Norton Healthcare agreed to pay $11 million to settle a class action lawsuit stemming from a May 2023 ransomware attack that exposed the sensitive personal information of 2.5 million patients. The Kentucky-based health system, which operates nine hospitals across Kentucky and Indiana, fell victim to the ALPHV/BlackCat ransomware gang, one of the most prolific cybercriminal organizations in the world. This settlement represents one of several significant payouts by healthcare organizations following major data breaches in recent years.
The settlement provides eligible patients with compensation of up to $2,500 each for unreimbursed out-of-pocket expenses directly tied to the breach. If you received treatment at any Norton Healthcare facility and your personal information—including your name, Social Security number, date of birth, health records, insurance information, driver’s license number, or financial data—was compromised during the May 7-9, 2023 exposure window, you may be entitled to file a claim. The settlement approval hearing is scheduled for May 15, 2025, in Kentucky state court.
Table of Contents
- How Did the Ransomware Attack Affect Norton Healthcare’s Patients?
- Understanding the Settlement Structure and Claim Amounts
- What Types of Data Were Stolen and What Risks Do They Pose?
- How to File a Claim and What Documentation You’ll Need
- Deadlines, Claim Administration, and Important Limitations
- Comparing Norton Healthcare to Other Major Healthcare Data Breaches
- What This Breach Reveals About Healthcare Cybersecurity and Future Trends
- Conclusion
How Did the Ransomware Attack Affect Norton Healthcare’s Patients?
On May 9, 2023, Norton Healthcare discovered that threat actors had infiltrated its network and gained access to patient data stored on network devices between May 7-9. The attackers, operating under the ALPHV/BlackCat banner, exfiltrated approximately 4.7 terabytes of sensitive information before deploying ransomware designed to encrypt the health system’s files and demand payment. Rather than accept extortion demands, Norton Healthcare chose to address the breach through legal channels and ultimately negotiate a settlement with the class of affected patients. The breach exposed a comprehensive profile of each victim’s identity and medical history.
Data compromised included patients’ full names, phone numbers, email addresses, dates of birth, social security numbers, health conditions and treatment histories, prescription information, health insurance policy details, driver’s license numbers, government-issued identification numbers, and in some cases, financial account information. This combination of data is particularly valuable to identity thieves and medical fraudsters, who can use the information to open fraudulent healthcare accounts, file fake insurance claims, or assume victims’ identities for financial gain. Unlike a breach of credit card numbers alone, which can be monitored relatively easily, a complete medical identity theft can take years to detect and resolve.

Understanding the Settlement Structure and Claim Amounts
The $11 million settlement is divided among eligible class members based on the expenses they incurred as a direct result of the breach. Affected individuals can claim up to $2,500 for documented, out-of-pocket expenses that are “fairly traceable” to the data breach. This might include costs related to identity monitoring services, credit reports, credit freezes, fraudulent account disputes, or medical bills resulting from fraudulent treatment obtained in the victim’s name. The settlement also covers the cost of repairing a stolen identity or addressing medical identity fraud consequences.
A key limitation of this settlement is the requirement that expenses be “fairly traceable” to the breach, meaning claimants must demonstrate a direct causal connection between their costs and the exposure of their data. This threshold can be challenging to meet. For example, if you purchased identity theft protection immediately after learning about the breach, you could likely claim those costs, but proving that an unexpected bill was specifically due to the breach rather than other causes requires documentation. Claimants will need to submit receipts, invoices, and detailed explanations of how each expense relates to the breach. Those without documented expenses may receive a smaller amount from an “unclaimed fund” distribution, if procedures allow, but this residual amount is typically significantly less than the full per-claim award.
What Types of Data Were Stolen and What Risks Do They Pose?
The comprehensive nature of the data stolen in the Norton Healthcare breach makes it one of the more serious healthcare data exposures in recent years. The 4.7 terabytes of data represents not just a large volume but highly sensitive information across Norton’s entire patient population. Names combined with Social Security numbers enable identity thieves to open credit accounts, apply for loans, establish utilities, and conduct financial fraud. When paired with dates of birth and driver’s license numbers—also exposed in this breach—the risk of full-identity compromise increases dramatically.
Medical records and insurance information add another dimension of risk. Criminals can use stolen health insurance details to fraudulently obtain prescription medications, schedule medical procedures at other healthcare facilities, or bill insurance companies for treatments never received. Medical identity theft is particularly insidious because victims may not realize they’ve been compromised for months or even years, discovering the fraud only when they receive an Explanation of Benefits for services they never used or when a healthcare provider confronts them about an outstanding bill. The ALPHV/BlackCat group, which publicly released much of the stolen Norton Healthcare data on its dark web site, exponentially increases the risk that the information will be misused by multiple criminal actors over a long period. This isn’t a contained breach; it’s information now in the hands of a criminal ecosystem.

