Company Details
ucsfhealth
11,303
115,691
62
ucsfhealth.org
3805
UCS_6354324
Completed


UCSF Health Vendor Cyber Rating & Cyber Score
ucsfhealth.orgUCSF Health is an integrated health care network encompassing several entities, including UCSF Medical Center, one of the nation’s top 10 hospitals according to U.S. News & World Report, and UCSF Benioff Children’s Hospitals, with campuses in Oakland and San Francisco. We are recognized throughout the world for our innovative patient care, advanced technology and pioneering research. For more than a century, we have offered the highest quality medical treatment. Today, our expertise covers virtually all specialties, from cancer to women's health. In addition, the compassionate care provided by our doctors, nurses and other staff is a key to our success. Our services generate about 1.1 million patient visits to our clinics a year and $3.2 billion in annual revenue. We have 12,000 employees and dozens of locations throughout San Francisco as well as outreach clinics throughout Northern California and beyond.
Company Details
ucsfhealth
11,303
115,691
62
ucsfhealth.org
3805
UCS_6354324
Completed
Between 700 and 749

UCSF Health Global Score (TPRM)XXXX

Description: The University of California, San Francisco (UCSF) experienced a data breach on February 9, 2023, disclosed on April 26, 2023, due to a phishing attack targeting UCSF email accounts. The breach exposed sensitive personal information of individuals, including First Name, Last Name, Date of Birth, Medical Record Number (MRN), and Date of Service. The exact number of affected individuals remains undetermined, but the compromised data poses risks of identity theft, medical fraud, or targeted scams. The attack exploited human vulnerability through phishing, leading to unauthorized access to employee email accounts, which likely contained or facilitated access to patient records. While no ransomware was involved, the exposure of protected health information (PHI) particularly MRNs and service dates heightens concerns over compliance violations (e.g., HIPAA) and potential misuse of medical data. The breach underscores the persistent threat of social engineering attacks in healthcare institutions, where employee credentials serve as gateways to highly sensitive systems.
Description: The California Office of the Attorney General reported a data breach involving the University of California San Francisco (UCSF) on November 13, 2020. The breach occurred on June 1, 2020, due to a cybersecurity attack that resulted in unauthorized access to personal information, including names and social security numbers, affecting an unspecified number of individuals. UCSF paid the attacker to recover encrypted data and has offered credit monitoring services to impacted individuals.
Description: The California Office of the Attorney General reported a data breach involving the University of California San Francisco (UCSF) on November 21, 2013. The breach occurred on September 25, 2013, when an unencrypted personal laptop containing identifiable health information was stolen from a physician's locked vehicle. The stolen laptop contained sensitive health information, which could potentially compromise the privacy and security of the affected individuals.


No incidents recorded for UCSF Health in 2026.
No incidents recorded for UCSF Health in 2026.
No incidents recorded for UCSF Health in 2026.
UCSF Health cyber incidents detection timeline including parent company and subsidiaries

UCSF Health is an integrated health care network encompassing several entities, including UCSF Medical Center, one of the nation’s top 10 hospitals according to U.S. News & World Report, and UCSF Benioff Children’s Hospitals, with campuses in Oakland and San Francisco. We are recognized throughout the world for our innovative patient care, advanced technology and pioneering research. For more than a century, we have offered the highest quality medical treatment. Today, our expertise covers virtually all specialties, from cancer to women's health. In addition, the compassionate care provided by our doctors, nurses and other staff is a key to our success. Our services generate about 1.1 million patient visits to our clinics a year and $3.2 billion in annual revenue. We have 12,000 employees and dozens of locations throughout San Francisco as well as outreach clinics throughout Northern California and beyond.


The Ministry of Health (Malay: Kementerian Kesihatan), abbreviated MOH, is a ministry of the Government of Malaysia that is responsible for health system: health behavior, cancer, public health, health management, medical research, health systems research, respiratory medicine, health promotion, hea

NHG Health is a leading public healthcare provider in Singapore recognised for its quality clinical care and its commitment in enabling healthier lives through preventive health, innovative solutions and person-centred programmes tailored to every life stage. Our integrated health system, which span
Beginning with a single community in 1981, Sunrise Senior Living has grown to more than 270 communities throughout the U.S. and Canada. Each of our communities continues the mission laid out by founders Paul and Terry Klaassen more than 40 years ago: to champion quality of life for all seniors. Jo

Founded in 2003, Omega Healthcare Management Services® (Omega Healthcare) is an AI-driven healthcare solutions company that partners across the healthcare ecosystem to deliver breakthrough results by reimagining and elevating revenue operations. Powered by the Omega Digital Platform®, our agentic AI

Karolinska Universitetssjukhuset är ett av Europas största universitetssjukhus. Tillsammans med Karolinska Institutet leder vi den medicinska utvecklingen i Sverige. Sjukvård, forskning och utbildning är lika viktiga delar i arbetet för att förlänga och förbättra människors liv. Varje år besöker
IQVIA (NYSE:IQV) is a leading global provider of clinical research services, commercial insights and healthcare intelligence to the life sciences and healthcare industries. IQVIA’s portfolio of solutions are powered by IQVIA Connected Intelligence™ to deliver actionable insights and services built o
The people of Memorial Sloan Kettering Cancer Center (MSK) are united by a singular mission: ending cancer for life. Our specialized care teams provide personalized, compassionate, expert care to patients of all ages. Informed by basic research done at our Sloan Kettering Institute, scientists acros

Trinity Health is one of the largest not-for-profit, Catholic health care systems in the nation. It is a family of 123,000 colleagues and nearly 27,000 physicians and clinicians caring for diverse communities across 26 states. Nationally recognized for care and experience, the Trinity Health system

Formed in 1994, Brown University Health (Formerly Lifespan) is a not-for-profit health system based in Providence, RI comprising three teaching hospitals of The Warren Alpert Medical School of Brown University: Rhode Island Hospital and its Hasbro Children's; The Miriam Hospital; and Bradley Hospita
.png)
Picard Medical (NYSE American: PMI) highlighted a UCSF Health case in which a patient in his twenties was supported on the SynCardia Total...
GEHC and UCSF Health are entering a 10-year collaboration, focusing on remote scanning, technologist education, and MR protocols.
Successful heart transplant case following an implanted SynCardia total artificial heart reported at hospital with one of the largest heart...
UCSF's first heart transplant after a SynCardia total artificial heart marks a key milestone for advanced heart failure care as Picard...
Over 100 provider organizations signed a letter urging HHS to rescind its proposed updates to the HIPAA Security Rule and instead work with...
Outdated technology, shadow AI and inefficient IT systems are fueling healthcare cybersecurity challenges, clinician burnout and patient...
University of California San Francisco (UCSF) Health is set to strengthen two community hospitals in San Francisco, US, as part of a $430m,...
Each summer, UCSF medical students lead immersive health science camps for local high schoolers—part of the School of Medicine's commitment...
UCSF Health is renaming St. Mary's Medical Center and Saint Francis Memorial Hospital, which it bought last year for a collective $100...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of UCSF Health is http://www.ucsfhealth.org.
According to Rankiteo, UCSF Health’s AI-generated cybersecurity score is 725, reflecting their Moderate security posture.
According to Rankiteo, UCSF Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, UCSF Health has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, UCSF Health is not certified under SOC 2 Type 1.
According to Rankiteo, UCSF Health does not hold a SOC 2 Type 2 certification.
According to Rankiteo, UCSF Health is not listed as GDPR compliant.
According to Rankiteo, UCSF Health does not currently maintain PCI DSS compliance.
According to Rankiteo, UCSF Health is not compliant with HIPAA regulations.
According to Rankiteo,UCSF Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
UCSF Health operates primarily in the Hospitals and Health Care industry.
UCSF Health employs approximately 11,303 people worldwide.
UCSF Health presently has no subsidiaries across any sectors.
UCSF Health’s official LinkedIn profile has approximately 115,691 followers.
UCSF Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, UCSF Health does not have a profile on Crunchbase.
Yes, UCSF Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ucsfhealth.
As of March 29, 2026, Rankiteo reports that UCSF Health has experienced 3 cybersecurity incidents.
UCSF Health has an estimated 32,295 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with public disclosure via california office of the attorney general..
Title: Data Breach at University of California San Francisco
Description: The California Office of the Attorney General reported a data breach involving the University of California San Francisco (UCSF) on November 13, 2020. The breach occurred on June 1, 2020, due to a cybersecurity attack that resulted in unauthorized access to personal information, including names and social security numbers, affecting an unspecified number of individuals. UCSF paid the attacker to recover encrypted data and has offered credit monitoring services to impacted individuals.
Date Detected: 2020-06-01
Date Publicly Disclosed: 2020-11-13
Type: Data Breach
Title: Data Breach at University of California San Francisco (UCSF)
Description: A data breach occurred when an unencrypted personal laptop containing identifiable health information was stolen from a physician's locked vehicle.
Date Detected: 2013-09-25
Date Publicly Disclosed: 2013-11-21
Type: Data Breach
Attack Vector: Physical Theft
Vulnerability Exploited: Unencrypted Data
Threat Actor: Unknown
Motivation: Unknown
Title: Data Breach at University of California, San Francisco (UCSF) via Phishing Attack
Description: The California Office of the Attorney General reported a data breach involving the University of California, San Francisco (UCSF) on April 26, 2023. The breach occurred on February 9, 2023, due to a phishing attack that compromised some UCSF email accounts, potentially exposing individuals' First Name, Last Name, Date of Birth, MRN (Medical Record Number), and Date of Service. The number of individuals affected is currently unknown.
Date Detected: 2023-02-09
Date Publicly Disclosed: 2023-04-26
Type: Data Breach
Attack Vector: Phishing
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing (compromised email accounts).

