cCARE Fresno Data Breach Exposes Sensitive Patient Info

Published
June 29, 2025
Updated
June 29, 2025
cCARE Fresno Data Breach Exposes Sensitive Patient Info
California Cancer Associates for Research and Excellence
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

Affected by the

California Cancer Associates for Research and Excellence

data breach?

Join the Lawsuit

It's free to join. 

On June 13, 2025, California Cancer Associates for Research and Excellence – Fresno (cCARE Fresno) discovered that a sophisticated email phishing attack had resulted in unauthorized access to a small number of employee email and SharePoint accounts. The breach occurred over a three-day period, from December 13 to December 16, 2024.

According to the company’s official disclosure, the attackers gained access to these accounts, and while the primary intent appeared to be launching further phishing schemes, certain emails and SharePoint files containing sensitive patient data were also accessed.

A detailed review of the compromised accounts revealed that the exposed information included both personally identifiable information (PII) and protected health information (PHI). The types of disclosed data involved are: social security numbers, names, addresses, dates of birth, financial account information, diagnosis, lab results, medication, treatment information, health insurance and claims information, provider names, and dates of treatment.

The incident was reported to the California Attorney General’s office on June 27, 2025, and further details are available in the California Attorney General’s breach report.

Although the investigation did not find evidence that any patient information was misused, the exposure of both financial and health data makes this a serious breach. The combination of PII and PHI increases the risk of identity theft, financial fraud, and potential misuse of sensitive medical details.

The breach is believed to have been caused by external cybercriminals who exploited phishing tactics to compromise employee credentials, rather than an internal error or system vulnerability.

cCARE Fresno's response

In response to the breach, cCARE Fresno immediately secured the affected email and SharePoint accounts and launched a thorough investigation with the help of cybersecurity professionals. The company has since implemented additional cybersecurity training for staff to help prevent future phishing incidents.

To support those affected, cCARE Fresno is offering complimentary enrollment in Epiq Privacy Solutions ID credit monitoring for a specified duration. This service includes credit monitoring, identity theft insurance, dark web monitoring, and identity restoration assistance. Affected individuals will receive a personalized activation code and instructions for enrolling in these services.

If you received a notification letter, it is important to take advantage of the offered identity monitoring and remain vigilant for signs of identity theft or fraud. Review your account statements and credit reports regularly, and consider placing a fraud alert or security freeze on your credit file. The company has provided a dedicated call center at 855-361-0308 for questions and support.

More information about their services can be found on the cCARE website.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Consumers Notification date
Date of Breach
December 16, 2024
Breach Discovered Date
Total People Affected
Information Types Exposed
  • Social Security numbers
  • Addresses
  • Dates of birth
  • Financial account information
  • Diagnosis
  • Lab results
  • Medication
  • Treatment information
  • Health insurance and claims information
  • Provider names
  • Dates of treatment
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image