Ransomware victim disclosure
← All victimsGastrointestinal Associates
listed as Gihealthcare · Claimed by Cuba · listed 3 years ago
Status timeline
- Listed
May 4, 2023
- Data leaked
At a glance
- Group
- Cuba
- Status
- Data leaked
- Country
- United States
- Sector
- Healthcare
- Listed on leak site
- May 4, 2023
About the victim
AI dossier — public-source company profileGastrointestinal Associates (GIA) is a specialty medical practice based in Knoxville, Tennessee, operating since 1971. It provides comprehensive gastroenterology services including colonoscopy, endoscopy, liver and pancreatic disorder treatment, and weight loss programs across three locations in Knox County. GIA also operates associated endoscopy centers and conducts clinical trials.
- Industry
- Gastroenterology & Digestive Health Medical Practice
- Address
- 1311 Dowell Springs Boulevard, Knoxville, TN 37909
- Employees
- 51-200
- Founded
- 1971
Attack summary
Severity: critical — The victim is a healthcare provider holding protected health information (PHI) and PII for a large patient population; the Cuba group has published the data, confirming exfiltration of regulated medical records subject to HIPAA.The Cuba ransomware group claims a disclosed attack against Gastrointestinal Associates, with data published, indicating exfiltration of patient and/or business data from the healthcare provider. No specific ransom amount or data volume was stated, but the disclosed status confirms data has been published.
Data the group says was taken
AI dossier — extracted from the leak post- Patient health records
- Personal identifiable information (PII)
- Medical history and diagnoses
- Financial/billing records
- Provider and staff information
- Clinical trial data
What the group claims
Your health is our top priority. We specialize in digestive system care and will guide you through every step – whether it’s a routine colon screening, major liver or pancreas issue, or a weight loss journey. With three...
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
