Ransomware victim disclosure
← All victimsCMHA National
Claimed by Avoslocker · listed 3 years ago
Status timeline
- Listed
Dec 26, 2022
- Data leaked
At a glance
- Group
- Avoslocker
- Status
- Data leaked
- Country
- Canada
- Sector
- Healthcare
- Listed on leak site
- Dec 26, 2022
About the victim
AI dossier — public-source company profileThe Canadian Mental Health Association (CMHA) National is Canada's most established mental health organization, providing advocacy, education, research, and direct mental health services across the country. It operates through a federated network of provincial and local chapters serving communities nationwide. CMHA is a non-profit organization with a mandate to support the mental health and well-being of all Canadians.
- Industry
- Mental Health Services & Advocacy
- Employees
- 201-500
- Founded
- 1918
Attack summary
Severity: critical — CMHA National handles sensitive mental health data pertaining to vulnerable individuals, which constitutes regulated personal health information (PHI) under Canadian privacy law (PIPEDA/provincial equivalents). Exfiltration and publication of such data from a national mental health organization represents a critical breach of highly sensitive, regulated data affecting a vulnerable population.Avoslocker claims to have compromised CMHA National and has published data, suggesting exfiltration of organizational data including potentially sensitive client and operational records. The disclosed status indicates data has been published on the group's leak site.
Data the group says was taken
AI dossier — extracted from the leak post- Mental health client records
- Employee personal information
- Organizational financial data
- Advocacy and research documents
- Internal communications
What the group claims
The Canadian Mental Health Association provides mental health services and support. The Association offers advocacy, education, research, and services to person...
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
