Company Details
ageright
36
1,532
6216
agerightcareathome.com
0
AGE_1321512
In-progress


AgeRight Company CyberSecurity Posture
agerightcareathome.comYou have probably found yourself or your loved one in a place where some daily challenges are arising, but there is a strong desire to stay in the home. These challenges can be temporary or ongoing and different for each person. Someone may just need help with keeping up and monitoring their medicine and another might be struggling with picking up groceries and fixing meals for themselves. Wherever you are, AgeRight Care at Home has the flexibility and resources to meet your needs.
Company Details
ageright
36
1,532
6216
agerightcareathome.com
0
AGE_1321512
In-progress
Between 650 and 699

AgeRight Global Score (TPRM)XXXX

Description: AgeRight Clinical Services Suffers Data Breach Impacting Nearly 5,000 Individuals On November 21, 2025, AgeRight Clinical Services, a healthcare provider specializing in senior care, disclosed a data breach affecting 4,897 individuals after detecting unauthorized access to its systems. The breach occurred over a month-long period, from August 9 to September 10, 2025, though the exact method of intrusion remains undisclosed. The exposed data includes sensitive personally identifiable information (PII) such as names, addresses, dates of birth, and Social Security numbers as well as protected health information (PHI), including medical diagnoses, treatment details, and insurance records. The prolonged duration of unauthorized access suggests a sophisticated compromise of internal systems. AgeRight reported the incident to the Oregon Attorney General’s office on the same day it notified affected individuals. While the company has not released specific details about its response, it has taken steps to secure its systems and prevent further unauthorized access, likely involving cybersecurity professionals to investigate vulnerabilities and strengthen defenses. No responsible party has been identified in connection with the breach.
Description: Consonus Healthcare Services Faces Lawsuit Over Delayed Data Breach Disclosure A former employee of Oregon-based Consonus Healthcare Services has filed a class-action lawsuit against the company, alleging a three-month delay in notifying affected individuals about a data breach that exposed sensitive personal information. The breach, which occurred in early August 2024, compromised the data of approximately 4,800 current and former employees and job applicants, including names, Social Security numbers, and other identifying details. The lawsuit, filed in U.S. District Court in Portland, claims Consonus part of Marquis Companies, a senior living chain failed to implement adequate cybersecurity measures, leaving victims vulnerable to lifelong risks of identity theft and fraud. The company reportedly detected the breach on August 17 but did not notify Oregon’s attorney general or affected individuals until November, nearly three months later. Plaintiff Gaurav Kaushik, a former program manager who worked for Consonus from 2021 to 2024, alleges the company was negligent in securing its systems, failing to monitor for intrusions or comply with industry cybersecurity standards. The stolen data could be exploited for financial fraud, medical identity theft, tax fraud, and other criminal activities, according to the complaint. Consonus offered affected individuals short-term credit monitoring, which the lawsuit dismisses as insufficient given the permanent risks posed by the breach. The notice also allegedly lacked critical details, including the root cause of the breach, exploited vulnerabilities, and remedial actions taken. The lawsuit seeks monetary damages, lifetime credit monitoring, and identity theft insurance for victims. Neither Consonus nor the plaintiffs’ legal representatives have publicly commented on the case. Consonus provides services to rehabilitation and senior care facilities across eight states, including Oregon, Washington, and California.
Description: Marquis Companies Hit by LYNX Ransomware Attack, Exposing Sensitive Health and Personal Data Marquis Companies, a major provider of hospital and healthcare services, suffered a ransomware attack between August 9 and September 10, 2025, resulting in the theft of personally identifiable information (PII) and protected health information (PHI) belonging to current and former residents. The breach was detected on August 17, 2025, though the Oregon Attorney General’s office was not notified until November 21, 2025. The attack was attributed to the LYNX ransomware group, which claimed responsibility and later posted about the breach on the dark web on October 21, 2025. The stolen data included names, addresses, dates of birth, Social Security numbers, medical records, and health insurance details, with potential exposure of additional personal records tied to senior care services. LYNX infiltrated Marquis Companies’ network, exfiltrating sensitive data before encrypting systems a tactic increasingly used to pressure victims into paying ransoms. The group threatened to release or sell the stolen information if demands were not met. Affected individuals were formally notified by mail on November 21, 2025. In response, Marquis Companies initiated an internal investigation and enlisted cybersecurity experts to assess the breach’s scope and reinforce system security. The incident highlights the growing threat of ransomware attacks targeting healthcare providers, where the compromise of PHI and PII can have severe consequences for affected individuals.


