Two U.S. Senior Care Providers Disclose Data Breaches by Sinobi and Worldleaks Ransomware Gangs

Windward Life Care and Legend Senior Living Report Data Breaches from 2025 Ransomware Attacks

HIGH
April 17, 2026
4m read
RansomwareData BreachIndustrial Control Systems

Impact Scope

People Affected

At least 5,006 Texas residents (plus others)

Affected Companies

Windward Life CareLegend Senior Living

Industries Affected

Healthcare

Geographic Impact

United States (national)

Related Entities

Threat Actors

SinobiWorldleaks

Organizations

HIPAA Journal

Other

Windward Life CareLegend Senior Living

Full Report

Executive Summary

Two U.S. healthcare providers specializing in senior care, Windward Life Care and Legend Senior Living, have begun notifying individuals of data breaches stemming from ransomware attacks that took place in late 2025. The attacks were carried out by two separate ransomware groups, Sinobi and Worldleaks, who employed double-extortion tactics by first exfiltrating sensitive data and then encrypting the victims' systems. After ransom demands were not met, the groups leaked the stolen data on their respective dark web sites. The exposed data includes highly sensitive personally identifiable information (PII) and protected health information (PHI), posing a significant risk to the elderly individuals under the care of these facilities.


Threat Overview

This report covers two separate but similar incidents affecting the Healthcare sector.

Incident 1: Windward Life Care

  • Threat Actor: Sinobi ransomware group.
  • Timeline:
    • December 8, 2025: Suspicious network activity detected.
    • January 2026: Sinobi leaks 25GB of stolen data after ransom is not paid.
    • April 6, 2026: Internal review of compromised files concludes.
    • April 10, 2026: Notification letters sent to affected individuals.
  • Impact: The Sinobi group claimed to have exfiltrated 25 gigabytes of data before encrypting files.

Incident 2: Legend Senior Living

  • Threat Actor: Worldleaks threat group.
  • Timeline:
    • July 27 - August 15, 2025: Period of unauthorized access to systems.
    • September 2025: Worldleaks publishes stolen data on its dark web site.
    • March 12, 2026: Preliminary review of compromised data completed.
    • April 10, 2026: Notification letters sent to affected individuals.
  • Impact: At least 5,006 residents of Texas were affected, according to a notification to the Texas Attorney General. The total number of affected individuals is likely higher.

Technical Analysis

Both attacks followed the modern ransomware playbook of double extortion (T1486 - Data Encrypted for Impact and T1048 - Exfiltration Over Alternative Protocol).

  1. Initial Access: The initial access vectors were not disclosed but typically involve exploiting unpatched vulnerabilities, phishing campaigns, or compromised remote access credentials.
  2. Reconnaissance & Data Exfiltration: Once inside the network, the attackers moved laterally to identify and access servers containing valuable data, such as patient records and financial information. They then exfiltrated large volumes of this data to their own infrastructure.
  3. Encryption for Impact: After securing the stolen data, the attackers deployed their ransomware to encrypt files across the network, causing operational disruption and locking the organization out of its own systems.
  4. Extortion: The attackers then demanded a ransom payment, using the threat of leaking the stolen sensitive data as leverage.

Impact Assessment

The impact on the affected seniors is severe. The compromised data includes:

  • Names
  • Social Security numbers
  • Driver's license numbers and Passport information
  • Financial account details
  • Medical and health insurance information (PHI)

This highly sensitive data exposes a vulnerable population to a high risk of identity theft, financial fraud, and sophisticated phishing scams. For the healthcare providers, the incidents result in significant financial costs for remediation, regulatory fines under HIPAA, and severe reputational damage. The long delay between the incidents (mid-2025) and the notifications (April 2026) is also a point of major concern and will likely be scrutinized by regulators.


