Ransomware victim disclosure
← All victimsWest Virginia Primary Care Association
listed as WVPCA · Claimed by bravox · listed 3 months ago
Status timeline
- Listed
Feb 11, 2026
- Data leaked
At a glance
- Group
- bravox
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Feb 11, 2026
About the victim
AI dossier — public-source company profileThe West Virginia Primary Care Association (WVPCA) is a nonprofit organization founded in 1983 that supports and develops a network of over 550 Community Health Center sites across West Virginia. It provides programs and services in areas including clinical care, health information technology, outreach, quality improvement, and substance use disorder services. WVPCA-supported centers served over 580,000 patients in 2024–2025, representing approximately one-third of West Virginians.
- Industry
- Community Health Center Support & Primary Care Advocacy
- Founded
- 1983
Attack summary
Severity: high — WVPCA is a healthcare-sector nonprofit handling data related to community health centers serving hundreds of thousands of patients; data published status confirms exfiltration occurred, and the potential for regulated health-related or PII data exposure at scale warrants a high severity rating.The ransomware group Bravox claims to have attacked WVPCA and has published data (disclosed status: data_published), suggesting exfiltration of organizational data from a healthcare-adjacent nonprofit supporting community health centers across West Virginia. No ransom amount or specific data volume was stated in the post.
Data the group says was taken
AI dossier — extracted from the leak post- Organizational records
- Member/health center data
- Patient outreach and enrollment information
- Health information and technology records
- Staff and leadership information
What the group claims
An organization that supports and develops a network of community health centers throughout West Virginia.
Sources
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
