Ransomware Attack Shuts Down 14 Ohio Medical Centers

Kettering Health confirmed that a cyberattack caused the outage, although it has not publicly acknowledged the attack as ransomware.
Published: May 23, 2025

KETTERING, Ohio — A sweeping ransomware attack has forced a system-wide technology shutdown at Kettering Health, a major western Ohio healthcare network, disrupting care for thousands and leading to the cancellation of all elective procedures across its 14 medical centers.

Related Article: Ransomware Landscape Shifts as Attackers Target New Victims

The cyberattack struck early Tuesday, bringing down critical IT systems at the nonprofit medical network, which employs more than 1,800 doctors and serves a significant portion of Ohio communities. Without access to electronic medical records and scheduling systems, Kettering Health officials canceled all scheduled inpatient and outpatient procedures for the day.

Despite the disruption, all medical centers remained open, and emergency rooms were still seeing patients. Healthcare staff activated established downtime protocols, reverting to pen and paper to track patient information and maintain essential operations while IT specialists investigate the breach and work to restore systems.

Ransomware Group Interlock Claims Responsibility for Kettering Health Attack

According to a CNN report, the attack is attributed to the Interlock ransomware group, an organization notorious for “double extortion” tactics targeting healthcare providers. Interlock is known for breaching company networks, exfiltrating sensitive data, and deploying ransomware to encrypt critical files. Victims are often threatened with publication of stolen information on the group’s dark web leak site unless a ransom is paid.

——Article Continues Below——

Get the latest industry news and research delivered directly to your inbox.

A ransom note left for Kettering Health reportedly stated, “Your network was compromised, and we have secured your most vital files,” further threatening to leak data allegedly stolen from the network if extortion negotiations did not begin.

Adam Dyer, an information security analyst from Cedarville University, explained to Dayton247Now how such attacks commonly occur.

“Normally, it’s just as simple as credential theft, when a hacker acquires the username and password of someone who already logs into the network,” Dyer said.

Related Article: Lehigh Valley Health Network to Pay $65 Million After Hackers Leaked Nude Photos of Cancer Patients

He emphasized that even one stolen password can enable hackers to compromise a system’s security and pose a grave risk to sensitive patient data. Dyer added that while Kettering Health has not confirmed the exact method of attack, it is plausible the perpetrators exploited a single compromised password to gain broader network access.

Kettering Health is still in the early stages of its investigation and has not confirmed the extent of any patient data theft. The organization confirmed that a cyberattack caused the outage, although it has not publicly acknowledged the attack as ransomware.

Shortly after the incident became public, Kettering Health warned the community about scam calls, cautioning patients and staff to remain vigilant.

Tuesday’s attack is the latest in a rising wave of assaults on healthcare providers, with threat actors increasingly targeting critical medical and patient data. The disruption highlights the ongoing vulnerability of healthcare IT systems and the pressing need for advanced cybersecurity defenses.

Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series