Loading...

CareCloud Confirms Data Breach Affecting Electronic Health Record System

CareCloud Data Breach

CareCloud, Inc., a publicly traded healthcare IT provider serving more than 40,000 medical providers across the United States, has confirmed a cybersecurity incident that resulted in unauthorized access to patient health information. The New Jersey-based company disclosed the breach in a March 27, 2026 filing with the U.S. Securities and Exchange Commission (SEC), stating that attackers gained access to one of its six electronic health record (EHR) environments on March 16.

The intrusion caused an 8 hour network disruption within the company’s CareCloud Health division before systems were fully restored that evening. CareCloud confirmed that the compromised environment contained patient health records for its healthcare customers, though the full scope of affected individuals remains under investigation. The company has engaged a Big Four accounting firm to conduct a comprehensive forensic investigation and is working to determine which specific data elements were accessed or exfiltrated during the breach.

Company Background

CareCloud provides cloud-based software-as-a-service (SaaS) solutions to more than 2,600 medical practices, hospitals, and health systems in all 50 states. The company offers a comprehensive platform that includes electronic health records, practice management software, revenue cycle management, patient experience management, and AI-driven clinical documentation tools. With approximately 4,000 employees worldwide, CareCloud trades on NASDAQ under the ticker symbol CCLD.

Incident Timeline and Response

According to the SEC filing, CareCloud detected the unauthorized access on March 16, 2026, and immediately began containment efforts. The company reported the incident to its cybersecurity insurance carrier and engaged external cybersecurity experts to secure the environment and conduct forensic analysis. All affected functionality and data access were restored within approximately 8 hours of the initial detection.

CareCloud emphasized that only one of its six EHR environments was impacted, with no evidence of compromise to other platforms, divisions, systems, or environments. The company confirmed that the threat actor no longer has access to its systems and that all affected services are fully operational.

Potential Data at Risk

  • Patient names and demographic information
  • Medical record numbers
  • Diagnosis and treatment information
  • Prescription and medication data
  • Lab results and test information
  • Health insurance details
  • Provider notes and clinical documentation

Materiality Determination

In its SEC filing, CareCloud stated that as of March 24, 2026, the company determined the incident to be material due to the sensitivity of potentially affected information and the possible consequences for patients, customers, and the company’s reputation. The disclosure also cited potential costs related to remediation, response, legal matters, regulatory compliance, and required notifications.

Investigation Status

The forensic investigation is ongoing to determine the exact nature and scope of data accessed during the breach. CareCloud has not disclosed an estimated timeline for completing the investigation or when affected individuals will be notified. No ransomware group has publicly claimed responsibility for the attack, and the company has not indicated whether this was a ransomware incident or another form of cyberattack.

Healthcare Sector Targeting

This breach adds to a growing list of healthcare technology companies targeted by cybercriminals in 2026. Healthcare organizations remain high-value targets due to the sensitive nature of protected health information (PHI) and the critical operational impact of system disruptions.

CareCloud has stated it is implementing additional security measures to strengthen its infrastructure and prevent future incidents. The company continues to assess the full impact of the breach and has committed to notifying affected individuals once the investigation determines the scope of compromised data.

Picture of K4CGS

K4CGS

K4CGS is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Share this:

Related Posts

Newsletter signup

Get the latest data breach and dark web news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews