Ransomware victim disclosure
← All victimsRéseau Radiologique Romand
Claimed by akira · listed 13 days ago
Status timeline
- Listed
May 8, 2026
- Data leaked
At a glance
- Group
- akira
- Status
- Data leaked
- Country
- CH
- Sector
- Healthcare
- Listed on leak site
- May 8, 2026
About the victim
AI dossier — public-source company profileRéseau Radiologique Romand (3R) is a Swiss medical imaging network operating in the Romandy region of Switzerland. The organization partners with local hospitals and medical groups to provide diagnostic imaging services, leveraging advanced technology to rapidly distribute detailed medical images to referring physicians. It functions as a coordinated radiology network serving both patients and healthcare providers.
- Industry
- Medical Imaging & Radiology Services
Attack summary
Severity: critical — The disclosed dataset includes regulated patient medical records and PII at scale (a healthcare network), employee identity documents, and payment details — multiple categories of sensitive/regulated data across both patients and staff, with 48 GB of data stated for imminent publication.Akira claims to have exfiltrated approximately 48 GB of corporate data from Réseau Radiologique Romand, encompassing employee personal identification documents, patient personal and medical information, payment details, and NDAs; the data has been marked as pending publication ('will upload soon').
Data the group says was taken
AI dossier — extracted from the leak post- Employee passport copies
- Employee driver's licences
- Employee ID documents
- Employee personal information
- Patient contact information (phone, addresses)
- Patient medical information
- Payment details
- NDAs / confidential agreements
What the group claims
3R - R©seau Radiologique Romand is a Swiss medical imaging network that helps patients get clea r, comfortable medical scans. They work with local hospitals and medical groups, using advanced technology to quickly share detailed images with doctors. We will upload 48gb of corporate data soon. Detailed employee personal information (passport, D Ls, IDs and other personal information), patient information (phone, addresses, medical info an d so on), payment details, NDAs and so on.
Source
Indexed 13 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
