Idaho Hospital Disrupted on Easter; Blackwater Ransomware Claims 577GB Stolen

Share
Minimalist white line art of a hospital bed silhouette with a white skull and crossbones icon floating above it, on a solid blood red background.

Minidoka Memorial Hospital transferred emergency patients after an imaging outage; a new ransomware group demands payment for an alleged 2.3 million files.

RUPERT, ID — A quiet Easter morning in rural Idaho was shattered on April 5, 2026, when Minidoka Memorial Hospital (MMH) fell victim to a cyberattack that paralyzed its diagnostic capabilities. While the hospital managed to keep its emergency department and clinics operational, the disruption to imaging services forced the critical access facility to transfer emergency patients to Cassia Regional Hospital.

In an official statement released via Facebook on April 17, MMH confirmed it had "temporarily impacted certain systems." However, the emerging ransomware group Blackwater has provided a far more detailed and aggressive narrative. On the same day the hospital issued its statement, Blackwater listed MMH on its leak site, claiming to have exfiltrated 577GB of data comprising over 2.3 million files.


Breach Audit: Rural Healthcare Vulnerability

Minidoka Memorial is a 25-bed critical access hospital that also operates a nursing home in Cassia County. The attack highlights a persistent trend of threat actors targeting rural healthcare infrastructure, where resources for healthcare cybersecurity best practices are often stretched thin.

Incident Profile: Minidoka Memorial Hospital
Audit Detail Technical Finding
Initial Impact Imaging services offline — emergency patient transfers required.
Ransomware Claim 577GB stolen (approx. 2.3M files) by Blackwater ransomware.
Restoration Date Full imaging functionality restored by midnight, April 19, 2026.

Blackwater: A New Threat to PHI

Blackwater is a relatively new operation, surfacing only in March 2026, but it has already established a predatory focus on the healthcare sector. MMH marks the group's third claimed healthcare target in less than two months. The group utilizes a "double extortion" model — encrypting local files to disrupt operations while exfiltrating sensitive data to use as leverage for ransom payments.

The hospital has not yet confirmed the validity of Blackwater's 577GB data theft claim, nor have they disclosed a ransom amount. However, the group has threatened to publish the stolen files by April 24, 2026, if their demands are not met. This incident follows a broader trend of ransomware groups targeting essential servicesto maximize pressure.

For ongoing tracking of threat actors in this space, visit our ransomware archive.


The CyberSignal Analysis

Signal 01 — The Holiday Timing

Attacking on Easter morning is a calculated tactic. Holiday weekends typically see reduced IT staffing levels, allowing ransomware to propagate further across a network before detection. For rural hospitals, this latency can be the difference between a minor localized issue and a full-scale imaging outage.

Signal 02 — Emerging Actor Aggression

The rapid-fire targeting of three healthcare entities by Blackwater suggests a specialized "playbook" for bypassing PHI protections. Their willingness to disrupt patient care through imaging outages indicates a high tolerance for risk and a focus on high-pressure extortion over subtle infiltration.


Sources

Type Source
Official PDF Hospital Statement: Cybersecurity Incident
Industry Journal HIPAA Journal: Minidoka Breach Analysis
Intel Digest Breachsense: Blackwater Ransomware Claim
Consumer Risk Comparitech: Ransom Demand Details
Timing Audit Distilinfo: Easter Weekend Impact

Read more