Company Details
advocate-aurora-health
14,988
78,069
62
advocatehealth.org
0
ADV_1090924
In-progress

Advocate Aurora Health Company CyberSecurity Posture
advocatehealth.orgAdvocate Aurora Health and Atrium Health are now Advocate Health – the fifth-largest nonprofit integrated health system in the U.S. Advocate Health is the fifth-largest nonprofit integrated health system in the United States –created from the combination of Advocate Aurora Health and Atrium Health. Providing care under the names Advocate Health Care in Illinois, Atrium Health in the Carolinas, Georgia and Alabama, and Aurora Health Care in Wisconsin, Advocate Health is a national leader in clinical innovation, health outcomes, consumer experience and value-based care, with Wake Forest University School of Medicine serving as the academic core of the enterprise. Headquartered in Charlotte, North Carolina, Advocate Health serves nearly 6 million patients and is engaged in hundreds of clinical trials and research studies. It is nationally recognized for its expertise in cardiology, neurosciences, oncology, pediatrics and rehabilitation, as well as organ transplants, burn treatments and specialized musculoskeletal programs. Advocate Health employs nearly 150,000 team members across 67 hospitals and over 1,000 care locations, and offers one of the nation’s largest graduate medical education programs with over 2,000 residents and fellows across more than 200 programs. Committed to equitable care for all, Advocate Health provides nearly $5 billion in annual community benefits. Learn more: advocatehealth.org Read our social media community engagement guidelines: aah.org/social
Company Details
advocate-aurora-health
14,988
78,069
62
advocatehealth.org
0
ADV_1090924
In-progress
Between 700 and 749

AAH Global Score (TPRM)XXXX

Description: Advocate Aurora Health (AAH), a 26-hospital healthcare system in Wisconsin and Illinois, experienced a data breach that exposed the personal data of 3,000,000 patients. The incident was caused by the improper use of Meta Pixel on AAH's websites which is a tracker that helps website operators understand how visitors interact with the site. The incident compromised information including the IP address, Dates, times, and locations of scheduled appointments, Proximity to an AAH location, Medical provider information, Type of appointment or procedure, and Communications between MyChart users, which may have included first and last names and medical record numbers, Insurance information, Proxy account information etc of about 3 million people.


No incidents recorded for Advocate Aurora Health in 2025.
No incidents recorded for Advocate Aurora Health in 2025.
No incidents recorded for Advocate Aurora Health in 2025.
AAH cyber incidents detection timeline including parent company and subsidiaries

Advocate Aurora Health and Atrium Health are now Advocate Health – the fifth-largest nonprofit integrated health system in the U.S. Advocate Health is the fifth-largest nonprofit integrated health system in the United States –created from the combination of Advocate Aurora Health and Atrium Health. Providing care under the names Advocate Health Care in Illinois, Atrium Health in the Carolinas, Georgia and Alabama, and Aurora Health Care in Wisconsin, Advocate Health is a national leader in clinical innovation, health outcomes, consumer experience and value-based care, with Wake Forest University School of Medicine serving as the academic core of the enterprise. Headquartered in Charlotte, North Carolina, Advocate Health serves nearly 6 million patients and is engaged in hundreds of clinical trials and research studies. It is nationally recognized for its expertise in cardiology, neurosciences, oncology, pediatrics and rehabilitation, as well as organ transplants, burn treatments and specialized musculoskeletal programs. Advocate Health employs nearly 150,000 team members across 67 hospitals and over 1,000 care locations, and offers one of the nation’s largest graduate medical education programs with over 2,000 residents and fellows across more than 200 programs. Committed to equitable care for all, Advocate Health provides nearly $5 billion in annual community benefits. Learn more: advocatehealth.org Read our social media community engagement guidelines: aah.org/social

Care You Can Count On Whether you are searching for your next career opportunity or looking for care for yourself or a family member, you’ll find what you need at Scripps. Founded in 1924 by philanthropist Ellen Browning Scripps, Scripps is a non-profit integrated health care delivery system based

Fueled by our bold purpose to improve the health of humanity, we are transforming from a traditional health benefits organization into a lifetime trusted health partner. Our nearly 100,000 associates serve more than 118 million people, at every stage of health. We address a full range of needs wi

At UCHealth, we do things differently. We strive to promote individual and community health and leave no question unanswered along the way. We’re driven to improve and optimize health care. Our network of nationally-recognized hospitals, clinic locations and health care providers extends throughout

Advocate Health Care is proud to be a part of Advocate Health, the third-largest nonprofit integrated health system in the U.S. Advocate Health is the third-largest nonprofit, integrated health system in the United States, created from the combination of Advocate Aurora Health and Atrium Health. Pr

Owens & Minor, Inc. (NYSE: OMI) is a Fortune 500 global healthcare solutions company providing essential products and services that support care from the hospital to the home. For over 100 years, Owens & Minor and its affiliated brands, Apria® , Byram®, and HALYARD*, have helped to make each day be
City of Hope's mission is to deliver the cures of tomorrow to the people who need them today. Founded in 1913, City of Hope has grown into one of the largest cancer research and treatment organizations in the U.S. and one of the leading research centers for diabetes and other life-threatening illnes

