19,885
Barrio Comprehensive Family Health Care Center (operating as CommuniCare), a healthcare provider based in San Antonio, Texas, has officially reported a data breach affecting 19,885 patients. The notification, filed with the Texas Attorney General on March 9, 2026, details a security incident involving unauthorized access to an employee's email account. The breach led to the potential exposure of sensitive patient data, including both Personally Identifiable Information (PII) and Protected Health Information (PHI). The incident highlights the persistent threat of email-based attacks against the healthcare sector and the significant regulatory and patient-trust implications under HIPAA.
The root cause of the incident was a compromised employee email account, a common vector for Business Email Compromise (BEC) attacks. The threat actor gained unauthorized access, likely through a successful phishing attack or credential stuffing. Once inside, the attacker had access to the contents of the mailbox. The investigation determined that the following data types were potentially exposed:
This incident maps to several MITRE ATT&CK techniques, including T1566 - Phishing for initial access and T1114.001 - Email Collection: Local Email Collection for data gathering.
The exposure of this combination of PII and PHI poses a significant risk to the affected patients. This data can be used for various malicious activities, including identity theft, insurance fraud, and highly targeted phishing scams. For CommuniCare, the breach carries substantial regulatory consequences under HIPAA, including potential fines, mandatory corrective action plans, and reputational damage. The long delay between detection (September 2025) and notification (March 2026) was due to the time-consuming manual review of the affected emails, a common challenge in email compromise incidents.
M1032 - Multi-factor Authentication.M1017 - User Training.Enforcing phishing-resistant MFA on all email accounts is the most effective control to prevent unauthorized access even if credentials are stolen.
Mapped D3FEND Techniques:
Regularly train employees to recognize and report phishing emails, which are the likely initial vector for this type of breach.
Suspicious activity related to an employee's email account was first detected.
A comprehensive review of the affected emails was completed, confirming data exposure.
CommuniCare filed a data breach notification with the Texas Attorney General.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.