Ransomware victim disclosure
← All victimsAtherfield Medical Service
Claimed by cyclops · listed 3 years ago
Status timeline
- Listed
Jul 1, 2023
- Data leaked
At a glance
- Group
- cyclops
- Status
- Data leaked
- Country
- Australia
- Sector
- Healthcare
- Listed on leak site
- Jul 1, 2023
About the victim
AI dossier — public-source company profileAtherfield Medical Service is an accredited general practice that has been providing healthcare in the Yass region of New South Wales, Australia, for over 100 years. The practice operates under the banner of Atherfield Medical and Skin Cancer Clinic, offering general practitioner and skin cancer clinic services to the local community.
- Industry
- General Practice & Primary Healthcare
- Address
- Yass region, New South Wales, Australia
Attack summary
Severity: critical — Data has been published (disclosed status: data_published) and the victim is a healthcare provider; exfiltrated data almost certainly contains regulated sensitive patient medical records and PII at scale, consistent with critical severity.The Cyclops ransomware group claims to have exfiltrated data from Atherfield Medical Service and has published a download link to a ZIP archive purportedly containing the stolen data, with no ransom amount stated.
Data the group says was taken
AI dossier — extracted from the leak post- Patient medical records
- General practice clinical data
- Skin cancer clinic records
- Potentially identifiable patient information (PII)
The group's post references roughly 1 proof file.
What the group claims
Hospitals & Physicians Clinics · AustraliaAtherfield Medical Service has been providing health care in the Yass region for over 100 years. They are an accredited general practice.Data:===========https://anonfiles.com/E5o3h8z2z4/Atherfield_Medical_and_Skin_Cancer_Clinic_Data_zip
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
