Texas Healthcare Provider CommuniCare Discloses Data Breach Affecting Nearly 20,000 Patients

Barrio Comprehensive Family Health Care Center (CommuniCare) Reports Data Breach Exposing PII and PHI of 19,885 Individuals

HIGH
March 10, 2026
4m read
Data BreachPhishingIncident Response

Impact Scope

People Affected

19,885

Industries Affected

Healthcare

Geographic Impact

United States (local)

Related Entities

Organizations

Texas Attorney General

Other

Barrio Comprehensive Family Health Care CenterCommuniCare

Full Report

Executive Summary

Barrio Comprehensive Family Health Care Center (operating as CommuniCare), a healthcare provider based in San Antonio, Texas, has officially reported a data breach affecting 19,885 patients. The notification, filed with the Texas Attorney General on March 9, 2026, details a security incident involving unauthorized access to an employee's email account. The breach led to the potential exposure of sensitive patient data, including both Personally Identifiable Information (PII) and Protected Health Information (PHI). The incident highlights the persistent threat of email-based attacks against the healthcare sector and the significant regulatory and patient-trust implications under HIPAA.


Incident Timeline

  • September 16, 2025: CommuniCare detects suspicious activity related to an employee's email account. Immediate steps are taken to secure the system, and a third-party cybersecurity firm is engaged.
  • February 19, 2026: A comprehensive review of the compromised email account is completed. The analysis confirms that emails containing PII and PHI were accessible to an unauthorized party.
  • March 9, 2026: CommuniCare formally reports the data breach to the Texas Attorney General and begins notifying the 19,885 affected individuals.

Technical Findings

The root cause of the incident was a compromised employee email account, a common vector for Business Email Compromise (BEC) attacks. The threat actor gained unauthorized access, likely through a successful phishing attack or credential stuffing. Once inside, the attacker had access to the contents of the mailbox. The investigation determined that the following data types were potentially exposed:

  • Personally Identifiable Information (PII):
    • Full names
    • Dates of birth
  • Protected Health Information (PHI):
    • Patient and health insurance account numbers
    • Health insurance group numbers
    • Provider locations
    • Medical diagnoses
    • Treatments and procedures
    • Prescription information

This incident maps to several MITRE ATT&CK techniques, including T1566 - Phishing for initial access and T1114.001 - Email Collection: Local Email Collection for data gathering.

Impact Assessment

The exposure of this combination of PII and PHI poses a significant risk to the affected patients. This data can be used for various malicious activities, including identity theft, insurance fraud, and highly targeted phishing scams. For CommuniCare, the breach carries substantial regulatory consequences under HIPAA, including potential fines, mandatory corrective action plans, and reputational damage. The long delay between detection (September 2025) and notification (March 2026) was due to the time-consuming manual review of the affected emails, a common challenge in email compromise incidents.

Detection & Response

  • Enhanced Email Monitoring: Healthcare organizations must implement advanced email security solutions that can detect and block sophisticated phishing attempts. This includes sandboxing for attachments and URL rewriting/analysis.
  • Monitor for Anomalous Logins: Use SIEM and identity management tools to monitor for and alert on suspicious email account login activity, such as logins from unusual geographic locations, impossible travel scenarios, or multiple failed login attempts.
  • Hunt for Inbox Rules: Regularly scan for newly created or modified inbox rules (e.g., auto-forwarding to external addresses), as these are a common persistence mechanism for attackers in compromised email accounts.

Lessons Learned & Mitigation

  • Multi-Factor Authentication (MFA): The single most effective control to prevent such breaches is the enforcement of phishing-resistant MFA on all email accounts and other critical systems. This is a core recommendation under M1032 - Multi-factor Authentication.
  • Security Awareness Training: Continuous training for all employees is crucial to help them recognize and report phishing attempts. This aligns with M1017 - User Training.
  • Data Minimization and Retention Policies: Review and enforce policies to minimize the amount of sensitive data stored in email accounts. Sensitive PHI should be stored in secure, access-controlled Electronic Health Record (EHR) systems, not in email.
  • Incident Response Plan: The lengthy investigation timeline underscores the need for a well-rehearsed incident response plan that includes tools and procedures for rapidly analyzing large volumes of data from compromised accounts.

Timeline of Events

1
September 16, 2025
Suspicious activity related to an employee's email account was first detected.
2
February 19, 2026
A comprehensive review of the affected emails was completed, confirming data exposure.
3
March 9, 2026
CommuniCare filed a data breach notification with the Texas Attorney General.
4
March 10, 2026
This article was published

MITRE ATT&CK Mitigations

Enforcing phishing-resistant MFA on all email accounts is the most effective control to prevent unauthorized access even if credentials are stolen.

Mapped D3FEND Techniques:

Regularly train employees to recognize and report phishing emails, which are the likely initial vector for this type of breach.

Audit

M1047enterprise

Implement robust logging and monitoring of email account activity to quickly detect signs of compromise, such as impossible travel logins or new forwarding rules.

Mapped D3FEND Techniques:

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data BreachHealthcareHIPAAPIIPHIEmail SecurityCommuniCare

📢 Share This Article

Help others stay informed about cybersecurity threats