Saint Mary’s Home of Erie Data Breach
Status: Confirmed
Breach Intelligence Summary
Entity: Saint Mary’s Home of Erie · Actor: WorldLeaks · Source: DataBreach.com / ObscureIQ intelligence
Attack: Data Exfiltration via Under investigation
Timeline: Breach (Oct, 2025) · Reported (Oct, 2025) · Leak (Oct, 2025)
Exposure: 71K+ records · Social Security Number, Email, Phone Number, Name, Home Address
Status: Confirmed · Risk: High (Identity theft + Phishing / SIM swap)
Summary
Saint Mary’s Home of Erie says it is investigating a data-privacy incident . The organization’s notice , published October 24 2025 states that files on certain servers “may have been accessible” to outsiders between August 26 and August 28 2025 after the issue was discovered on August 27 2025 . Worldleaks has publicly claimed responsibility . The notice does not specify the intrusion method., Snapshot
Company: Saint Mary’s Home of Erie – healthcare/long-term care Erie Pennsylvania Incident window: , Aug 26-28 2025 (per company) Vector: , Unknown (not specified) Threat actor: Worldleaks Data exposed: Not specified by the company; see our parsing below Affected: , Undisclosed (official count not published) Disclosure/notice: Oct 24 2025 (company notice) Status:, Investigation and notifications in progress
What happened According to the organization’s notice Saint Mary’s identified a potential issue on August 27 2025 and later determined that files and folders on certain servers may have been accessible over a roughly two-day period ( Aug 26-28 ). The notice doesn’t describe how access was obtained or whether data were exfiltrated. Who’s behind it Worldleaks posted a claim of responsibility. As of publication the company has not attributed the attack nor described technical details tying the incident to the group. Treat the claim as the actor’s assertion unless and until the company or forensics corroborate. What was breached The organization hasn’t listed specific data elements. DataBreach.com parsing: 70 600 unique emails 41 900 unique phones 38 300 unique home addresses 5 400 unique SSNs Latest related dump observed: 2025-08-27 .
Distinct value counts may overlap across individuals.
Aug 26-28 2025: Files/folders may have been accessible (company) Aug 27 2025: Discovery (company) Oct 3-4 2025: Worldleaks posts claim Oct 24 2025:, Company publishes notice
Company response Saint Mary’s says it secured the environment engaged external forensics and is notifying impacted individuals and regulators. The notice includes consumer guidance on credit reports fraud alerts, and freezes; credit-monitoring specifics were not listed in the notice reviewed.
About Saint Mary’s Home of Erie
Saint Mary’s Home of Erie is the organization affected by this breach. User data may have been generated through account creation, service usage, or business operations.
If you have interacted with Saint Mary’s Home of Erie in any capacity, your data may be included in this breach.
Threat Actor: WorldLeaks
This breach has been attributed to WorldLeaks. The group is known for data theft campaigns targeting organizations through various intrusion methods.
- Under investigation
Breach Exploitation Status
High
Status
Detected
Possible
Detected
Possible
Unknown
Indefinite (critical identifiers)
SSNs and government IDs never expire. This data can be used for identity theft years or decades after exposure.
Data Points Exposed
Dark Web Verification
Status: Confirmed
- Dataset containing approximately 71K+ records has been identified in breach intelligence sources.
- The data is indexed and searchable across breach notification platforms.
Impact
This breach carries high risk due to the nature of exposed data fields and the scale of affected records.
- Targeted phishing referencing Saint Mary’s Home of Erie accounts or services
- Identity theft using exposed Social Security Numbers
- SIM-swap attempts where phone numbers are present
- Physical mail scams and address-based identity verification fraud
- Data broker enrichment and resale
Recommendations for Impacted Individuals
If you believe your information may be included:
Non-clients may request a breach impact review.
Saint Mary’s Home of Erie account updates
Password reset requests
Verify directly through official channels.
Email compromise is often the first pivot point.
Frequently Asked Questions
In Oct, 2025, Saint Mary’s Home of Erie experienced a data breach that resulted in the exposure of approximately 71K+ records containing personal information.
The exposed data includes Social Security Number, Email, Phone Number, Name, Home Address.
Approximately 71K+ records were affected based on current breach intelligence.
Yes. This breach is treated as confirmed based on data observed in breach intelligence platforms.
Data circulation has been detected across breach-sharing channels. Downstream exploitation risk exists based on the nature of the exposed fields.
Rotate passwords associated with Saint Mary’s Home of Erie, enable multi-factor authentication on email and financial accounts, and monitor for suspicious activity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed. Free forever.
High-Risk? Get an Exposure Audit
Executives, public figures, and high-net-worth individuals face elevated risk. Our team provides full-spectrum exposure audits and threat monitoring.
Corporate Accountability
Organizations that collect personal data have a duty to implement reasonable safeguards and to notify affected individuals when breaches occur.
Scope assessments may evolve as investigations continue. Users should not rely solely on early estimates when making risk decisions.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Saint Mary’s Home of Erie
- Or simply concerned about credential reuse
We can confirm whether your information is circulating and evaluate downstream threat vectors.
