CareCloud data breach: what happened and what's at risk

UpGuard Team
UpGuard Team
March 30, 2026

Key facts: CareCloud data breach

  • Date occurred: March 16, 2026
  • Date discovered: March 16, 2026
  • Date reported: March 28, 2026
  • Target entity: CareCloud
  • Source of breach: Unknown, unauthorized third-party
  • Status: Under investigation; reported on March 28, 2026.
  • Severity: Medium; unauthorized access to an electronic health record environment causing temporary service disruption and potential data exposure.

What happened in the CareCloud data breach?

CareCloud (carecloud.com), a Somerset, New Jersey-based healthcare technology company, disclosed a cybersecurity incident that occurred on March 16, 2026. The incident was publicly reported on March 28, 2026, following a recent SEC filing. An unauthorized third party gained access to a specific portion of the CareCloud Health division, specifically one of its six electronic health record (EHR) environments. This breach resulted in an eight-hour disruption to functionality and data access before systems were restored that same evening.

The company believes the incident was contained to a single environment and did not affect its other platforms. However, investigations continue to determine if sensitive patient information was accessed or exfiltrated. The medium-severity rating reflects the temporary disruption of critical healthcare services and the potential for sensitive data exposure. While operations have resumed, the involvement of healthcare records typically increases the risk of identity theft or medical fraud if data was indeed compromised.

Who is behind the incident?

The attacker or cause of the incident has not been identified.

Impact and risks for CareCloud customers

The primary risk for CareCloud customers and patients involves the potential exposure of sensitive medical and personal information. If data exfiltration is confirmed, affected individuals could face risks of targeted phishing, identity theft, or medical insurance fraud. The disruption to the EHR environment also highlights risks regarding service availability, although CareCloud reported that systems were restored within eight hours.

In response to such incidents, affected organizations typically conduct forensic audits and offer credit monitoring services. Individuals should remain vigilant for suspicious communications and monitor their medical billing statements for unauthorized charges. Maintaining strong, unique passwords for healthcare portals is also a critical protective step. Proactive transparency from the provider remains essential for mitigating long-term security impacts.

How to protect against similar security incidents

Following the security incident at CareCloud involving healthcare record environments, it is important to take proactive steps to secure sensitive health and personal data.

  • Monitor medical and financial statements. Regularly review Explanation of Benefits (EOB) statements for services you did not receive. Watch for unauthorized charges or changes to your medical records.
  • Enhance account security. Enable multi-factor authentication (MFA) on all healthcare and insurance portals. Update passwords to ensure they are complex, unique, and not reused across other services.
  • Implement continuous monitoring. Organizations should deploy attack surface management tools to identify vulnerabilities in EHR environments. Maintain real-time monitoring to detect unauthorized access to sensitive databases before disruptions occur.

Staying informed through official company updates is the best way to understand specific risks to your data.

Frequently asked questions

What happened in the CareCloud security breach?

On March 28, 2026, CareCloud (carecloud.com) disclosed a security breach. According to initial reports, an unauthorized third party accessed one of its electronic health record environments on March 16, causing an eight-hour service disruption.

When did the CareCloud breach occur?

The CareCloud breach was publicly reported on March 28, 2026. The actual incident took place on March 16, 2026, resulting in a temporary disruption to data access.

What data was exposed?

The types of data involved in the CareCloud incident have not been disclosed. This page will be updated as verified information becomes available regarding whether patient information was accessed or exfiltrated.

Is my personal information at risk?

If you interacted with CareCloud, there's a possibility your personal information could be affected. Similar incidents often involve email addresses, login details, or financial records. Stay alert for updates and take precautionary measures to secure your accounts.

What steps should companies take after being breached?

CareCloud has engaged outside cyber-response specialists and notified law enforcement. The company is currently investigating the extent of the data access, reviewing security measures, and has restored the affected EHR environment.

Sources

CareCloud Investigating Data Breach

This cybersecurity news article is powered by UpGuard Breach Risk — continuous attack surface monitoring for your organisation and supply chain.

How secure is ?

  • Check icon
    View our free preliminary report on ’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating