What You Need to Know about the Radiology Associates of Richmond Data Breach

  • By Lex Akinwumi
  • Published: Jul 24, 2025
  • Last Updated: Jul 24, 2025

 

Founded by Dr. Daniel Talley in 1905, the Radiology Associates of Richmond is one of America's oldest private radiology practices. RAR has since been at the forefront of advanced diagnostic, interventional services, and medical imaging. The institution spans seven hospitals and four outpatient centers in central Virginia. RAR has 62 board-certified radiologists, and the practice specializes in breast imaging, neuroradiology, and vascular interventions. 

 

The practice’s mission emphasizes patient-centered care, community trust, and precision. Despite robust security measures, it experienced a recent cyberattack where data from 1.4 million patients was exposed. This was attributed to unauthorized access to files including birth dates, medical records, insurance details, and names. The practice moved quickly to initiate containment, delaying disclosure of the situation until July 2025.

 

When Was the Radiology Associates of Richmond Data Breach?

The Radiology Associates of Richmond cybersecurity breach happened between April 2nd and 6th, 2024, after criminals accessed the healthcare provider’s systems through phishing or an unattended access point. During an internal investigation, RAR discovered the breach, confirming the May 2, 2025, incident. The names, birth dates, insurance information, and medical records. 

 

Despite its prompt network security measures, the Radiology Associates of Richmond delayed notifying the affected parties until July 1, 2025, for a year following the breach. The US Department of Health and Human Services, indicating 1,419,091 people were directly affected, confirmed the scale of the breach. Though there was no evidence of misused data, the reduced disclosure and HIPAA gaps have increased scrutiny.  

 

How to Check if Your Data Was Breached

If you think your personal information could have been exposed following the breach, the following are key steps to verify and protect your identity. 

 

  1. Contact RAR directly: Call the Radiology Associates of Richmond using their toll-free line during working hours to confirm if your data was exposed. 
  2. Check Official notification channels: The RAR contacted affected parties through email or mail in July 2025. Check these channels for a Notice of Data Security Incident. It will outline the data types that were compromised. The email should also offer complimentary credit monitoring for individuals whose Social Security numbers were exposed. 
  3. Monitor Financial and medical accounts: check for reports from credit institutions like TransUnion or Experian on unauthorized access. Check the medical statements and review the Explanation of Benefits first for unrecognized services. 
  4. If eligible, please sign up for RAR credit monitoring services. These are offered via IDX to warn against fraud. 

 

If you have already obtained a breach of data notice, act as quickly as possible. The risk of medical identity theft may be high, considering exposed health insurance details.

 

What to Do If Your Was Breached

If your information was compromised during Radiology Associates of Richmond's data breach, take steps to protect it. 

 

  • Set a fraud alert or a credit freeze: Contact Experian, Equifax, or TransUnion to set a year-long fraud alert. You may also initiate a credit freeze, blocking new account openings. 
  • Enroll in credit monitoring: The practice offers 2 years of complimentary identity protection services via IDX. 
  • Review Explanation of Benefits statements to check for unauthorized medical services.
  • Be wary of any phishing emails where parties claim to be representatives from RAR or financial institutions. 
  • Document all breach-related expenses. 

 

RAR has a call center dedicated to answering breach-related queries. Given the sensitivity of exposed insurance data, proactive monitoring would be essential for at least two years after the allotted protection period. 

 

Are There Any Lawsuits Because of the Radiology Associates of Richmond Data Breach?

Due to the delays in data breach notification, multiple class action lawsuits have been initiated against the company. Law firms like Edelson Lechzin LLP, Strauss Borelli PLLC, and Lynch Carpenter are assessing claims that Radiology Associates of Richmond did not implement adequate cybersecurity measures. This led to the breach and delayed notification of customers until July 2025, a year after the incident. 

 

Aside from violating the HIPAA 60-day disclosure rule, it placed affected parties at significant financial risk. The ongoing litigations are seeking compensation for identity theft risk, out-of-pocket costs, and emotional distress incurred. Affected parties notified are encouraged to contact law firms to join the litigation, which may result in damages being paid or extended credit monitoring services. 

 

Can My Radiology Associates of Richmond Information Be Used for Identity Theft

Sensitive data exposed in the Radiology Associates of Richmond data breach may be used for identity theft. Names, financial account numbers, birth dates, and medical records can be exploited to open fraudulent accounts. Fake insurance claims may be used to obtain medical services or to commit tax fraud. 

 

Though RAR indicates no evidence of misuse, healthcare information is often placed at a premium on the dark web. So it can resurface months or years later. The inclusion of imaging records also increases the risk of medical identity theft. Criminals can use this data to get unauthorized treatment, exhaust insurance benefits, or change stolen health information. To avoid further problems, you could enroll in the free credit monitoring and place a fraud alert with the main bureaus. 

 

What Can You Do To Protect Yourself Online? 

You can protect yourself from cyberattacks by doing the following: 

 

  • Enable Two-factor Authentication: This functions as an additional layer of security for the account by requiring further verification. That may be text message coding or Google Authenticator.
  • Use a Password Manager or Unique Passwords. Password managers store account credentials so you don’t have to remember the unique code used. You can also create complex passwords using a mix of upper- and lowercase letters or special characters. 
  • Regularly Update Software: Update your devices' operating systems, applications, or web browsers periodically to patch security vulnerabilities that can be exploited.
  • Secure Wi-Fi Networks: protect your home network using strong passwords and enable WPA3 encryption, which prevents unauthorized access.
  • Limit Sharing Personal Information: Consider what you post on social media. Oversharing can make you a target of identity theft. 
  • Be Aware of Phishing: Avoid clicking on suspicious links or downloading attachments from emails you do not know or have not been verified. These may contain malware. In the same breath, update your antivirus and other scanning systems to optimize device security. 
  • Monitor your Accounts Regularly: Bank and medical accounts should be regularly assessed to determine if there have been any unauthorized transactions. 

By following cybersecurity best practices, you reduce the risk of becoming a victim of breaches. Being proactive and vigilant safeguards your online presence. 

 

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that much a ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What You Need to Know about the Radiology Associates of Richmond Data Breach

What You Need to Know about the Radiology Associates of Richmond Data Breach

Founded by Dr. Daniel Talley in 1905, the Radiology Associates of Richmond is one of America's oldest private radiology practices.

What you need to know about the Esse Health Data Breach

What you need to know about the Esse Health Data Breach

Established in 1996, Esse Health was the product of a merger of two physician-led institutions. It soon emerged as a leading independent physician group in the larger St. Louis area, operating in more than 50 locations.

What You Need to Know about the Episource Data Breach

What You Need to Know about the Episource Data Breach

Episource is a California-based healthcare services and technology company that provides risk adjustment and medical coding services to healthcare plans, doctors, and several other types of healthcare organizations.

What you need to know about the Krispy Kreme Data Breach

What you need to know about the Krispy Kreme Data Breach

The popular doughnut and coffeehouse chain Krispy Kreme was established in 1937 in Winston-Salem, North Carolina. It has grown over the years and currently operates 1,500 shops and 17,900 points of access in 40 nations.

What You Need to Know about the Ocuco Data Breach

What You Need to Know about the Ocuco Data Breach

Ocuco is a Dublin-based organization that specializes in optical software solutions. Established in 1993 by Leo Mac Canna, the company initially developed software for independent optometrists.

What You Need to Know about the TxDOT Data Breach

What You Need to Know about the TxDOT Data Breach

The Texas Department of Transportation (TxDOT) is responsible for designing, planning, operating, building, and maintaining the state's transportation system to deliver a reliable and safe transportation system.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close