Ransomware victim disclosure
← All victimsPruittHealth
Claimed by NoEscape · listed 3 years ago
Status timeline
- Listed
Nov 18, 2023
- Data leaked
At a glance
- Group
- NoEscape
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- Nov 18, 2023
About the victim
AI dossier — public-source company profilePruittHealth is a family-owned post-acute care organization that has operated for more than 50 years across the southeastern United States. The company provides a seamless network of services including skilled nursing care, home health, hospice, and rehabilitation services. It operates numerous facilities primarily across Georgia, North Carolina, South Carolina, and Florida.
- Industry
- Post-Acute & Long-Term Care / Skilled Nursing
- Address
- 4300 Savannah Highway, Tifton, GA 31794, United States
- Employees
- 10000+
- Founded
- 1969
Attack summary
Severity: critical — PruittHealth is a large healthcare provider with thousands of patients and employees; the disclosed_status is 'data_published', confirming exfiltration and public release of what is highly likely to include regulated medical and personal data (HIPAA-covered PHI/PII) at significant scale.NoEscape claims to have exfiltrated data from PruittHealth and has published the data, indicating both potential encryption and confirmed data exfiltration. Given the healthcare sector context, the stolen data likely includes sensitive patient and employee records.
Data the group says was taken
AI dossier — extracted from the leak post- Patient medical records
- Employee personal information
- Financial records
- Insurance and billing data
- Internal business documents
- Personally identifiable information (PII)
What the group claims
A family-owned organization for more than 50 years, PruittHealth provides a seamless network of post-acute care services and resources, offering skilled nursing care, home ...
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
