Ransomware victim disclosure
← All victimsAviacode (GeBBS)
Claimed by 0Mega · listed 3 years ago
Status timeline
- Listed
Feb 12, 2023
- Data leaked
At a glance
- Group
- 0Mega
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- Feb 12, 2023
About the victim
AI dossier — public-source company profileAviacode, a GeBBS Healthcare Solutions company, is a US-based provider of medical coding, outsourced coding, auditing, and consulting services to healthcare organizations. GeBBS Healthcare Solutions is a global healthcare information management company headquartered in the United States with significant offshore operations. The combined entity serves hospitals, physician groups, and health systems with revenue cycle and HIM services.
- Industry
- Healthcare IT & Medical Coding Services
- Employees
- 1001-5000
- Founded
- 2004
Attack summary
Severity: critical — Aviacode/GeBBS operates in healthcare medical coding and auditing, meaning exfiltrated data almost certainly contains protected health information (PHI) and personally identifiable information (PII) of patients at scale, which constitutes regulated sensitive data under HIPAA. Data has been confirmed published.The 0Mega ransomware group claims to have attacked Aviacode (GeBBS) and has published data, indicating confirmed exfiltration of company data related to medical coding, auditing, and consulting operations. The disclosed status of 'data_published' suggests sensitive files have been made available on the group's leak site.
Data the group says was taken
AI dossier — extracted from the leak post- Medical coding records
- Outsourced coding data
- Auditing documentation
- Consulting files
- Healthcare client data
What the group claims
Medical coding, outsourced coding, auditing & consulting
Sources
- Victim sitegebbs.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
