Ransomware victim disclosure
← All victimsEpiscopal Retirement Services
listed as episcopalretirement.com Возможна утечка · Claimed by Groove · listed 5 years ago
Status timeline
- Listed
Oct 23, 2021
- Data leaked
At a glance
- Group
- Groove
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- Oct 23, 2021
About the victim
AI dossier — public-source company profileEpiscopal Retirement Services (ERS) is a nonprofit organization providing premier and affordable senior living communities across Cincinnati, OH, Louisville, KY, and the broader Tri-State region. Services include independent living, assisted living, memory care, long-term care, short-term rehabilitation, and community-based programs such as Meals on Wheels. ERS has been recognized as one of Cincinnati's Top Workplaces for over 16 consecutive years.
- Industry
- Senior Living & Long-Term Care Services
- Address
- Cincinnati, OH (also operates in Louisville, KY and across the Tri-State region)
Attack summary
Severity: critical — Episcopal Retirement Services is a healthcare and senior care provider handling highly sensitive regulated data including medical records, personal health information, and financial records of elderly residents — a population afforded strong regulatory protections (HIPAA). The disclosed status of 'data_published' confirms exfiltration of likely regulated PII and PHI at scale.The Groove ransomware group has claimed an attack on Episcopal Retirement Services, with the disclosure status listed as data_published, indicating data has been exfiltrated and published. No specific details about the volume or nature of published data are captured in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Resident personal information
- Medical/care records
- Staff employment records
- Financial/billing records
- Organizational operational data
Sources
- Victim siteepiscopalretirement.com
Source
Indexed 5 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