Data Compromised: Names, Social security numbers

Data Compromised: Identifiable Health Information
Systems Affected: Personal Laptop

Data Compromised: First name, Last name, Date of birth, Mrn, Date of service
Systems Affected: Email Accounts
Identity Theft Risk: Potential (PII exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, , Identifiable Health Information, Personally Identifiable Information (Pii), Protected Health Information (Phi) and .

Entity Name: University of California San Francisco
Entity Type: Educational Institution
Industry: Education
Location: San Francisco, California

Entity Name: University of California San Francisco (UCSF)
Entity Type: Educational Institution
Industry: Healthcare
Location: San Francisco, California

Entity Name: University of California, San Francisco (UCSF)
Entity Type: Educational Institution / Healthcare Provider
Industry: Education, Healthcare
Location: San Francisco, California, USA
Customers Affected: Unknown

Communication Strategy: Public disclosure via California Office of the Attorney General

Type of Data Compromised: Names, Social security numbers

Type of Data Compromised: Identifiable Health Information
Sensitivity of Data: High
Data Encryption: No
Personally Identifiable Information: Yes

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: Unknown
Sensitivity of Data: High (includes MRN and PHI)
Personally Identifiable Information: First NameLast NameDate of BirthMRNDate of Service

Data Encryption: True

Regulations Violated: Potentially HIPAA (Health Insurance Portability and Accountability Act), California Consumer Privacy Act (CCPA),
Regulatory Notifications: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2020-11-13

Source: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2023-04-26
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2020-11-13, and Source: California Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2023-04-26.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure via California Office of the Attorney General.

Entry Point: Phishing (compromised email accounts)
Ransom Payment History: The company has Paid ransoms in the past.
Last Attacking Group: The attacking group in the last incident was an Unknown.
Most Recent Incident Detected: The most recent incident detected was on 2020-06-01.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-04-26.
Most Significant Data Compromised: The most significant data compromised in an incident were names, social security numbers, , Identifiable Health Information, First Name, Last Name, Date of Birth, MRN, Date of Service and .
Most Significant System Affected: The most significant system affected in an incident was Email Accounts.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were First Name, Date of Birth, Identifiable Health Information, Date of Service, names, social security numbers, Last Name and MRN.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was True.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing (compromised email accounts).
.png)
A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.
A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.