Ransomware victim disclosure
← All victimss***om****x
Claimed by vect · listed 3 months ago
Status timeline
- Listed
Feb 24, 2026
- Data leaked
At a glance
- Group
- vect
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Feb 24, 2026
About the victim
AI dossier — public-source company profileThe victim operates in the US healthcare sector, based on the ransomware group's classification. The company name is partially redacted, suggesting it may be a clinic, lab, or health services provider. No additional public site content was available to further characterize its scale or specific services.
- Industry
- Healthcare / Medical Records & Testing
Attack summary
Severity: critical — The claimed exfiltration includes highly sensitive regulated health data — specifically HIV test results and medical records — which constitutes protected health information (PHI) under HIPAA, representing a critical privacy and legal exposure for affected individuals.The group 'vect' claims to have exfiltrated sensitive data including PII, client medical records, and HIV test results, with negotiations reportedly ongoing and a deadline of approximately 18 days from the post date.
Data the group says was taken
AI dossier — extracted from the leak post- Personally identifiable information (PII)
- Client medical records
- HIV test results
What the group claims
Status: STATUS: NEGOTIATING | Sector: Healthcare | PII data, clients medical records, and HIV tests | Deadline: 18d 7h
Sources
- Victim sites***om****x.com
Source
Indexed 3 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
