
On July 14, 2025, Laurel Health Centers, a network of Federally Qualified Health Centers (FQHCs) in northern Pennsylvania, identified unusual activity within its email environment. An investigation revealed that, between July 11 and July 25, 2025, an unauthorized individual accessed certain email accounts and may have viewed or copied files containing sensitive patient information.
According to the Notice of Data Privacy Event, the breach exposed personally identifiable information (PII) and protected health information (PHI). These include names, dates of birth, Social Security numbers, addresses, telephone numbers, emails, medical record numbers, dates of service, medical providers, Medicare information, insurance details, diagnostic information, treatment and diagnosis data, insurance carrier, procedure codes, disability status, dental and denture information, immunization records, behavioral health information, Pennsylvania Account IDs, account numbers, credit card details, checking account information and claim information.
The breach was not immediately contained, as it took time for investigators to ensure the threat actor was fully removed from the system and could not regain access. In some cases, files may have been copied in addition to being viewed.
The review of potentially impacted data concluded on Dec. 30, 2025, after which notifications to affected individuals and regulatory agencies began.
To support those impacted, Laurel Health Centers is directly notifying individuals whose information was in the compromised files, provided a valid mailing address is available. They are offering free credit monitoring and identity protection services to affected individuals. Those who did not receive a letter but believe they may be impacted can call a dedicated assistance line at 1-800-405-6108, available weekdays from 8 a.m. to 8 p.m. EST.
Given the scope of the breach and the types of information involved, all current and former patients, as well as anyone who has interacted with Laurel Health Centers during or before the affected period, are strongly encouraged to remain vigilant. Recommended actions include monitoring financial accounts and credit reports for suspicious activity, placing a free security freeze or fraud alert with the major credit bureaus, and promptly reporting any signs of identity theft.








.webp)
.webp)
.webp)

.webp)
.webp)
.webp)
.webp)