Ransomware victim disclosure
← All victimsProvincial Department of Health Services Sri Lanka
Claimed by kryptos · listed 7 months ago
Status timeline
- Listed
Nov 6, 2025
- Data leaked
At a glance
- Group
- kryptos
- Status
- Data leaked
- Country
- LK
- Sector
- Public Sector
- Listed on leak site
- Nov 6, 2025
About the victim
AI dossier — public-source company profileThe Provincial Department of Health Services, North Western Province (NWP), Sri Lanka, is a government health authority responsible for administering public health services across the North Western Province. It oversees 145 institutions, 439 field clinic centres, and 850 medical officers. The department is headquartered in Kurunegala and manages health facilities across the Kurunegala and Puttalam districts.
- Industry
- Public Health Services
- Address
- Health Complex, Negombo Road, Kurunegala, 60000, Sri Lanka
Attack summary
Severity: critical — The target is a government public health department; the breach involves data from 145 health institutions and hundreds of medical officers, strongly implying exposure of sensitive public health records, staff PII, and potentially patient data at scale — constituting regulated/sensitive data from a critical public sector entity.The ransomware group Kryptos claims to have compromised the Provincial Department of Health Services Sri Lanka, with data reportedly published (disclosed status: data_published). The leak post references operational data spanning 145 institutions, 439 field clinic centres, and 850 medical officers, suggesting exfiltration of organisational and potentially patient/staff records.
Data the group says was taken
AI dossier — extracted from the leak post- Health institution records (145 institutions)
- Field clinic centre data (439 centres)
- Medical officer records (850 officers)
- Departmental operational data
What the group claims
Health Services – 145 Institutions – 439 Field Clinic Centres – 850 Medical Officer
Sources
- Victim sitehealthdept.nw.gov.lk
Source
Indexed 7 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
