At least 5,006 Texas residents (plus others)
Two U.S. healthcare providers specializing in senior care, Windward Life Care and Legend Senior Living, have begun notifying individuals of data breaches stemming from ransomware attacks that took place in late 2025. The attacks were carried out by two separate ransomware groups, Sinobi and Worldleaks, who employed double-extortion tactics by first exfiltrating sensitive data and then encrypting the victims' systems. After ransom demands were not met, the groups leaked the stolen data on their respective dark web sites. The exposed data includes highly sensitive personally identifiable information (PII) and protected health information (PHI), posing a significant risk to the elderly individuals under the care of these facilities.
This report covers two separate but similar incidents affecting the Healthcare sector.
Incident 1: Windward Life Care
December 8, 2025: Suspicious network activity detected.January 2026: Sinobi leaks 25GB of stolen data after ransom is not paid.April 6, 2026: Internal review of compromised files concludes.April 10, 2026: Notification letters sent to affected individuals.Incident 2: Legend Senior Living
July 27 - August 15, 2025: Period of unauthorized access to systems.September 2025: Worldleaks publishes stolen data on its dark web site.March 12, 2026: Preliminary review of compromised data completed.April 10, 2026: Notification letters sent to affected individuals.Both attacks followed the modern ransomware playbook of double extortion (T1486 - Data Encrypted for Impact and T1048 - Exfiltration Over Alternative Protocol).
The impact on the affected seniors is severe. The compromised data includes:
This highly sensitive data exposes a vulnerable population to a high risk of identity theft, financial fraud, and sophisticated phishing scams. For the healthcare providers, the incidents result in significant financial costs for remediation, regulatory fines under HIPAA, and severe reputational damage. The long delay between the incidents (mid-2025) and the notifications (April 2026) is also a point of major concern and will likely be scrutinized by regulators.
Detection:
Mimikatz for credential theft or lateral movement via PsExec.Response: The lengthy time-to-notify suggests challenges in the investigation and data review process. A standard response should involve immediate containment, eradication of the threat actor, and a much faster review and notification cycle.
Healthcare organizations are high-value targets and must adopt a robust security posture.
Implement network segmentation to isolate critical systems like Electronic Health Record (EHR) databases from general user networks, preventing ransomware from spreading easily.
Mapped D3FEND Techniques:
Use egress filtering and traffic analysis to detect and block large, anomalous outbound data transfers, which are a precursor to double-extortion ransomware attacks.
Mapped D3FEND Techniques:
While data was exfiltrated, encrypting sensitive data at rest can add a layer of protection, although determined attackers may seek out decryption keys.
Mapped D3FEND Techniques:
To combat the double-extortion tactics used by groups like Sinobi and Worldleaks, healthcare organizations must implement strict Outbound Traffic Filtering and analysis. The exfiltration of 25GB of data from Windward Life Care should have been a detectable event. Security teams should configure their firewalls and proxies to deny all outbound traffic by default, only allowing connections to known-good, business-required destinations on specific ports. Furthermore, a Data Loss Prevention (DLP) or network analysis tool should be used to monitor the volume of egress traffic. A baseline of normal outbound data flow should be established, and alerts must be configured to trigger on significant deviations. An alert for a multi-gigabyte upload to an uncategorized or suspicious IP address from a file server containing PHI would be a critical indicator of compromise, allowing a security team to intervene and stop the data exfiltration before the final ransomware encryption stage begins.
For senior care providers and other healthcare entities, Network Isolation is a fundamental defense against the spread of ransomware. The network should be segmented into distinct security zones. For example, the network segment containing the Electronic Health Record (EHR) database and other critical servers with PHI should be strictly isolated from the general corporate network used by administrative staff. Access between these zones must be controlled by an internal firewall with a default-deny policy. Only specific, authorized systems should be permitted to communicate with the EHR servers on required ports. This containment strategy ensures that even if a workstation on the corporate network is compromised by ransomware, the malware cannot easily spread laterally to encrypt the organization's most critical data assets. This significantly limits the blast radius of an attack and preserves the integrity of patient data.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats