Ransomware victim disclosure
← All victimsCarespring
listed as www.carespring.com · Claimed by NoEscape · listed 3 years ago
Status timeline
- Listed
Nov 14, 2023
- Data leaked
At a glance
- Group
- NoEscape
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- Nov 14, 2023
About the victim
AI dossier — public-source company profileCarespring operates 18 senior living and skilled nursing communities across the Cincinnati, Dayton, and Northern Kentucky region. Its services span independent living, assisted living, memory care, skilled nursing and rehabilitation, long-term nursing care, and on-site hemodialysis. The company is employee-owned through an Employee Stock Ownership Plan (ESOP).
- Industry
- Senior Living & Skilled Nursing Care
- Address
- Cincinnati, Ohio / Dayton, Ohio / Northern Kentucky region, United States
Attack summary
Severity: critical — Carespring is a multi-site healthcare operator providing skilled nursing, memory care, and rehabilitation services, meaning it almost certainly holds highly sensitive regulated data including protected health information (PHI) for vulnerable elderly patients. The disclosed status of 'data_published' indicates confirmed exfiltration and publication of data, qualifying as a critical breach of regulated medical and PII data at scale under HIPAA.NoEscape claimed an attack on Carespring and the disclosure status is listed as data_published, indicating the group asserts it has exfiltrated and published data from the organization. No specific ransom amount or data volume was stated in the available post.
Data the group says was taken
AI dossier — extracted from the leak post- Patient health records
- Resident personal information
- Medical/clinical data
- Employee records
- Financial records
Sources
- Victim sitecarespring.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
