Delayed Breach Notification by Sandhills Medical Foundation Prompts Class Action Investigation Following 2025 Ransomware Attack

Sandhills Medical Foundation Faces Class Action Probe Over Ransomware Attack Affecting 169,000 Patients

HIGH
May 4, 2026
5m read
RansomwareData BreachRegulatory

Impact Scope

People Affected

169,017

Industries Affected

Healthcare

Geographic Impact

United States (local)

Related Entities

Threat Actors

Other

Sandhills Medical Foundation, Inc.Schubert Jonckheer & Kolbe LLPEdelson Lechtzin LLP

Full Report

Executive Summary

Sandhills Medical Foundation, a community health center in South Carolina, is now the subject of a class action investigation following a ransomware attack that occurred in 2025. The breach, attributed to the Inc Ransom group, compromised the sensitive personal and health information of 169,017 patients. A significant delay in notification has sparked legal action; although the data was exfiltrated in November 2025, Sandhills did not begin notifying victims until late April 2026. The exposed data includes names, Social Security numbers, driver's licenses, and detailed medical information, placing patients at high risk of fraud and identity theft.


Threat Overview

The incident timeline highlights a prolonged and complex breach lifecycle:

  • May 8, 2025: Sandhills Medical discovered it was the victim of a ransomware attack.
  • Early June 2025: The "Inc Ransom" group listed Sandhills on its data leak website.
  • November 27-29, 2025: A forensic investigation determined that patient data was exfiltrated during this period.
  • April 28, 2026: Sandhills began sending notification letters to the 169,017 affected individuals.
  • May 3, 2026: Law firms announced class action investigations into the breach and the notification delay.

The compromised data is extensive and highly sensitive, including:

  • Full Names and Dates of Birth
  • Social Security Numbers
  • Driver's License and Passport Numbers
  • Financial and Bank Account Information
  • Personal Health Information (PHI)

The nearly one-year gap between the initial attack discovery and the public announcement of the investigation underscores the challenges healthcare organizations face in responding to and recovering from cyberattacks. The delay in notification is a key point of contention in the legal proceedings.


Technical Analysis

While the specific initial access vector was not detailed, ransomware attacks on healthcare organizations commonly involve phishing, exploitation of unpatched vulnerabilities in VPNs or other edge devices, or the use of stolen credentials. Inc Ransom is known to operate a Ransomware-as-a-Service (RaaS) model and engages in double extortion tactics, where they both encrypt and exfiltrate data.

MITRE ATT&CK Techniques


Impact Assessment

The impact on the 169,017 patients is severe. The theft of their comprehensive PII and PHI exposes them to a lifetime risk of identity theft, financial fraud, and highly targeted social engineering or blackmail schemes. For Sandhills Medical Foundation, the consequences include significant legal costs from the class action lawsuit, potential regulatory fines under HIPAA for the breach and the notification delay, and a profound loss of patient trust. The incident highlights the long-tail costs of ransomware attacks, which extend far beyond the initial ransom demand and system recovery.


IOCs — Directly from Articles

No specific Indicators of Compromise were mentioned in the source articles.


Cyber Observables — Hunting Hints

Security teams in the healthcare sector can hunt for TTPs used by groups like Inc Ransom:

Type
process_name
Value
powershell.exe, wmic.exe
Description
Monitor for suspicious use of legitimate Windows tools for reconnaissance or lateral movement.
Type
command_line_pattern
Value
vssadmin.exe delete shadows
Description
Look for commands used to delete Volume Shadow Copies to prevent system recovery.
Type
network_traffic_pattern
Value
Outbound traffic to known TOR exit nodes or Pastebin
Description
Threat actors may use these services for C2 or to post leak information.

Detection & Response

  1. EDR and XDR: Deploy robust Endpoint/Extended Detection and Response solutions to detect ransomware behaviors like rapid file encryption, shadow copy deletion, and suspicious process chains. This aligns with D3FEND's D3-PA - Process Analysis.
  2. Network Segmentation: Ensure critical systems like Electronic Health Record (EHR) databases are segmented from the rest of the network to limit the blast radius of an attack.
  3. Backup Integrity: Regularly test and validate backup and recovery procedures. Ensure backups are immutable or stored offline and isolated from the primary network. This is a critical component of D3FEND's D3-FR - File Restoration.

Mitigation

To prevent similar attacks, healthcare organizations should prioritize:

  1. Vulnerability and Patch Management: Aggressively patch internet-facing systems, especially VPNs, firewalls, and RDP gateways. This is covered by D3FEND's D3-SU - Software Update.
  2. Multi-Factor Authentication (MFA): Implement MFA across all remote access solutions, email platforms, and administrative accounts.
  3. Security Awareness Training: Train staff to identify and report phishing emails, a primary initial access vector for ransomware.
  4. Incident Response Plan: Develop and regularly drill a comprehensive incident response plan that includes clear communication protocols and legal counsel engagement to ensure timely and compliant breach notification.

Timeline of Events

1
May 8, 2025
Sandhills Medical discovers the ransomware attack.
2
June 1, 2025
Inc Ransom lists Sandhills Medical on its leak site.
3
November 27, 2025
Period of data exfiltration by the threat actor begins.
4
November 29, 2025
Period of data exfiltration ends.
5
April 28, 2026
Sandhills begins sending notification letters to affected patients.
6
May 3, 2026
Law firms announce class action investigations.
7
May 4, 2026
This article was published

MITRE ATT&CK Mitigations

Maintain a robust patch management program to close vulnerabilities that ransomware groups commonly exploit for initial access.

Enforce MFA on all remote access points (VPNs, RDP) and critical internal systems to prevent credential-based attacks.

Segment the network to isolate critical systems like EHR databases, preventing lateral movement and containing the impact of a breach.

Conduct regular security awareness training to help employees recognize and report phishing attempts, a common entry vector for ransomware.

Timeline of Events

1
May 8, 2025

Sandhills Medical discovers the ransomware attack.

2
June 1, 2025

Inc Ransom lists Sandhills Medical on its leak site.

3
November 27, 2025

Period of data exfiltration by the threat actor begins.

4
November 29, 2025

Period of data exfiltration ends.

5
April 28, 2026

Sandhills begins sending notification letters to affected patients.

6
May 3, 2026

Law firms announce class action investigations.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Sandhills Medical FoundationRansomwareInc RansomHealthcareData BreachHIPAAClass Action

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.