruction. It helps employees understand how their daily actions influence the security of Protected Health Information (PHI) and the organization’s overall risk posture.
To strengthen defenses against hackers, a healthcare organization’s cybersecurity training should consist of at least the following:
Building a Shared Understanding of Cybersecurity Risks
Training should begin by establishing a common foundation. Workforce members need a clear explanation of why cybersecurity matters in a clinical environment, how a HIPAA violation differs from a data breach, and what security failures mean for patients and the organization. Using real examples helps employees see that cybersecurity is not an abstract IT issue — it directly affects patient safety, continuity of care, and the organization’s ability to function.
HIPAA, the Security Rule, and What Counts as PHI
Training should include a practical refresher on HIPAA and the major Security Rule requirements, especially for employees who do not handle PHI every day. This portion should clarify what qualifies as PHI, why some organizations adopt stricter internal standards, and how cybersecurity expectations fit into broader compliance obligations. The goal is to help employees understand why safeguards exist and how their actions influence the organization’s risk profile.
Protecting Workstations, Devices, and Physical Spaces
Training should address everyday behaviors that prevent avoidable breaches. Employees need guidance on securing workstations, carts, and connected equipment; logging out of systems before stepping away; and avoiding the use of personal devices unless authorized. This section should also explain the risks associated with removable media and outline proper disposal procedures for any device that has stored PHI.
Passwords, Access Controls, and Account Security
Training should reinforce the importance of unique user credentials and the risks associated with weak or reused passwords. Employees need to understand why passwords must never be shared, how attackers exploit compromised credentials, and what steps to take if they suspect their account has been misused. These lessons prepare the workforce for later discussions about phishing, social engineering, and privilege escalation.
Recognizing Social Engineering in Healthcare Settings
Training should help employees recognize the tactics attackers use to manipulate people. This includes explaining phishing, spear‑phishing, and business‑email‑compromise attacks, as well as the specific ways these threats appear in healthcare environments. Employees should practice identifying unusual requests, verifying unexpected messages, and slowing down when something feels “off.”
Understanding Technical Safeguards and Workforce Responsibilities
Training should explain how technical safeguards work and why they matter. Employees need to understand how attackers move laterally through networks, why malicious insiders pose a risk, and how small lapses — such as ignoring a security alert or staying logged in on a shared workstation — can create openings for attackers. This section should also reinforce that undermining technical safeguards or mishandling credentials can result in sanctions.
Identifying and Reporting Security Incidents
Training should conclude with clear guidance on how to recognize and report potential security incidents. Employees need to know the early signs of suspicious activity, from repeated login failures to unusual system behavior, and understand that an incident does not need to result in a breach to require reporting. Clear reporting pathways help security teams act before attackers gain a foothold.
Cybersecurity in Healthcare is a Shared Responsibility
Medical records will continue to attract attackers as long as the information they contain remains valuable, difficult to revoke, and essential to patient care. Healthcare organizations cannot eliminate every vulnerability, but they can reduce the likelihood and impact of an attack by strengthening their technical safeguards, improving operational resilience, and investing in workforce readiness. When employees understand how attackers operate and how their own actions influence security, they become an essential part of the organization’s defense.
Cybersecurity in healthcare is a shared responsibility. Technology, policies, and monitoring tools matter, but they are most effective when paired with a workforce that recognizes threats early and responds appropriately. By building a culture of awareness and accountability, healthcare organizations can better protect their systems, their data, and the patients who depend on them.
The post Why do Hackers Focus on Medical Records? appeared first on The HIPAA Journal.


