Ransomware victim disclosure
← All victimsValley Mountain Regional Center
Claimed by Karakurt · listed 3 years ago
Status timeline
- Listed
Aug 31, 2023
- Data leaked
At a glance
- Group
- Karakurt
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- Aug 31, 2023
- Data size
- 147 GB
About the victim
AI dossier — public-source company profileValley Mountain Regional Center (VMRC) is a California regional center that provides services and support to children and adults with developmental disabilities across Amador, Calaveras, San Joaquin, Stanislaus, and Tuolumne Counties. It offers programs spanning early childhood through adulthood, including self-determination, school-age, and foster grandparent initiatives. The organization operates under California's Lanterman Act framework and is subject to state Department of Developmental Services oversight.
- Industry
- Developmental Disability Services / Social Services
- Address
- Modesto, CA (serves Amador, Calaveras, San Joaquin, Stanislaus, and Tuolumne Counties, California)
Attack summary
Severity: critical — The breach involves confirmed exfiltration of highly sensitive regulated data at scale — medical records and SSNs of a vulnerable population (individuals with developmental disabilities), plus identity documents and financial records — totalling 147 GB, meeting the threshold for critical severity.The Karakurt group claims to have exfiltrated 147 GB of data from Valley Mountain Regional Center, including medical records, passports, Social Security numbers, accounting records, and financial documents, with publication described as imminent.
Data the group says was taken
AI dossier — extracted from the leak post- Medical records
- Passport documents
- Social Security Numbers (SSNs)
- Accounting records
- Financial documents
What the group claims
Valley Mountain Regional Center is a private company that serves children and adults with developmental disabilities. Data: 147GB (medical record, passports, SSNs, accounting, financial documents).Soon.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