Northside Hospital — a certified Great Place To Work® — is one of Georgia’s top health systems. We have acute-care hospitals in Atlanta, Canton, Cumming, Duluth and Lawrenceville and hundreds of outpatient locations across the state. Northside Hospital leads the U.S. in newborn deliveries and is amo

Answering God's call to bring health, healing and hope to all. Ascension is one of the nation’s leading non-profit and Catholic health systems, with a Mission of delivering compassionate, personalized care to all, with special attention to those most vulnerable. In FY2025, Ascension provided $1.7
Select Medical made a commitment more than 20 years ago to deliver an exceptional patient care experience that promotes healing and recovery in a compassionate environment. We have honored that promise by helping define the nation's standard of excellence in specialized hospital and rehabilitative c
.png)
Kaiser Permanente's health plan settled a class action lawsuit concerning a 2024 breach that stemmed from its alleged use of web trackers...
In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.
Operating revenues popped across fiscal 2024 as many of the largest nonprofits combined strong demand with capacity increases.
Lindsey Van Gompel had a life-changing experience her junior year of college, when she spent a day shadowing an executive from the University of Iowa.
Advocate Health was created in 2022 through the merger of Advocate Aurora Health and Atrium Health. The combined system operates 68 hospitals and more than...
Skogsbergh led Advocate Aurora Health, where he was a leading voice on issues such as healthcare transformation, quality and safety and equity.
Learn about a proposed data breach settlement that requires Shields Health Care Group to pay $15.35 million over a breach that hit over 2...
A major data breach at health insurance giant Blue Shield of California appears to be a case of misconfiguring advertising analytics tools.
Internet of Medical Things (IoMT) paradigm refers to the process of collection, transmission and analysis of healthcare data using...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Advocate Aurora Health is http://www.advocateaurorahealth.org.
According to Rankiteo, Advocate Aurora Health’s AI-generated cybersecurity score is 741, reflecting their Moderate security posture.
According to Rankiteo, Advocate Aurora Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Advocate Aurora Health is not certified under SOC 2 Type 1.
According to Rankiteo, Advocate Aurora Health does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Advocate Aurora Health is not listed as GDPR compliant.
According to Rankiteo, Advocate Aurora Health does not currently maintain PCI DSS compliance.
According to Rankiteo, Advocate Aurora Health is not compliant with HIPAA regulations.
According to Rankiteo,Advocate Aurora Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Advocate Aurora Health operates primarily in the Hospitals and Health Care industry.
Advocate Aurora Health employs approximately 14,988 people worldwide.
Advocate Aurora Health presently has no subsidiaries across any sectors.
Advocate Aurora Health’s official LinkedIn profile has approximately 78,069 followers.
Advocate Aurora Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Advocate Aurora Health does not have a profile on Crunchbase.
Yes, Advocate Aurora Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/advocate-aurora-health.
As of December 11, 2025, Rankiteo reports that Advocate Aurora Health has experienced 1 cybersecurity incidents.
Advocate Aurora Health has an estimated 30,928 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Advocate Aurora Health Data Breach
Description: Advocate Aurora Health (AAH), a 26-hospital healthcare system in Wisconsin and Illinois, experienced a data breach that exposed the personal data of 3,000,000 patients. The incident was caused by the improper use of Meta Pixel on AAH's websites which is a tracker that helps website operators understand how visitors interact with the site. The incident compromised information including the IP address, Dates, times, and locations of scheduled appointments, Proximity to an AAH location, Medical provider information, Type of appointment or procedure, and Communications between MyChart users, which may have included first and last names and medical record numbers, Insurance information, Proxy account information etc of about 3 million people.
Type: Data Breach
Attack Vector: Improper use of Meta Pixel
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Ip address, Dates, times, and locations of scheduled appointments, Proximity to an aah location, Medical provider information, Type of appointment or procedure, Communications between mychart users, First and last names, Medical record numbers, Insurance information, Proxy account information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Ip Address, Dates, Times, And Locations Of Scheduled Appointments, Proximity To An Aah Location, Medical Provider Information, Type Of Appointment Or Procedure, Communications Between Mychart Users, First And Last Names, Medical Record Numbers, Insurance Information, Proxy Account Information and .

Entity Name: Advocate Aurora Health
Entity Type: Healthcare System
Industry: Healthcare
Location: WisconsinIllinois
Size: 26 hospitals
Customers Affected: 3000000

Type of Data Compromised: Ip address, Dates, times, and locations of scheduled appointments, Proximity to an aah location, Medical provider information, Type of appointment or procedure, Communications between mychart users, First and last names, Medical record numbers, Insurance information, Proxy account information
Number of Records Exposed: 3000000
Personally Identifiable Information: First and last namesMedical record numbersInsurance information
Most Significant Data Compromised: The most significant data compromised in an incident were IP address, Dates, times, and locations of scheduled appointments, Proximity to an AAH location, Medical provider information, Type of appointment or procedure, Communications between MyChart users, First and last names, Medical record numbers, Insurance information, Proxy account information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Dates, times, and locations of scheduled appointments, IP address, Medical provider information, Medical record numbers, Communications between MyChart users, First and last names, Proxy account information, Proximity to an AAH location, Type of appointment or procedure and Insurance information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 300.0.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.