[SINOBI] – Ransomware Victim: Greater Mental Health of New York

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the SINOBI Onion Dark Web Tor Blog page.

Ransomware group:
SINOBI
Victim name:
GREATER MENTAL HEALTH OF NEW YORK

AI Generated Summary of the Ransomware Leak Page

On 2025-10-20 20:44:34.681000, Greater Mental Health of New York is identified in a ransomware leak post as a victim. Greater Mental Health of New York is the new name of the merged entity formed by The Mental Health Association of Westchester and The Mental Health Association of Rockland, two agencies with a long history of collaboration and a shared mission to promote mental health throughout the Hudson Valley region. The organization operates in the healthcare sector in the United States. The post date matches the timestamp provided by the metadata, and there is no separate compromise date listed. The available data do not explicitly indicate whether the attackers encrypted systems or exfiltrated data, so the exact impact remains unspecified in this entry.

The leak page notes a claim URL is present (defanged), indicating that the attackers assert some level of access or data exposure. The metadata shows no images or screenshots on the page (images_count = 0), and there are no downloadable files, photos, or linked documents. No ransom amount or data volume is disclosed in the provided information. The page content focuses on establishing the victim’s identity and background, with no other company names identified in the text; if any non-English content had been present, it would be translated into clear English. Overall, the available data show limited detail about the incident beyond the existence of a claim URL.

Because there are no visual attachments and no explicit figures for data volume or ransom, this entry appears to be an initial or minimal disclosure. Analysts should monitor reputable threat intelligence sources for updates to determine whether additional information emerges. The entry emphasizes the healthcare focus of the victim and outlines the merger history in the Hudson Valley, while preserving the victim_name as the primary identifier in this summary.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features