Company Details
spindletop-center
350
721
62133
stctr.org
0
SPI_2732349
In-progress


Spindletop Center Company CyberSecurity Posture
stctr.orgSpindletop Center is a community mental health and intellectual and developmental disabilities center located in Southeast Texas. It provides a variety of behavioral health care services to people with mental illness, intellectual and developmental disabilities and chemical dependency. Spindletop Center was formed September 1, 2000 when Beaumont State Center and Life Resource joined forces. The center provides services in Jefferson, Orange, Hardin and Chambers counties and serves approximately 8,000 consumers a year. The center employs more than 400 full-time staff and is governed by a nine-member board of trustees appointed by the county commissioners courts in the four-county area. The center is named after the Spindletop oil gusher that changed the world. In 1901 a 100-foot drilling derrick named Spindletop produced a roaring gusher of black crude oil, coating the surrounding landscape with a black, sticky, goo. The first major oil discovery in the United States, the Spindletop gusher marked the beginning of the American oil industry. Just as the Spindletop oil discovery ushered in a new age for America and Southeast Texas, Spindletop Center ushered in a new age in providing mental health, intellectual and developmental disabilities, developmental disability and chemical dependency services in Southeast Texas. The Center is licensed by the Health and Human Services Commission (HHSC) to provide chemical dependency treatment services and is also contracted by HHSC to deliver mental health services.
Company Details
spindletop-center
350
721
62133
stctr.org
0
SPI_2732349
In-progress
Between 600 and 649

Spindletop Center Global Score (TPRM)XXXX

Description: Spindletop Center Hit by Rhysida Ransomware Attack in September 2025 In September 2025, Spindletop Center, a Texas-based behavioral health clinic, disclosed a data breach affecting an undisclosed number of patients. The incident, first detected on September 29, 2025, involved unauthorized access to sensitive information, including names, Social Security numbers, government-issued IDs, diagnoses, and case numbers. The ransomware group Rhysida claimed responsibility for the attack, asserting it stole records of 100,000 individuals and demanding a 15 bitcoin ransom (approximately $1.65 million). Rhysida provided sample documents as proof of the breach, though Spindletop has not verified the group’s claims. The clinic’s investigation, concluded on December 3, 2025, determined that unauthorized access may have occurred as early as September 23, 2025. Spindletop’s breach notification did not mention credit monitoring or identity theft protection for affected individuals. Rhysida, a ransomware-as-a-service (RaaS) operation active since May 2023, has been linked to 100 confirmed attacks (and 156 unconfirmed) since its emergence, compromising nearly 5.5 million records. The group’s average ransom demand is $1.17 million, with healthcare providers being frequent targets. In 2025 alone, Rhysida claimed 17 breaches, including four in the healthcare sector: - Florida Lung, Asthma & Sleep Specialists (May 2025, 10,000 affected, $639,000 ransom) - Cookeville Regional Medical Center (July 2025, 500+ affected, $1.15 million ransom) - MedStar Health (September 2025, $3.1 million ransom) The Spindletop breach is part of a broader surge in ransomware attacks on U.S. healthcare providers. In 2025, 104 confirmed incidents compromised over 8.8 million records, with an average ransom demand of $697,000. Other recent attacks include: - Pulse Urgent Care Center (March 2025, 4,035 affected, $120,000 ransom by Medusa) - Medical Center, LLP (Georgia) (October 2025, claimed by PEAR) - University of Hawaii Cancer Center (August 2025) Ransomware attacks on healthcare facilities disrupt critical systems, forcing providers to cancel appointments, divert patients, or revert to manual record-keeping. The fallout can jeopardize patient safety, privacy, and operational stability. Spindletop Center, headquartered in Beaumont, Texas, operates five locations and serves over 16,000 patients annually, employing more than 500 staff. The clinic offers mental health services, substance use treatment, and support for intellectual and developmental disabilities.


