Ransomware victim disclosure
← All victimsWestside Community Services
listed as Westside · Claimed by Royal · listed 3 years ago
Status timeline
- Listed
May 22, 2023
- Data leaked
At a glance
- Group
- Royal
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- May 22, 2023
About the victim
AI dossier — public-source company profileWestside Community Services is a nonprofit organization based in San Francisco, California, providing integrated mental health, substance use and recovery, HIV/AIDS case management, and community social services. The organization serves diverse populations including children, adolescents, adults, and African American communities through a range of outpatient, crisis, and home care programs. It operates multiple specialized programs including a Methadone Maintenance Program, Crisis Clinic, and community violence prevention initiatives.
- Industry
- Community Mental Health & Social Services
- Address
- 1153 Oak Street, San Francisco, CA 94117
Attack summary
Severity: critical — Westside Community Services handles highly sensitive regulated health data including mental health records, HIV/AIDS case management, and substance use treatment information — all categories protected under HIPAA. Data published status by a known ransomware group against a healthcare nonprofit serving vulnerable populations represents a critical breach of sensitive PII and protected health information at scale.The Royal ransomware group has claimed an attack on Westside Community Services, with the disclosure status indicating data has been published. No specific details about encryption or exfiltration methods are captured in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Patient mental health records
- HIV/AIDS case management records
- Substance use treatment records
- Personal identifying information (PII)
- Employee records
- Nonprofit financial statements
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
