[RHYSIDA] – Ransomware Victim: Spindletop Center

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the RHYSIDA Onion Dark Web Tor Blog page.

Ransomware group:
RHYSIDA
Victim name:
SPINDLETOP CENTER

AI Generated Summary of the Ransomware Leak Page

On October 30, 2025, a leak post attributed to the Rhysida ransomware group concerns Spindletop Center, a United States-based nonprofit healthcare organization focused on behavioral health services and programs for individuals with intellectual and developmental disabilities and for substance-use recovery. The post asserts that the attackers have accessed or exfiltrated more than 100,000 patient records, comprising sensitive personal data such as addresses, phone numbers, passport numbers, Social Security numbers, diagnoses, and medical histories. The incident is framed as a data-leak event rather than a pure encryption incident, and no ransom amount or payment demand is disclosed on the page. The post bears the date 2025-10-30 09:53:29.620352, which is the post date. The leak page includes no screenshots, downloadable files, or claim URLs.

Media on the page is absent: there are zero images or screenshots, and there are no attachments or links to additional material. There is no explicit mention of encryption, and no ransom figure is provided. The page foregrounds the scale and sensitivity of the reported data, underscoring the privacy and regulatory risks for a healthcare provider in the United States. This event highlights the ongoing threat landscape facing U.S. healthcare organizations, especially those handling large volumes of patient information and sensitive health data.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features