19,885
Barrio Comprehensive Family Health Care Center (operating as CommuniCare), a healthcare provider based in San Antonio, Texas, has officially reported a data breach affecting 19,885 patients. The notification, filed with the Texas Attorney General on March 9, 2026, details a security incident involving unauthorized access to an employee's email account. The breach led to the potential exposure of sensitive patient data, including both Personally Identifiable Information (PII) and Protected Health Information (PHI). The incident highlights the persistent threat of email-based attacks against the healthcare sector and the significant regulatory and patient-trust implications under HIPAA.
The root cause of the incident was a compromised employee email account, a common vector for Business Email Compromise (BEC) attacks. The threat actor gained unauthorized access, likely through a successful phishing attack or credential stuffing. Once inside, the attacker had access to the contents of the mailbox. The investigation determined that the following data types were potentially exposed:
This incident maps to several MITRE ATT&CK techniques, including T1566 - Phishing for initial access and T1114.001 - Email Collection: Local Email Collection for data gathering.
The exposure of this combination of PII and PHI poses a significant risk to the affected patients. This data can be used for various malicious activities, including identity theft, insurance fraud, and highly targeted phishing scams. For CommuniCare, the breach carries substantial regulatory consequences under HIPAA, including potential fines, mandatory corrective action plans, and reputational damage. The long delay between detection (September 2025) and notification (March 2026) was due to the time-consuming manual review of the affected emails, a common challenge in email compromise incidents.
M1032 - Multi-factor Authentication.M1017 - User Training.Enforcing phishing-resistant MFA on all email accounts is the most effective control to prevent unauthorized access even if credentials are stolen.
Mapped D3FEND Techniques:
Regularly train employees to recognize and report phishing emails, which are the likely initial vector for this type of breach.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats