The Independent Public Regional Hospital in the western Polish city of Szczecin has been compelled to switch back to a paper-based workflow after suffering a cyberattack over the weekend. Hospital authorities confirmed that the incident, which struck the facility’s IT system on the night of March 7-8, 2026, has temporarily disrupted digital operations, though patients’ health remains uncompromised.
Hospital spokesman Tomasz Owsik-Kozłowski explained on Sunday that the cyberattack encrypted parts of the hospital’s data, blocking staff access to critical digital records. “The hospital’s priority is to restore access to the IT system and return to standard operating mode,” Owsik-Kozłowski said.
Despite the disruption, he stresses that patient care has continued uninterrupted, with all urgent treatments and admissions still being handled, albeit with slower administrative procedures.
The Independent Public Regional Hospital Cyberattack
In an official statement, the Independent Public Regional Hospital in Szczecin reassured the public:
“Patients’ health and lives are not at risk. Emergency procedures have been activated, including switching to a paper-based workflow. Hospital management remains in constant contact with the appropriate authorities, focusing on restoring IT system access as quickly as possible.”
While the hospital continues to accept new patients, officials are urging those with non-urgent medical needs to consider alternative facilities to reduce delays caused by manual processing.


Cyberattacks on Medical Facilities
The Szczecin incident reflects a broader trend of cyberattacks targeting healthcare institutions worldwide. For instance, last month, the University of Mississippi Medical Center (UMMC) in Jackson faced a major attack that forced the shutdown of essential IT systems, including electronic medical records. The disruption led to statewide clinic closures and the cancellation of outpatient surgeries, imaging appointments, and other procedures. Federal agencies, including the FBI, the U.S. Department of Homeland Security, and the Cybersecurity and Infrastructure Security Agency, have been involved in the investigation to assess potential data exposure.
Earlier, in January, Lakelands Public Health experienced a cyber intrusion affecting internal systems. Officials confirmed that sensitive public health records, including infectious disease and immunization data, remained secure. Thomas Piggott, the organization’s Medical Officer of Health and CEO, highlighted the continued emphasis on protecting data while maintaining critical services.
Another notable example occurred at the University of Hawaiʻi Cancer Center, where a ransomware attack identified in August last year and discovered in December, compromised historical research data, including sensitive identifiers for nearly 87,500 participants in a multi-decade epidemiological study. While clinical operations were unaffected, the university undertook extensive recovery and cybersecurity measures, offering affected individuals identity protection services and ongoing monitoring.
Similarly, the Manage My Health platform in New Zealand disclosed a breach affecting over 120,000 users. While core GP clinical systems remained intact, the company warned potential phishing attempts targeting users whose health records were exposed.
Response and Recovery at Szczecin Hospital
The Independent Public Regional Hospital in Szczecin has activated emergency protocols similar to those employed in other global incidents. Staff are manually processing patient records and medical procedures while cybersecurity experts work to restore the IT infrastructure.
Hospital authorities continue to coordinate closely with national cybercrime agencies to assess the scope of the breach and prevent further disruptions. Tomasz Owsik-Kozłowski reiterated that despite the setback, patient safety remains uncompromised. “We are committed to returning to our standard digital operations as swiftly as possible,” he said.
