Back to Feed
BreachesApr 28, 2026

Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak

Medtronic confirms cyberattack by ShinyHunters claiming 9M records stolen.

Summary

Medical device manufacturer Medtronic confirmed a breach after the ShinyHunters cybercrime group claimed to have stolen 9 million records containing personal information and corporate data. The attackers demanded ransom by April 21, 2026, and Medtronic's removal from the leak site suggests a potential ransom payment. The company stated no impact to medical devices, patient safety, or critical operations.

Full text

Medical technology titan Medtronic has confirmed that its systems have been hacked after the notorious ShinyHunters group claimed to have stolen millions of records. One of the world’s largest medical technology companies, Medtronic provides a wide range of solutions, from pacemakers to surgical robots. It employs more than 95,000 people across 150 countries. “We have not identified any impact to our products, patient safety, connections to our customers, our manufacturing and distribution operations, our financial reporting systems or our ability to meet patient needs,” Medtronic said. “The networks that support our corporate IT systems, our products and our manufacturing and distribution operations are separate. Hospital customer networks remain separate from Medtronic IT networks and are secured and managed by customers’ IT teams,” it added. The company has yet to confirm the theft of data, but says it’s “working to identify any personal information that may have been accessed”. The ShinyHunters cybercrime group listed Medtronic on its leak website on April 17, claiming to have compromised more than 9 million records containing personal information, along with terabytes of corporate information. The hackers gave the company until April 21 to pay a ransom, threatening to leak the stolen data.Advertisement. Scroll to continue reading. Medtronic has since been removed from ShinyHunters’ website, indicating that the organization may have paid a ransom. SecurityWeek has reached out to Medtronic for comment and will update this article if it responds. Medtronic’s diabetes-focused subsidiary MiniMed submitted a report to the SEC, stating that its own IT systems have not been affected by the incident. Related: Medtronic Recalls Medical Devices Due to Security Risks That Can Lead to Injury, Death Related: Medical Device Maker UFP Technologies Hit by Cyberattack Related: Healthcare IT Platform CareCloud Probing Potential Data Breach Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Electric Motorcycles and Scooters Face Hacking Risks to Security and Rider SafetyMalicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: GoogleEnergy and Water Management Firm Itron HackedFirefox Vulnerability Allows Tor User FingerprintingLocked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest ExerciseVulnerabilities Patched in CrowdStrike, Tenable ProductsChinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude MythosAI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers Latest News Cyber Insurance Data Gives CISOs New Ammo for Budget TalksVimeo Confirms User and Customer Data BreachThe Mythos Moment: Enterprises Must Fight Agents with AgentsWebinar Today: A Step-by-Step Approach to AI GovernanceRobinhood Vulnerability Exploited for Phishing AttacksAlleged Chinese State Hacker Extradited to USDozens of Open VSX Extension Clones Linked to GlassWorm MalwareSevii Launches Cyber Swarm Defense to Make Agentic AI Security Costs Predictable Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveNeill Feather has been named Chief Executive Officer at Point Wild.Oasis Security has appointed Michael DeCesare as President.Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.More People On The MoveExpert Insights The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Whatsapp Email

Entities

Medtronic (vendor)ShinyHunters (threat_actor)MiniMed (product)