No incidents recorded for Spindletop Center in 2026.
No incidents recorded for Spindletop Center in 2026.
No incidents recorded for Spindletop Center in 2026.
Spindletop Center cyber incidents detection timeline including parent company and subsidiaries

Spindletop Center is a community mental health and intellectual and developmental disabilities center located in Southeast Texas. It provides a variety of behavioral health care services to people with mental illness, intellectual and developmental disabilities and chemical dependency. Spindletop Center was formed September 1, 2000 when Beaumont State Center and Life Resource joined forces. The center provides services in Jefferson, Orange, Hardin and Chambers counties and serves approximately 8,000 consumers a year. The center employs more than 400 full-time staff and is governed by a nine-member board of trustees appointed by the county commissioners courts in the four-county area. The center is named after the Spindletop oil gusher that changed the world. In 1901 a 100-foot drilling derrick named Spindletop produced a roaring gusher of black crude oil, coating the surrounding landscape with a black, sticky, goo. The first major oil discovery in the United States, the Spindletop gusher marked the beginning of the American oil industry. Just as the Spindletop oil discovery ushered in a new age for America and Southeast Texas, Spindletop Center ushered in a new age in providing mental health, intellectual and developmental disabilities, developmental disability and chemical dependency services in Southeast Texas. The Center is licensed by the Health and Human Services Commission (HHSC) to provide chemical dependency treatment services and is also contracted by HHSC to deliver mental health services.


WHO WE ARE: A mental health services agency serving the Baltimore Metro Area. Although our team members possess many diverse skill sets, and come from different backgrounds, we are united through mindset, operating as a cohesive team focused on overcoming barriers and growing with the clients and

The Bert Nash Center was founded in 1950 in memory of Dr. Bert Nash, educator, psychologist, Lawrence community leader, and strong proponent of what we now term community based services for children and families. We’re pleased to honor Dr. Nash’s legacy by continuing to provide programs and services

Pacific Grove Hospital is a 68-bed, acute psychiatric and chemical dependency hospital situated on 4.5 acres in the heart of Riverside, Calif. Our highly trained staff treats voluntary patients through the following programs: •Acute Psychiatric: Full-service care for adults suffering from mental he

Journey of Hope Grief Support Center is a non-profit organization dedicated to providing group grief support to children, adolescents, and their parents or adult caregivers who have experienced the death of a loved one. We offer peer grief support groups in a warm, caring, and nurturing environment

Sedona Sky Academy provides high-quality, evidence-based clinical services, top-notch college preparatory academics with a unique, full array of expressive, performing and experiential arts, all within a warm, nurturing and healthy living environment. Sedona Sky utilizes specific trauma informed, ex

Phoenix Resource Center, Inc. offers a continuum of care for families referred by the Department of Family and Children Services and the Department of Juvenile Justice. Our mission is to serve children and families by providing superior quality, outcome focused, preventative and therapeutic service

Happy, long-lasting relationships are developed over time. You can learn to express your needs, be creative and kind when you disagree, and become more playful and erotic in your relationship. When you need help, know what constitutes a real effective helper. You'll be in the best place to make the

Attachment-Based & Trauma-Informed Psychotherapy for Adults, Adolescents and Couples. I am educated as a Master Social Worker from the University of Utah and have my License in Clinical Social Work. Over the past ten years, I have worked in various roles within human services including mental healt