No incidents recorded for AgeRight in 2026.
No incidents recorded for AgeRight in 2026.
No incidents recorded for AgeRight in 2026.
AgeRight cyber incidents detection timeline including parent company and subsidiaries

You have probably found yourself or your loved one in a place where some daily challenges are arising, but there is a strong desire to stay in the home. These challenges can be temporary or ongoing and different for each person. Someone may just need help with keeping up and monitoring their medicine and another might be struggling with picking up groceries and fixing meals for themselves. Wherever you are, AgeRight Care at Home has the flexibility and resources to meet your needs.


America's Choice in Home Care and Caregiver's Choice in Employment. Visiting Angels in-home care helps make it possible for seniors and adults with special needs to continue to live at home; while maintaining the independence of their daily routines and familiar surroundings. We provide non-medical
.png)
Data breach at AgeRight Clinical Services impacted 4897 people, exposing names, SSNs, medical details, and more. Check if you're affected.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of AgeRight is https://agerightcareathome.com/.
According to Rankiteo, AgeRight’s AI-generated cybersecurity score is 671, reflecting their Weak security posture.
According to Rankiteo, AgeRight currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, AgeRight has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, AgeRight is not certified under SOC 2 Type 1.
According to Rankiteo, AgeRight does not hold a SOC 2 Type 2 certification.
According to Rankiteo, AgeRight is not listed as GDPR compliant.
According to Rankiteo, AgeRight does not currently maintain PCI DSS compliance.
According to Rankiteo, AgeRight is not compliant with HIPAA regulations.
According to Rankiteo,AgeRight is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
AgeRight operates primarily in the Home Health Care Services industry.
AgeRight employs approximately 36 people worldwide.
AgeRight presently has no subsidiaries across any sectors.
AgeRight’s official LinkedIn profile has approximately 1,532 followers.
AgeRight is classified under the NAICS code 6216, which corresponds to Home Health Care Services.
No, AgeRight does not have a profile on Crunchbase.
Yes, AgeRight maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ageright.
As of January 24, 2026, Rankiteo reports that AgeRight has experienced 3 cybersecurity incidents.
AgeRight has an estimated 276 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and third party assistance with cybersecurity professionals, and remediation measures with internal investigation and system security assessment, and communication strategy with formal notification to impacted individuals by mail on nov. 21, 2025, and third party assistance with cybersecurity professionals, and law enforcement notified with oregon attorney general’s office, and containment measures with secured systems to prevent further unauthorized access, and communication strategy with notified affected individuals on 2025-11-21, and communication strategy with delayed notification to affected individuals and oregon’s attorney general..
Title: Marquis Companies Data Breach and Ransomware Attack
Description: Marquis Companies, a leading provider in the hospital and health care industry, experienced a significant data breach involving personally identifiable information (PII) and protected health information (PHI) of current and former residents. The breach was caused by a ransomware attack carried out by the LYNX group.
Date Detected: 2025-08-17
Date Publicly Disclosed: 2025-11-21
Type: Ransomware Attack
Threat Actor: LYNX ransomware group
Motivation: Financial gain, data extortion
Title: AgeRight Clinical Services Data Breach
Description: AgeRight Clinical Services, a healthcare provider specializing in senior care, discovered a significant data breach affecting nearly 5,000 individuals. The breach involved unauthorized access to sensitive information, including personally identifiable information (PII) and protected health information (PHI).
Date Detected: 2025-08-17
Date Publicly Disclosed: 2025-11-21
Type: Data Breach
Title: Consonus Healthcare Services Data Breach
Description: Consonus Healthcare Services experienced a data breach in early August, compromising personal information of current and former employees and job applicants. The company took three months to notify affected individuals, putting them at risk of identity theft and fraud.
Date Detected: 2024-08-17
Date Publicly Disclosed: 2024-11-00
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Personally identifiable information (PII) and protected health information (PHI)
Brand Reputation Impact: Likely significant
Legal Liabilities: Potential
Identity Theft Risk: High

Data Compromised: Personally identifiable information (PII) and protected health information (PHI)
Identity Theft Risk: High

Data Compromised: Names, Social Security numbers, and other personal information
Brand Reputation Impact: Negative impact due to delayed notification and inadequate security measures
Legal Liabilities: Lawsuit filed for negligence and recklessness in data security
Identity Theft Risk: High risk of identity theft and fraud for affected individuals
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Protected Health Information (Phi), , Personally Identifiable Information (Pii), Protected Health Information (Phi), , Names, Social Security Numbers, Personal Information and .