Detection & Response

Detection:

  • Egress Traffic Monitoring: Monitor for large, unexpected data transfers leaving the network. An upload of 25GB to an unknown destination is a major red flag for data exfiltration. This can be achieved with D3-OTF: Outbound Traffic Filtering and analysis.
  • EDR and Behavioral Analysis: Deploy EDR solutions to detect ransomware pre-cursors, such as the use of tools like Mimikatz for credential theft or lateral movement via PsExec.
  • Log Monitoring: Centralize and monitor logs from critical servers, domain controllers, and firewalls to detect anomalous access patterns.

Response: The lengthy time-to-notify suggests challenges in the investigation and data review process. A standard response should involve immediate containment, eradication of the threat actor, and a much faster review and notification cycle.

Mitigation

Healthcare organizations are high-value targets and must adopt a robust security posture.

  1. Immutable Backups: Maintain offline, immutable backups of all critical data, including electronic health records (EHR). Regularly test the ability to restore from these backups.
  2. Network Segmentation: Segment the network to prevent ransomware from spreading from workstations to critical servers. Isolate EHR systems from the general corporate network.
  3. Patch Management: Aggressively patch all internet-facing systems and software to close the vulnerabilities that ransomware groups commonly exploit.
  4. Multi-Factor Authentication (MFA): Enforce MFA on all remote access solutions (VPNs, RDP) and email accounts to prevent initial access via compromised credentials.
  5. Incident Response Plan: Have a well-documented and tested incident response plan that specifically addresses ransomware and data breach scenarios, including communication with legal counsel, cyber insurance, and law enforcement.

Timeline of Events

1
July 27, 2025
Unauthorized access to Legend Senior Living's systems begins.
2
September 1, 2025
The Worldleaks group publishes data stolen from Legend Senior Living.
3
December 8, 2025
Windward Life Care detects suspicious activity on its network.
4
January 1, 2026
The Sinobi ransomware group leaks data stolen from Windward Life Care.
5
April 10, 2026
Both Windward Life Care and Legend Senior Living begin sending notification letters to affected individuals.
6
April 17, 2026
This article was published

MITRE ATT&CK Mitigations

Implement network segmentation to isolate critical systems like Electronic Health Record (EHR) databases from general user networks, preventing ransomware from spreading easily.

Mapped D3FEND Techniques:

Use egress filtering and traffic analysis to detect and block large, anomalous outbound data transfers, which are a precursor to double-extortion ransomware attacks.

Mapped D3FEND Techniques:

While data was exfiltrated, encrypting sensitive data at rest can add a layer of protection, although determined attackers may seek out decryption keys.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To combat the double-extortion tactics used by groups like Sinobi and Worldleaks, healthcare organizations must implement strict Outbound Traffic Filtering and analysis. The exfiltration of 25GB of data from Windward Life Care should have been a detectable event. Security teams should configure their firewalls and proxies to deny all outbound traffic by default, only allowing connections to known-good, business-required destinations on specific ports. Furthermore, a Data Loss Prevention (DLP) or network analysis tool should be used to monitor the volume of egress traffic. A baseline of normal outbound data flow should be established, and alerts must be configured to trigger on significant deviations. An alert for a multi-gigabyte upload to an uncategorized or suspicious IP address from a file server containing PHI would be a critical indicator of compromise, allowing a security team to intervene and stop the data exfiltration before the final ransomware encryption stage begins.

For senior care providers and other healthcare entities, Network Isolation is a fundamental defense against the spread of ransomware. The network should be segmented into distinct security zones. For example, the network segment containing the Electronic Health Record (EHR) database and other critical servers with PHI should be strictly isolated from the general corporate network used by administrative staff. Access between these zones must be controlled by an internal firewall with a default-deny policy. Only specific, authorized systems should be permitted to communicate with the EHR servers on required ports. This containment strategy ensures that even if a workstation on the corporate network is compromised by ransomware, the malware cannot easily spread laterally to encrypt the organization's most critical data assets. This significantly limits the blast radius of an attack and preserves the integrity of patient data.

Sources & References

Two Senior Care Providers Affected by Ransomware Attacks
HIPAA Journal (hipaajournal.com) April 17, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareHealthcareData BreachSinobiWorldleaksPHIHIPAA

📢 Share This Article

Help others stay informed about cybersecurity threats