Security

Why Social Security Numbers Keep Appearing In Healthcare Breaches—and How It Puts Patients At Risk

Why Social Security Numbers Keep Appearing in Healthcare Breaches—and How It Puts Patients at Risk

Healthcare entities are common targets for cybercriminals, and one of the most concerning risks in these breaches is the repeated exposure of Social Security numbers (SSNs). Credit card numbers can be changed if stolen; however, SSNs are permanent identifiers linked to a person’s financial and medical identity. Because of this permanence, SSNs are so valuable in the underground data economy.

The recent Doctors Hospital at Renaissance, Ltd. (DHR Health) Data Breach highlights this risk. DHR Health announced that hackers accessed sensitive patient data including names, dates of birth, addresses, information about treatments and procedures, health information, health insurance data, and very significantly, Social Security numbers. The breach occurred in May of 2025, while individuals affected did not learn about it until November of 2025. The time frame to notify underscores the alarming vulnerability of healthcare records. 

Social Security Numbers (SSNs) are often in demand because they act as a "master key" to an individual’s identity. Stolen SSNs can be used by criminals for a variety of nefarious purposes, including opening fraudulent bank and credit accounts and filing false tax returns. Within the healthcare setting, stolen SSNs can also facilitate medical identity theft, which occurs when criminals obtain medical services, such as medications or procedures, under another person's identity. In turn, this can lead to false entries in medical records and potentially harm patients.

There are a few reasons why SSNs show up repeatedly in healthcare breaches. First, the majority of healthcare providers still store this information in numerous, potentially disparate, systems. Patient registration, billing, insurance verification, electronic health record systems— all may have copies of SSNs—adding to the number of possible points of exposure. Second, legacy systems, with outdated safeguards, are prevalent within healthcare making systems vulnerable to attack. Attackers could use their competency to breach these inadequate protections.

Additionally, health care providers frequently enter into contracts with third-party vendors to handle billing, claims processing, and data storage. Although such third-party partnerships are an operational necessity, they certainly increase an attack surface. A breach at one vendor could expose the SSNs of thousands or millions of patients, as evidenced by other large-scale incidents in healthcare.

The risk to patients is not merely hypothetical; once SSNs have been compromised, victims face the possibility of identity theft, credit fraud, and the use of their medical information for years to come. Unlike other credentials, there is no "reset" for a social security number. Even the most diligent monitoring of credit reports or medical records cannot eliminate risk entirely.

The breach at DHR Health serves as a reminder that protecting healthcare related data must center around protecting identity information. Patients and providers both need to push for better encryption, strict restrictions on SSNs retention, and strong security standards on all systems with sensitive identifiers. It's important to be aware; people should always keep prior records of their finances and health records closely, and report suspicious activity as soon as they notice it.

As a world with data more widely digitized in healthcare, Social Security numbers are still one of the most vulnerable and invaluable target of criminals. Breaches like DHR Health reiterate the continuing importance of strong safeguards and well-informed patient vigilance.