NYC Health + Hospitals says mega data breach allowed hackers to steal personal data, medical records, and fingerprints scans of around 1.8 million people
Around 1.8 million people affected in major breach
- NYC Health + Hospitals confirms cyberattack exposed sensitive data on 1.8 million individuals
- Stolen information includes medical records, government IDs, geolocation data, and biometric fingerprints and palm prints
- The breach stemmed from a third‑party vendor flaw, raising long‑term risks of fraud, impersonation, and targeted phishing
NYC Health + Hospitals (NYCHHC), the public healthcare system of New York City and the largest municipal healthcare network in the United States, has confirmed it suffered a cyberattack in which it lost highly sensitive data on 1.8 million people.
Among the stolen data are fingerprints and palm prints, which can never be changed, making this breach even more disruptive.
Citing a data breach notice published on the NYCHHC website, TechCrunch says the attack started in November 2025, and lasted until February 2026, when the criminals were finally spotted and removed from the network. During this time, however, they were able to exfiltrate sensitive data on 1.8 million people, including patients’ health insurance plan and policy information, medical information (e.g., diagnoses, medications, tests, and imagery), billing, claims, and payment information.
Third-party supply chain attack
Social Security numbers, passports, and driver’s licenses were apparently also compromised, and to make matters even worse, NYCHHC said the attackers also walked away with “precise geolocation data”.
But the most valuable data stolen are definitely fingerprints and palm prints. We don’t know exactly how many people are affected, and whether or not these are employees, patients, or both, but according to TechCrunch, NYCHHC requires employees to enroll their fingerprints for criminal records checks.
The incident was reported to the US Department of Health and Human Services.
NYCHHC said the criminals exploited a flaw in an unnamed third-party vendor. For Chris Debrunner, CISO at CBTS, this isn’t much of a surprise, since healthcare organizations are “interconnected by design”. However, this also means “third-party risk and the third-parties they are using cannot be treated as a procurement checkboxes or an annual compliance checkbox.”
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
“The downstream risk and impact to the affected individuals could last well beyond the initial mitigations,” Debrunner commented. “Medical information, government IDs, location data, and biometrics could all be used successfully for targeted phishing, impersonation, fraud, and social engineering not just the ones directly impacted, but potentially to extended family and acquaintances. Third-party access needs to be limited, monitored, and tied to clear inventories of roles, data and systems. In these sensitive environments, security has to be continuously measured by how quickly you can detect and mitigate before ever getting to the point of recovery."

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mobile:
McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.