How to File a Claim and What Documentation You’ll Need
To participate in the Norton Healthcare settlement, affected individuals must submit a claim documenting their out-of-pocket expenses. The claims process typically opens after the settlement receives final court approval, which is scheduled to occur following the May 15, 2025 hearing in Kentucky. Once the process begins, claimants will need to submit detailed documentation including receipts for identity monitoring services, copies of credit reports ordered due to the breach, documentation of credit freezes, itemized billing statements from credit bureaus, proof of payment for fraud resolution services, or medical bills resulting from fraudulent care obtained in their name. The exact procedure for filing claims will be outlined in settlement notification materials, which are typically mailed to known addresses or available through a settlement website.
Deadline dates for submitting claims are critical—missing the filing deadline forfeits your right to compensation. Claims procedures vary, but generally require either online submission through a dedicated settlement portal, mailed paper forms, or both options. It’s important to gather documentation early rather than waiting until the claim deadline approaches, as obtaining duplicates of years-old receipts or billing statements can be time-consuming. Many settlement administrators provide phone support to answer questions, and this service is typically free to claimants.
Deadlines, Claim Administration, and Important Limitations
Settlement approval and the opening of the claims period are contingent on the May 15, 2025 hearing proceeding without objections or appeals. While this date is scheduled, legal challenges or appeals could delay the process. Claimants should monitor the settlement website and any official communications from Norton Healthcare or the settlement administrator once approval is finalized. Important deadlines to watch include the claim submission deadline, typically 120-180 days after claims are officially opened, and any deadline for submitting supplemental documentation if your initial claim is incomplete. A critical limitation: only individuals who actually received care from Norton Healthcare between specific dates and whose data was included in the May 2023 breach are eligible for claims.
If you were merely a patient at a Norton Healthcare facility but your records were not among the 2.5 million exposed, you cannot file a claim. Additionally, the $11 million pool must be divided among all valid claims submitted. If many thousands of people submit claims for the full $2,500, individual awards may be reduced proportionally. Those submitting claims for smaller documented expenses may receive their full amount, while those claiming the maximum could receive less if insufficient funds remain after all claims are processed. The settlement agreement may also designate a portion of the $11 million for cy pres awards (donations to related non-profits) or administration costs, further reducing the money available for individual claims.

Comparing Norton Healthcare to Other Major Healthcare Data Breaches
The Norton Healthcare breach is significant but not unprecedented in healthcare. The 2015 Anthem health insurance breach exposed 78.8 million individuals and resulted in a $115 million settlement. The 2013 Target breach, while not healthcare-specific, compromised 40 million payment card numbers and 70 million additional records, including personal information. The 2017 Equifax breach exposed data on 147 million Americans and resulted in settlements exceeding $700 million. By comparison, Norton Healthcare’s 2.5 million affected individuals and $11 million settlement falls in the mid-range of modern healthcare breaches.
However, the Norton breach is notable for targeting a single regional health system rather than a national insurer or third-party processor, suggesting that even mid-sized healthcare organizations can experience catastrophic losses of patient data. The involvement of ALPHV/BlackCat distinguishes this breach from many others. This ransomware-as-a-service criminal operation has targeted hundreds of organizations globally, from hospitals to schools to government agencies. They operate differently from traditional data brokers; they not only encrypt systems to demand ransom but specifically target valuable data for theft and public release to increase pressure on victims to pay. The fact that Norton Healthcare chose not to pay the ransom and instead pursued a civil settlement represents a decision that prioritized legal accountability over operational continuity.
What This Breach Reveals About Healthcare Cybersecurity and Future Trends
The Norton Healthcare breach highlights persistent vulnerabilities in healthcare system security, even at large regional systems with significant resources. Healthcare organizations manage some of the most valuable personal data in existence—complete medical histories combined with Social Security numbers and financial information are worth more on the dark web than credit card numbers alone. Yet many healthcare providers have historically underinvested in cybersecurity compared to their peers in banking and technology. The trend toward targeted ransomware attacks and data theft, rather than simple encryption, reflects evolution in criminal tactics. Modern attackers don’t just want to disrupt operations; they want to extract value.
The settlement amounts and legal consequences are beginning to escalate, which may finally incentivize healthcare organizations to prioritize security. However, the years-long lag between a breach’s occurrence and settlement completion means that victims endure extended periods of risk. The Norton Healthcare settlement, signed in 2024 and hearing scheduled for 2025 (nearly two years after the breach), exemplifies this delay. During this entire period, the stolen data remains in criminal hands and accessible for fraud. Future improvements likely include mandatory breach notification timelines, faster settlement processes, and higher compensation awards to better reflect the true cost of medical identity theft.
Conclusion
Norton Healthcare’s $11 million settlement compensates patients who were harmed when the ALPHV/BlackCat ransomware gang infiltrated the health system’s network and stole personal data from 2.5 million people in May 2023. Eligible patients can receive up to $2,500 for documented, out-of-pocket expenses directly resulting from the breach. If you received care at any Norton Healthcare facility and suspect your information was compromised, check settlement notifications and gather documentation of any identity theft or fraud-related costs you’ve incurred.
The claims process will open following the settlement approval hearing scheduled for May 15, 2025, in Kentucky state court. Missing the claims deadline will forfeit your compensation, so monitor official settlement sources for procedures and deadlines. This breach serves as a reminder that even substantial healthcare organizations remain vulnerable to sophisticated criminal actors, and affected individuals may face years of identity theft risk. Documenting expenses and understanding your settlement rights now ensures you can claim compensation when the process officially opens.