Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours.
The New Jersey-based company said in a filing with the U.S. Securities and Exchange Commission (SEC) that the intrusion occurred on March 16 when hackers accessed its IT infrastructure.
“On March 16, 2026, CareCloud, Inc. experienced a temporary network disruption in its CareCloud Health division that partially impacted the functionality and data access to 1 of its 6 electronic health record environments for approximately 8 hours until the Company fully restored all functionality and data access during that evening,” the company says in the SEC filing.
After detecting the intrusion, CareCloud said that it reported the issue to “its cybersecurity carrier and engaged a leading cyber response advisory team, which is part of a Big Four accounting firm, to perform external cybersecurity work and to assist with securing the environment, as well as to conduct a comprehensive IT forensic investigation to determine the nature and scope of this incident.”
CareCloud is a publicly traded healthcare IT firm that offers software-as-a-service (SaaS), revenue cycle management, practice management, patient experience management, and electronic health record (EHR) solutions.
Although the unauthorized data access was limited in scope, based on the investigation’s findings so far, CareCloud confirmed that one of its six environments, which holds patient health records for its customers, was compromised.
Currently, it is unclear how many individuals are impacted. The company explained that an investigation has started to determine which types of data were accessed and/or exfiltrated.
BleepingComputer has reached out to CareCloud for a comment on the matter, and we will update this post when we receive a statement.
Meanwhile, CareCloud underlined that there’s no impact on other platforms, divisions, systems, or environments, and assured that the attacker no longer has access to its database.
All affected systems have been fully restored, and the company is working with external cybersecurity experts to strengthen its security measures to prevent similar incidents from recurring.
BleepingComputer could not find a ransomware group taking credit for the attack on CareCloud.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.
This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

