Radiology Associates of Richmond Faces Investigation After 2025 Data Breach Exposes 266,000 Patient Records
Details on the 2025 Radiology Associates of Richmond breach affecting 266,000 patients, notification timeline, investigation, and recommended defender actions.

TL;DR
Radiology Associates of Richmond disclosed in May 2026 that an intrusion in July 2025 exposed personal and health data of 266,000 patients. A law firm is now investigating the incident for potential legal action.
Context
Radiology Associates of Richmond (RAR) operates imaging centers across central Virginia, providing X‑ray, CT, MRI, and interventional services to a large patient base. The practice stores extensive protected health information (PHI) required for diagnosis and billing. On or around July 25, 2025, an unauthorized actor gained access to RAR’s network and copied data belonging to current and former patients. The organization did not send individual notice letters until May 21, 2026, nearly ten months after the intrusion was discovered.
Key Facts
- Approximately 266,000 individuals had personal identifiers such as name, date of birth, address, and medical details potentially compromised. - The breach was identified internally; RAR has not publicly disclosed the initial attack vector or whether malware was deployed. - Schubert Jonckheer & Kolbe LLP began a legal investigation after receiving reports of the exposure, focusing on whether RAR failed to implement reasonable safeguards under HIPAA and state privacy laws. - No ransom note or public extortion demand has been reported, suggesting the actor may have exfiltrated data for illicit sale or identity theft.
What It Means
The incident highlights the continued risk to healthcare providers that retain large volumes of PHI. Delayed notification extends the window during which affected individuals could suffer fraud or medical identity theft. Regulatory scrutiny may increase, potentially resulting in fines under HIPAA’s Breach Notification Rule or civil settlements. Patients should monitor credit reports and consider placing fraud alerts, while RAR must improve detection and response capabilities to avoid recurrence.
What Defenders Should Do
- Enforce multi‑factor authentication on all remote access points and review privileged account usage (MITRE ATT&CK T1078). - Apply the latest patches to VPN and web‑facing services; monitor for exploitation of known vulnerabilities such as CVE‑2023‑28252 (Citrix ADC) and CVE‑2022‑22965 (Spring4Shell) as representative examples. - Deploy network segmentation to isolate PHI servers from general IT infrastructure, limiting lateral movement (T1021). - Enable centralized logging with alerts for anomalous login attempts and large data transfers (T1041). - Conduct regular phishing simulations and endpoint detection and response (EDR) tuning to catch credential theft early. - Review and update incident response plans to ensure notification timelines meet the 60‑day requirement under HIPAA.
Watch for the outcome of the Schubert Jonckheer & Kolbe investigation and any forthcoming regulatory actions or settlement negotiations that could shape future cybersecurity expectations for medical imaging providers.
Continue reading
More in this thread
South Staffs Water Data Breach Exposes 633,887 Records, Triggers £963k ICO Fine
Peter Olaleru
Beacon Mutual Delayed Breach Notice for Four Months, Exposing 131k Rhode Islanders
Peter Olaleru
TeamPCP Breach Exposes 3,800 GitHub Repositories, Source Code Offered for Sale
Peter Olaleru
Conversation
Reader notes
Loading comments...