276,000,000
Americans had their protected health information exposed in 2024.
81% of the country — more than every prior year combined. Attackers had a 93-day head start. What follows is independent research on breach economics, ePHI dark-market pricing, and the data behind the crisis.
Last reviewed April 2026 · Secure Care Research Institute · Chicago, IL

What a breach looks like
A cancer patient whose chemotherapy was delayed three weeks. A diabetic who rationed insulin for nine days. A rural clinic that closed permanently, leaving 4,000 patients without primary care. These aren't edge cases. They're the predictable output of a system where stolen health data is worth more than credit cards, and the average time between breach and notification is longer than a fiscal quarter.
“The 93-day gap between breach occurrence and victim notification is a 93-day window during which stolen medical identities are sold, synthetic accounts opened, fraud committed — all while responsible entities remain silent.”
— The Cyber-Economic Stack, §9.1 — SSRN 5792382
The research
The Economics of ePHI Exposure
A Long-Term Impact Model of Healthcare Data Breaches
Constructs a 10-year cumulative cost model across six domains: regulatory penalties, litigation, insurance shifts, patient attrition, remediation costs, and downstream fraud. Establishes that breach consequences compound — not conclude — after year one.
“This analysis reframes breaches not as isolated security failures, but as chronic financial liabilities with systemic implications. Small providers — who make up the backbone of American care delivery — are the least equipped to absorb this kind of long-tail risk.”
— The Economics of ePHI Exposure, §7 — SSRN 5257628
Gated · Research Briefing
Watch: The Economics of ePHI Exposure
10-year breach cost model, key findings, and what they mean for independent practices.
The Cyber-Economic Stack
How AI Turns Healthcare Data Into a Financialized Attack Asset
Introduces a three-layer analytical framework linking dark-market economics, AI amplification, and transparency asymmetry. Three empirical indices — DMVI, AAF, and HTI — are unified in a Transparency-Adjusted Risk Function (TARF) that predicts systemic exploitability.
“Attackers operate in transparent, liquid data markets with near-perfect price discovery. Defenders operate blind. The asymmetry isn’t an accident — it’s the architecture.”
— The Cyber-Economic Stack, §9.5 — SSRN 5792382
Alexander Perrin
Founder & CEO, Patient Protect · Secure Care Research Institute
2 SSRN papers · 60+ sources · 1,423 breaches · 5-year dataset
100% independently funded · © 2026 SCRI / Patient Protect LLC
Read the paper
The Economics of ePHI Exposure
A Long-Term Impact Model of Healthcare Data Breaches · 39 pages · SSRN #5257628
Continue reading
Preview ends at page 8. The full paper is 39 pages.
The cornerstone failure isn't encryption — it's asymmetry.
Attackers operate in transparent, liquid markets with near-perfect price discovery. Defenders operate blind. The Cyber-Economic Stack models this gap through three empirical indices unified in a single exploitability score — TARF. The primary lever to reduce it: disclosure transparency.
TARFt = (DMVIt × AAFt × Rt) / HTIt
Dark-Market Value Index (DMVI)
Median price of stolen PHI in criminal markets. Unlike credit cards, PHI is immutable — SSNs, diagnoses, and birth dates cannot be revoked, creating permanent multi-domain fraud utility.
PHI: $280–310/record · Credit cards: $30–50 · PHI CAGR: +4.1%
AI Amplification Factor (AAF)
How generative AI increases attacker ROI per record. The ChatGPT release collapsed the skill barrier — voice cloning from 3-second samples, synthetic personas at scale, phishing that passes every test.
AAF: 1.18–1.30 · Voice fraud: 12% → 34% post-AI · +$38.60/record
Healthcare Transparency Index (HTI)
Scores disclosure quality across speed, richness, and cadence. HTI lives in the denominator of TARF — higher transparency compresses exploitability. Healthcare scores 23 vs. finance's 81.
Healthcare HTI: 23 · Finance: 81 · 3.5x deficit · r=−0.52 (p=0.003)
14 years
Consecutive years healthcare ranked #1 in breach costs
2.1×
Healthcare breach cost vs. financial services — the next highest sector
$280–310
Per-record dark-market price for stolen PHI — 8–10× credit cards
+475%
Voice-cloning fraud year-over-year increase (2024)
$1.5B
Cascading losses from the Change Healthcare breach (190M patients)
65–70%
Patients willing to switch providers after a data breach
93 days
Avg. time-to-detection in healthcare — vs. 4 days in finance
Built as a direct response to this evidence.
