102 Followers
43 Following
297 Posts
Cyber security researcher and blogger
#InfoSec #DataTheft #Ransomware #DataBreachhttps://www.suspectfile.com

𝐍𝐞𝐩𝐡𝐫𝐨𝐥𝐨𝐠𝐲 𝐀𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐬, 𝐏𝐀: 𝐎𝐯𝐞𝐫 𝟑𝟎,𝟎𝟎𝟎 𝐏𝐚𝐭𝐢𝐞𝐧𝐭𝐬 𝐄𝐱𝐩𝐨𝐬𝐞𝐝 𝐅𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐈𝐧𝐬𝐨𝐦𝐧𝐢𝐚 𝐑𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐀𝐭𝐭𝐚𝐜𝐤

The geographic distribution of patients is particularly noteworthy. While the majority reside in Arkansas, the dataset includes individuals from nearly every other U.S. state. Only five are absent: Delaware, Hawaii, North Dakota, Vermont, and West Virginia. A detail that highlights the broad reach of NAPA’s services over the years.

https://www.suspectfile.com/nephrology-associates-pa-over-30000-patients-exposed-following-insomnia-ransomware-attack/

#Data_Breach #HIPAA #Insomnia #NAPA #Nephrology_Associates_PA #PHI #Ransomware

𝐕𝐢𝐚𝐐𝐮𝐞𝐬𝐭 𝐇𝐢𝐭 𝐛𝐲 𝐀𝐧𝐮𝐛𝐢𝐬 𝐑𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞: 𝟒.𝟏 𝐓𝐁 𝐨𝐟 𝐃𝐚𝐭𝐚 𝐀𝐥𝐥𝐞𝐠𝐞𝐝𝐥𝐲 𝐄𝐱𝐟𝐢𝐥𝐭𝐫𝐚𝐭𝐞𝐝, 𝐎𝐯𝐞𝐫 𝟑𝟕,𝟓𝟎𝟎 𝐏𝐚𝐭𝐢𝐞𝐧𝐭𝐬 𝐚𝐧𝐝 𝟑,𝟗𝟎𝟎 𝐄𝐦𝐩𝐥𝐨𝐲𝐞𝐞𝐬 𝐀𝐟𝐟𝐞𝐜𝐭𝐞𝐝

Even more concerning is the nature of the patient data involved. According to the available information, more than 37,500 individuals who accessed ViaQuest services between 2022 and 2025 may be affected.

https://www.suspectfile.com/viaquest-hit-by-anubis-ransomware-4-1-tb-of-data-allegedly-exfiltrated-over-37500-patients-and-3900-employees-affected/

#Anubis #Data_Breach #HIPAA #PHI #PII #Ransomware #ViaQuest

𝐍𝐨𝐯𝐚: 𝐭𝐡𝐞 𝐫𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐭𝐡𝐚𝐭 𝐩𝐫𝐨𝐦𝐢𝐬𝐞𝐬 𝐢𝐧𝐯𝐢𝐬𝐢𝐛𝐢𝐥𝐢𝐭𝐲, 𝐬𝐞𝐥𝐥𝐬 𝐬𝐞𝐫𝐯𝐢𝐜𝐞𝐬, 𝐚𝐧𝐝 𝐭𝐡𝐫𝐞𝐚𝐭𝐞𝐧𝐬 𝐭𝐡𝐨𝐬𝐞 𝐰𝐡𝐨 𝐛𝐞𝐭𝐫𝐚𝐲 𝐢𝐭

In its response, Nova openly states its willingness to offer rewards to identify individuals responsible for information leaks, going as far as referencing personal retaliation, exposure of family members, and severe consequences. This is not merely aggressive rhetoric; it is a calculated message of intimidation directed both internally and externally.

https://www.suspectfile.com/nova-the-ransomware-that-promises-invisibility-sells-services-and-threatens-those-who-betray-it/

#Enma #Interview #Katana
#Nova #Ransomware

𝐃𝐫𝐚𝐠𝐨𝐧𝐅𝐨𝐫𝐜𝐞 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰: “𝐇𝐮𝐦𝐚𝐧 𝐅𝐚𝐜𝐭𝐨𝐫 𝐈𝐬 𝐭𝐡𝐞 𝐊𝐞𝐲 𝐭𝐨 𝐄𝐯𝐞𝐫𝐲 𝐀𝐭𝐭𝐚𝐜𝐤”