OPI is a co-ed treatment program for struggling young adults ages 17-28. We treat a variety of behavioral health issues in a real-world environment. We support our participants through therapy and life coaching while they explore and pursue their passions in the community with school, work, and volu
.png)
Beijing said it's seriously concerned about a new cybersecurity package the European Commission has proposed, and vowed to protect the...
FOX 2 - The number one scam of 2025, according to cybersecurity expert David Derigiotis has to do with Bitcoin kiosks. The backstory:.
HITRUST Certification validates WestFax Cloud Fax Service is meeting rigorous cybersecurity and data protection standards through...
Arizona Secretary of State Adrian Fontes said new legislation called the "Voters First Act" would "ensure the resilience of our democracy."
The Cybersecurity and Infrastructure Security Agency's acting director testified that CISA is “getting back on mission,” but he provided few...
How Cybersecurity Maturity Model Certification will impact manufacturing beyond defense contracts.
The National Cybersecurity Alliance created the Core Four, a set of four simple yet powerful steps anyone can follow.
Teradata Corporation recently appointed Ken Ricketts as Senior Vice President and Chief Information Security Officer, tasking him with...
The Cybersecurity and Infrastructure Security Agency's acting leader used a hearing on Wednesday to defend the Trump administration's mass...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Spindletop Center is http://www.stctr.org.
According to Rankiteo, Spindletop Center’s AI-generated cybersecurity score is 608, reflecting their Poor security posture.
According to Rankiteo, Spindletop Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Spindletop Center has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Spindletop Center is not certified under SOC 2 Type 1.
According to Rankiteo, Spindletop Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Spindletop Center is not listed as GDPR compliant.
According to Rankiteo, Spindletop Center does not currently maintain PCI DSS compliance.
According to Rankiteo, Spindletop Center is not compliant with HIPAA regulations.
According to Rankiteo,Spindletop Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Spindletop Center operates primarily in the Mental Health Care industry.
Spindletop Center employs approximately 350 people worldwide.
Spindletop Center presently has no subsidiaries across any sectors.
Spindletop Center’s official LinkedIn profile has approximately 721 followers.
Spindletop Center is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, Spindletop Center does not have a profile on Crunchbase.
Yes, Spindletop Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/spindletop-center.
As of January 22, 2026, Rankiteo reports that Spindletop Center has experienced 1 cybersecurity incidents.
Spindletop Center has an estimated 5,280 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notice to victims (pdf) submitted to texas attorney general..
Title: Spindletop Center Ransomware and Data Breach
Description: Spindletop Center, a behavioral health clinic in Texas, experienced a ransomware attack in September 2025, resulting in a data breach that compromised sensitive personal information. The ransomware group Rhysida claimed responsibility and demanded a ransom of 15 bitcoin ($1.65 million).
Date Detected: 2025-09-29
Date Resolved: 2025-12-03
Type: Ransomware, Data Breach
Threat Actor: Rhysida
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Names, Social Security numbers, Government-issued ID numbers, Diagnoses, Case numbers
Systems Affected: Systems and servers were inoperable for a limited time
Downtime: Limited time
Operational Impact: System outage, potential disruption to healthcare services
Brand Reputation Impact: Potential negative impact on brand reputation
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal and health information.

Entity Name: Spindletop Center
Entity Type: Behavioral health clinic
Industry: Healthcare
Location: Beaumont, Texas, USA
Size: 500+ full-time staff, serves 16,000+ patients per year
Customers Affected: 100,000 (claimed by Rhysida, unverified by Spindletop)

Communication Strategy: Notice to victims (PDF) submitted to Texas Attorney General

Type of Data Compromised: Personal and health information
Number of Records Exposed: 100,000 (claimed by Rhysida, unverified)
Sensitivity of Data: High (PII, PHI)
Data Exfiltration: Yes (claimed by Rhysida)
Data Encryption: Yes (ransomware encrypted systems)
Personally Identifiable Information: Names, Social Security numbers, Government-issued ID numbers

Ransom Demanded: 15 bitcoin ($1.65 million)
Ransomware Strain: Rhysida
Data Encryption: Yes
Data Exfiltration: Yes (claimed by Rhysida)

Regulatory Notifications: Submitted to Texas Attorney General

Source: Comparitech

Source: Spindletop Center Notice to Victims (PDF)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Comparitech, and Source: Spindletop Center Notice to Victims (PDF).

Investigation Status: Concluded
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notice to victims (PDF) submitted to Texas Attorney General.

Customer Advisories: Notice to victims (PDF) submitted to Texas Attorney General
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notice to victims (PDF) submitted to Texas Attorney General.
Last Ransom Demanded: The amount of the last ransom demanded was 15 bitcoin ($1.65 million).
Last Attacking Group: The attacking group in the last incident was an Rhysida.
Most Recent Incident Detected: The most recent incident detected was on 2025-09-29.
Most Recent Incident Resolved: The most recent incident resolved was on 2025-12-03.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers, Government-issued ID numbers, Diagnoses and Case numbers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Social Security numbers, Government-issued ID numbers, Diagnoses and Case numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 100.0K.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 15 bitcoin ($1.65 million).
Most Recent Source: The most recent source of information about an incident are Spindletop Center Notice to Victims (PDF) and Comparitech.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Concluded.
Most Recent Customer Advisory: The most recent customer advisory issued was an Notice to victims (PDF) submitted to Texas Attorney General.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.