A Senior Living Operator Was Breached in March. Resident Data Is on the Dark Web.
On March 4, 2026, Seasons Living, an operator managing eight senior living communities in Oregon, detected unauthorized access to its network. The attackers exfiltrated resident personally identifiable information (PII), including Social Security numbers and medical records. That data is now on the dark web.
This is not a hypothetical scenario from a security vendor's slide deck. It happened to a real operator, at a real portfolio, last month. And it is part of a pattern that every senior living operator should understand.
Senior Living Is a High-Value Target
Healthcare ransomware attacks increased 36% year-over-year in Q1 2026. The average cost of a healthcare data breach is now $10 million. Senior living communities are particularly attractive targets for three reasons.
First, they operate 24/7 with no tolerance for downtime. A locked-out electronic medication administration record (eMAR) system during evening med pass is not an inconvenience. It is a patient safety event. Attackers know this and use it as leverage.
Second, senior living communities store exactly the kind of data that commands a premium on dark web marketplaces. Resident health records, Social Security numbers, insurance information, and family contact details. A single community's data can contain thousands of records.
Third, many operators run lean IT operations. Smaller communities may rely on a part-time IT contractor or a general-purpose managed service provider (MSP) without healthcare-specific security expertise. Attackers look for exactly this profile.
What Happened at Seasons Living
The details reported by McKnight's Senior Living and ClassAction.org indicate unauthorized network access followed by data exfiltration. The attackers obtained resident PII and medical records across the portfolio, then published the data.
This follows the double-extortion model that now dominates healthcare ransomware. Attackers encrypt systems to halt operations, then threaten to publish stolen data if the ransom is not paid. Even if backups allow operational recovery, the data exposure triggers HIPAA breach notification requirements, potential class action litigation, and reputational damage that affects occupancy and referral relationships.
Seasons Living Is Not an Isolated Case
In the same quarter, Health Dimensions Group, a Minneapolis-based senior care organization, confirmed a ransomware attack from October 2025 that exposed records of 450 individuals. The Worldleaks ransomware group published the data after the ransom was refused.
MMG Fusion, a software company serving healthcare practices, settled with the Office for Civil Rights (OCR) in March 2026 after a breach affecting 15 million individuals. The central finding: failure to conduct an accurate and thorough risk analysis.
OCR has now settled 12 enforcement actions under its Risk Analysis Initiative. Every single one involved the same root cause. No documented risk analysis, or a risk analysis that identified threats but did not document how those threats were mitigated.
What Operators Should Do Now
- Verify your IT provider has 24/7 managed detection and response (MDR) active on every endpoint. The Seasons Living attack required network access over a period of time. MDR with behavioral detection is the control that catches an attacker moving laterally through a network before encryption begins.
- Confirm your backups are encrypted and stored offline. Attackers routinely target backup infrastructure during an attack. If your backups are on the same network as your production systems, they will be encrypted alongside everything else.
- Check your risk assessment documentation. OCR is not asking whether you performed a risk assessment. They are asking whether you documented the risks you found and what you did about each one. If your last risk assessment is a checkbox form from two years ago, it will not satisfy an investigation.
- Ask about network segmentation. In a properly segmented network, a compromised workstation in the business office cannot reach the nurse call system, the eMAR, or the medication dispensing cabinet. If your clinical systems, business systems, and IoT devices are all on the same network, a single compromised account puts everything at risk.
- Know your breach notification obligations. HIPAA requires notification to affected individuals and HHS within 60 days of discovery for breaches affecting 500 or more individuals. Your business associate agreements may require faster notification to you as the covered entity. The LOCP contract standard, for reference, is 24 hours.
The Cost of Waiting
Cyber insurance carriers are tightening underwriting requirements for 2026 renewals. Carriers now require documented evidence of multi-factor authentication (MFA), endpoint detection and response (EDR), encrypted offline backups, and a tested incident response plan. Organizations that cannot produce this documentation face premium increases, coverage reductions, or outright denial.
If your carrier asks for proof of MDR and you cannot produce it, they can deny your claim. That is not a theoretical risk. It is a standard exclusion clause in most 2026 cyber insurance policies.
The Seasons Living breach is a concrete reminder that senior living operators are not bystanders in the healthcare cybersecurity crisis. They are targets. The question is not whether your community will be tested. It is whether you will be ready when it happens.
Related Reading
- OCR Is Enforcing Again. 12 Actions and Counting. -- Every enforcement action ties back to the same root cause: no documented risk analysis.
- Cyber Insurance Just Got Harder to Get. Here Is What Changed. -- Carriers now require documented proof of the controls that could have prevented this breach.
- The HIPAA Security Rule Is Getting Its Biggest Update in 13 Years. -- The new mandatory controls are designed to prevent exactly this type of attack.
- How Hackers Are Getting Into Senior Living Communities. -- The identity-based attack patterns used against Seasons Living.
Is your community protected against the attacks targeting senior living?
Tech for Senior Living provides 24/7 managed detection and response, encrypted backups, network segmentation, and documented compliance binders built specifically for senior living operators. We can assess your security posture and identify gaps before an attacker does.
Schedule Your Free Assessment