Ransomware victim disclosure
← All victimsBestat Pharmaservices Corp.
Claimed by worldleaks · listed 8 days ago
Status timeline
- Listed
May 12, 2026
- Data leaked
At a glance
- Group
- worldleaks
- Status
- Data leaked
- Country
- TW
- Sector
- Healthcare
- Listed on leak site
- May 12, 2026
About the victim
AI dossier — public-source company profileBestat Pharmaservices Corp. is a Taiwan-based contract research organization (CRO) offering a full suite of clinical trial support services including project management, regulatory consultation, site monitoring, data management, biostatistics, clinical event committee services, medical writing, and quality assurance. The company serves pharmaceutical and medical device clients navigating clinical development and post-marketing studies. It operates under international GxP standards and handles both electronic and paper-based clinical data collection systems.
- Industry
- Clinical Research & Pharmaceutical Services (CRO)
Attack summary
Severity: critical — Bestat operates as a CRO handling sensitive clinical trial data including patient-level health information, eCRFs, and regulated pharmaceutical records. A confirmed data publication event in this sector carries a high likelihood of exposure of regulated medical and PII data at scale, warranting a critical classification.The worldleaks ransomware group has listed Bestat Pharmaservices Corp. with a status of 'data_published', indicating that data has been exfiltrated and disclosed; no specific ransom demand or data volume was stated, and the group's leak post contained no additional detail.
Data the group says was taken
AI dossier — extracted from the leak post- Clinical trial data
- Electronic case report forms (eCRFs)
- Statistical analysis files
- Regulatory submission documents
- Quality assurance audit records
- Medical writing documents
- Patient recruitment records
- Study protocols
Original description
AI-summarised, not from the leak postN/A
Sources
Source
Indexed 8 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
