Ransomware victim disclosure
← All victimsCrace Medical Centre
Claimed by Knight · listed 2 years ago
Status timeline
- Listed
Dec 16, 2023
- Data leaked
At a glance
- Group
- Knight
- Status
- Data leaked
- Country
- Australia
- Sector
- Healthcare
- Listed on leak site
- Dec 16, 2023
- Data size
- 30 GB
About the victim
AI dossier — public-source company profileCrace Medical Centre is a general practice medical centre located in Crace, ACT, Australia. It supports independent GPs who provide mixed-billing primary care services to patients across a wide range of medical needs. The centre operates seven days a week including after-hours, serving a local residential community.
- Industry
- General Practice & Primary Healthcare
- Address
- Shop 2 Crace Central, Crace ACT 2911, Australia
- Employees
- 1-10
Attack summary
Severity: critical — A healthcare provider has had 30 GB of data exfiltrated from clinical and administrative systems, with status listed as data_published. The data almost certainly contains regulated patient health information (medical records, PII) at a primary care practice, constituting a critical breach of sensitive personal and medical data under Australian Privacy Act obligations.The Knight ransomware group claims to have exfiltrated 30 GB of data from Crace Medical Centre's internal network, including data from multiple doctor workstations, servers, and reception systems, and is threatening to release sensitive data if management does not engage in their chat.
Data the group says was taken
AI dossier — extracted from the leak post- Doctor workstation files (DOCTOR1–DOCTOR7)
- Server data (SERVER, SERVERB)
- Reception system files (RECEPTION1, RECEPTION2)
- Remote access data (REMOTE)
- Patient records (inferred from healthcare context)
- Sensitive clinical/administrative data
What the group claims
30 GB of data. We wait you in the chat.Phone: (02) 6241 0249.Oops, what's all this about? "Nothing happened?", "What do you want us to do?".You have "polite" reception staff. Wait for management in the chat room or we'll start releasing sensitive data from your sources.REMOTE:SERVER:DOCTOR2:DOCTOR1:DOCTOR6:SERVERB:DOCTOR5:REMOTE:RECEPTION1:RECEPTION2:DOCTOR3:DOCTOR7:SERVERB:
Sources
Source
Indexed 2 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