Patient Protect is security-first HIPAA compliance for the providers this research identifies as primary targets. Starting at $39/month.
From research to architecture
The Cyber-Economic Stack proved AI amplifies breach value by 18–30%. So we built an AI that defends against it.
PIPAA is an on-premises AI compliance copilot built directly from this research. It runs inside your infrastructure, touches zero PHI in the cloud, and operates under your BAA. The same technology weaponizing breaches is now the architecture defending against them.
Research-informed architecture
- Zero Trust architecture — every request authenticated regardless of origin
- AES-256-GCM encryption — NIST-approved, same standard as classified systems
- AppSensor intrusion detection — behavioral analysis stops threats before breach
- On-premises AI — compliance copilot that never sends PHI to the cloud
Citing this research
Use the following citation formats for academic papers, media, or reports.
Paper 02 — The Cyber-Economic Stack
APA
Perrin, A. (2025). The cyber-economic stack: How AI turns healthcare data into a financialized attack asset. Secure Care Research Institute, Patient Protect LLC. https://papers.ssrn.com/abstract=5792382
Chicago
Perrin, Alexander. “The Cyber-Economic Stack: How AI Turns Healthcare Data Into a Financialized Attack Asset.” Working Paper. Chicago: Secure Care Research Institute, Patient Protect LLC, 2025. https://papers.ssrn.com/abstract=5792382.
Paper 01 — The Economics of ePHI Exposure
APA
Perrin, A. (2025). The economics of ePHI exposure: A long-term impact model of healthcare data breaches. Secure Care Research Institute, Patient Protect LLC. https://papers.ssrn.com/abstract=5257628
Chicago
Perrin, Alexander. “The Economics of ePHI Exposure: A Long-Term Impact Model of Healthcare Data Breaches.” Working Paper. Chicago: Secure Care Research Institute, Patient Protect LLC, 2025. https://papers.ssrn.com/abstract=5257628.
For press and media
“According to research by Alexander Perrin of the Secure Care Research Institute (Patient Protect LLC, 2025)…”
Frequently asked questions
What is the average cost of a healthcare data breach in 2024?
The average cost of a U.S. healthcare data breach in 2024 was $9.8 million — more than double the financial services sector and 2.5 times the cross-industry average. Healthcare has held the #1 position in breach costs for 14 consecutive years (IBM Security & Ponemon Institute, 2024).
How much is stolen medical data worth on the dark web?
A full-package PHI record — including SSN, date of birth, diagnosis codes, and insurance information — commands a median dark-market value of $280–$310 per record. That is 8 to 10 times the value of stolen credit card data, driven by PHI’s immutability and multi-domain fraud utility (Intel 471, Recorded Future, Flashpoint, 2024).
How long does it take healthcare organizations to detect a data breach?
Healthcare organizations take an average of 93 days to detect a breach, compared to 4 business days for mandatory disclosure in SEC-regulated finance. This 93-day window creates a sustained exploitation period where stolen data retains maximum dark-market liquidity and fraud utility (Ponemon Institute, 2024).
What percentage of Americans had their health data exposed in 2024?
Over 276 million Americans — approximately 81% of the U.S. population — had their protected health information exposed in data breaches in 2024. This represents a 64% increase from 2023’s previous record (HHS Office for Civil Rights Breach Portal, 2025).
What is the HIPAA breach notification requirement?
Under the HIPAA Breach Notification Rule, covered entities must notify affected individuals within 60 calendar days of discovering a breach of unsecured protected health information. Breaches affecting 500 or more individuals must also be reported to HHS OCR and prominent media outlets. Our research shows this 60-day window — combined with the 93-day average detection delay — creates a total exposure period far exceeding a fiscal quarter.
How does AI affect healthcare cybersecurity risk?
Our research quantifies an AI Amplification Factor (AAF) of 1.18–1.30 following the November 2022 ChatGPT release. AI has increased voice-cloning attacks on healthcare insurers by 475% year-over-year, boosted synthetic identity fraud by 27%, and improved phishing yield by 36% per compromised record — all while reducing the skill barrier for attackers to near-zero (Pindrop Security, 2025).
Get notified when new research publishes.
SSRN papers, breach analyses, and policy updates. No marketing. Just research.
No spam. Unsubscribe at any time. We never sell or share your email.
