169,017
Sandhills Medical Foundation, a community health center in South Carolina, is now the subject of a class action investigation following a ransomware attack that occurred in 2025. The breach, attributed to the Inc Ransom group, compromised the sensitive personal and health information of 169,017 patients. A significant delay in notification has sparked legal action; although the data was exfiltrated in November 2025, Sandhills did not begin notifying victims until late April 2026. The exposed data includes names, Social Security numbers, driver's licenses, and detailed medical information, placing patients at high risk of fraud and identity theft.
The incident timeline highlights a prolonged and complex breach lifecycle:
The compromised data is extensive and highly sensitive, including:
The nearly one-year gap between the initial attack discovery and the public announcement of the investigation underscores the challenges healthcare organizations face in responding to and recovering from cyberattacks. The delay in notification is a key point of contention in the legal proceedings.
While the specific initial access vector was not detailed, ransomware attacks on healthcare organizations commonly involve phishing, exploitation of unpatched vulnerabilities in VPNs or other edge devices, or the use of stolen credentials. Inc Ransom is known to operate a Ransomware-as-a-Service (RaaS) model and engages in double extortion tactics, where they both encrypt and exfiltrate data.
T1212 - Exploitation for Credential Access: A likely initial access or privilege escalation vector.T1567.002 - Exfiltration Over Asymmetric Encryption: Threat actors often use encrypted channels to exfiltrate data to avoid detection.T1486 - Data Encrypted for Impact: The core ransomware activity of encrypting files to disrupt operations.T1071.001 - Web Protocols: Used for command and control (C2) communication and data exfiltration.The impact on the 169,017 patients is severe. The theft of their comprehensive PII and PHI exposes them to a lifetime risk of identity theft, financial fraud, and highly targeted social engineering or blackmail schemes. For Sandhills Medical Foundation, the consequences include significant legal costs from the class action lawsuit, potential regulatory fines under HIPAA for the breach and the notification delay, and a profound loss of patient trust. The incident highlights the long-tail costs of ransomware attacks, which extend far beyond the initial ransom demand and system recovery.
No specific Indicators of Compromise were mentioned in the source articles.
Security teams in the healthcare sector can hunt for TTPs used by groups like Inc Ransom:
process_namepowershell.exe, wmic.execommand_line_patternvssadmin.exe delete shadowsnetwork_traffic_patternOutbound traffic to known TOR exit nodes or PastebinD3-PA - Process Analysis.D3-FR - File Restoration.To prevent similar attacks, healthcare organizations should prioritize:
D3-SU - Software Update.Maintain a robust patch management program to close vulnerabilities that ransomware groups commonly exploit for initial access.
Enforce MFA on all remote access points (VPNs, RDP) and critical internal systems to prevent credential-based attacks.
Segment the network to isolate critical systems like EHR databases, preventing lateral movement and containing the impact of a breach.
Conduct regular security awareness training to help employees recognize and report phishing attempts, a common entry vector for ransomware.
Sandhills Medical discovers the ransomware attack.
Inc Ransom lists Sandhills Medical on its leak site.
Period of data exfiltration by the threat actor begins.
Period of data exfiltration ends.
Sandhills begins sending notification letters to affected patients.
Law firms announce class action investigations.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.