Entity Name: Marquis Companies
Entity Type: Healthcare Provider
Industry: Hospital & Health Care
Customers Affected: Current and former residents

Entity Name: AgeRight Clinical Services
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: 4897

Entity Name: Consonus Healthcare Services
Entity Type: Healthcare Services and Consulting
Industry: Healthcare
Location: Oregon, USA
Customers Affected: 4800

Incident Response Plan Activated: Yes
Third Party Assistance: Cybersecurity professionals
Remediation Measures: Internal investigation and system security assessment
Communication Strategy: Formal notification to impacted individuals by mail on Nov. 21, 2025

Third Party Assistance: Cybersecurity professionals
Law Enforcement Notified: Oregon Attorney General’s office
Containment Measures: Secured systems to prevent further unauthorized access
Communication Strategy: Notified affected individuals on 2025-11-21

Communication Strategy: Delayed notification to affected individuals and Oregon’s attorney general
Incident Response Plan: The company's incident response plan is described as Yes.
Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity professionals, Cybersecurity professionals.

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Sensitivity of Data: High
Data Exfiltration: Yes
Data Encryption: Yes (by attackers)
Personally Identifiable Information: NamesAddressesDates of birthSocial Security numbersMedical informationHealth insurance details

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: 4897
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesDates of birthSocial Security numbersMedical diagnosesTreatment detailsInsurance information

Type of Data Compromised: Names, Social security numbers, Personal information
Number of Records Exposed: 4800
Sensitivity of Data: High
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Internal investigation and system security assessment.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by secured systems to prevent further unauthorized access.

Ransomware Strain: LYNX
Data Encryption: Yes
Data Exfiltration: Yes

Regulations Violated: HIPAA (likely),
Regulatory Notifications: Oregon Attorney General’s office (Nov. 21, 2025)

Regulatory Notifications: Oregon Attorney General’s office

Regulations Violated: Industry standards, Federal regulations on cybersecurity,
Legal Actions: Lawsuit filed in U.S. District Court in Portland
Regulatory Notifications: Notified Oregon’s attorney general
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuit filed in U.S. District Court in Portland.

Source: Oregon Attorney General’s office disclosure

Source: Dark web post by LYNX group

Source: Oregon Attorney General’s office

Source: The Oregonian
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Oregon Attorney General’s office disclosure, and Source: Dark web post by LYNX group, and Source: Oregon Attorney General’s office, and Source: The Oregonian.

Investigation Status: Ongoing

Investigation Status: Ongoing

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Formal notification to impacted individuals by mail on Nov. 21, 2025, Notified affected individuals on 2025-11-21 and Delayed notification to affected individuals and Oregon’s attorney general.

Customer Advisories: Formal notification to impacted individuals by mail on Nov. 21, 2025

Customer Advisories: Notified affected individuals on 2025-11-21

Customer Advisories: Offered short-term credit monitoring to affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Formal notification to impacted individuals by mail on Nov. 21, 2025, Notified affected individuals on 2025-11-21 and Offered short-term credit monitoring to affected individuals.

Corrective Actions: Enhanced security protocols

Root Causes: Inadequate data security system, failure to monitor security systems for intrusion, non-compliance with industry standards and federal regulations
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity professionals, Cybersecurity professionals.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced security protocols.
Last Attacking Group: The attacking group in the last incident was an LYNX ransomware group.
Most Recent Incident Detected: The most recent incident detected was on 2025-08-17.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-11-00.
Most Significant Data Compromised: The most significant data compromised in an incident were Personally identifiable information (PII) and protected health information (PHI), Personally identifiable information (PII) and protected health information (PHI), Names, Social Security numbers and and other personal information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cybersecurity professionals, Cybersecurity professionals.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Secured systems to prevent further unauthorized access.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personally identifiable information (PII) and protected health information (PHI), Names, Social Security numbers and and other personal information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 976.0.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuit filed in U.S. District Court in Portland.
Most Recent Source: The most recent source of information about an incident are Oregon Attorney General’s office, Dark web post by LYNX group, Oregon Attorney General’s office disclosure and The Oregonian.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Formal notification to impacted individuals by mail on Nov. 21, 2025, Notified affected individuals on 2025-11-21 and Offered short-term credit monitoring to affected individuals.
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.