Ransomware victim disclosure
← All victimsAria Care Partners
Claimed by Trigona · listed 3 years ago
Status timeline
- Listed
Oct 1, 2023
- Data leaked
At a glance
- Group
- Trigona
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- Oct 1, 2023
About the victim
AI dossier — public-source company profileAria Care Partners is a healthcare provider headquartered in Overland Park, Kansas, founded in 2016. The company specializes in post-acute care services including transitional care, home health, and hospice care. It focuses on delivering customized care plans to help patients recover, regain independence, and improve quality of life.
- Industry
- Post-Acute & Home Health Care Services
- Address
- Overland Park, KS, United States
- Founded
- 2016
Attack summary
Severity: critical — Aria Care Partners is a healthcare provider handling sensitive patient medical data including post-acute, hospice, and home health records. The status is 'data_published', confirming exfiltration and public disclosure of what is likely regulated health information (PHI/PII) subject to HIPAA, representing a critical data breach.The Trigona ransomware group claims to have attacked Aria Care Partners and has published data related to the incident, as indicated by the disclosed status of 'data_published'. No specific ransom amount or data size has been stated.
Data the group says was taken
AI dossier — extracted from the leak post- Patient health records
- Care plan documentation
- Personal identifiable information (PII)
- Internal business data
What the group claims
Aria Care Partners is a healthcare provider that offers post-acute care services to patients in Kansas. It was founded in 2016 and is headquartered in Overland Park, KS. Company specializes in post-acute care services such as transitional care, home health, and hospice care. It aims to provide customized care plans to help patients recover, regain independence, and improve their quality of life.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