The interview with DragonForce provides a direct insight into an operational model that, while evolving, continues to rely on well-established dynamics within the ransomware landscape: decentralization, collaboration with external actors, and the systematic exploitation of organizational weaknesses.

https://www.suspectfile.com/dragonforce-interview-human-factor-is-the-key-to-every-attack/

#DragonForce #Interview #RaaS #Ransomware

𝐍𝐨 𝐄𝐧𝐜𝐫𝐲𝐩𝐭𝐢𝐨𝐧, 𝐉𝐮𝐬𝐭 𝐄𝐱𝐩𝐨𝐬𝐮𝐫𝐞: 𝐒𝐢𝐥𝐞𝐧𝐭 𝐑𝐚𝐧𝐬𝐨𝐦 𝐆𝐫𝐨𝐮𝐩 𝐓𝐚𝐫𝐠𝐞𝐭𝐬 𝐋𝐚𝐰 𝐅𝐢𝐫𝐦𝐬

The absence of encryption also fundamentally changes the nature of the attack. Without the immediate operational disruption caused by locked systems, victims may initially underestimate the severity of the breach.

https://www.suspectfile.com/no-encryption-just-exposure-silent-ransom-group-targets-law-firms/

#Data_Breach #Law_Firms #Orrick #Silent #Silent_Ransom_Group

𝐁𝐫𝐨𝐜𝐤𝐭𝐨𝐧 𝐇𝐨𝐬𝐩𝐢𝐭𝐚𝐥 𝐜𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤: 𝐀𝐧𝐮𝐛𝐢𝐬 𝐧𝐚𝐦𝐞𝐬 𝐯𝐢𝐜𝐭𝐢𝐦 𝐩𝐮𝐛𝐥𝐢𝐜𝐥𝐲 𝐚𝐧𝐝 𝐥𝐚𝐮𝐧𝐜𝐡𝐞𝐬 𝐜𝐨𝐮𝐧𝐭𝐝𝐨𝐰𝐧, 𝐧𝐞𝐰 𝐝𝐞𝐭𝐚𝐢𝐥𝐬 𝐞𝐦𝐞𝐫𝐠𝐞

The Brockton Hospital, a key facility within the Signature Healthcare network, is at the center of a cyberattack claimed by the ransomware group Anubis, which after contacting SuspectFile directly has now made the operation public on its blog.

https://www.suspectfile.com/brockton-hospital-cyberattack-anubis-names-victim-publicly-and-launches-countdown-new-details-emerge/

#Anubis #Brockton_Hospital #Data_Breach #HIPAA #Ransomware #Signature_Healthcare

𝐂𝐫𝐲𝐩𝐭𝐨 𝐏𝐡𝐢𝐬𝐡𝐢𝐧𝐠 𝐚𝐧𝐝 𝐭𝐡𝐞 𝐇𝐮𝐦𝐚𝐧 𝐋𝐚𝐲𝐞𝐫: 𝐓𝐡𝐞 𝐑𝐞𝐚𝐥 𝐖𝐞𝐚𝐤𝐧𝐞𝐬𝐬 𝐈𝐬 𝐏𝐞𝐨𝐩𝐥𝐞

In this context, phishing has fundamentally changed. It is no longer a generic and easily recognizable attempt, but a targeted operation built around the individual.

https://www.suspectfile.com/crypto-phishing-and-the-human-layer-the-real-weakness-is-people/

#Baited #Exploits #Human_error #OSINT #Phishing

I am a big fan of BakerHostetler's annual data security incident response reports because they are based on actual client experiences and data.

I just posted about their 2026 report, and commented on their healthcare sector data. As I had mentioned to @siguza, healthcare breaches tend to get higher ransom demands and higher settlements. Take a look at the 2025 data -- the highest initial ransom demand for a health entity client was $98M.

I'd love to know who the victim was and what TA or group demanded that much.

That said, the highest ransom actually paid for a healthcare sector breach by one of their clients last year was $5M.

Big delta.

My post: https://databreaches.net/2026/04/03/bakerhostetlers-2026-report-findings-from-1250-clients-breach-experiences-in-2025/

#ransomware #healthsec #incidentresponse #statistics #phishing #ransom #malware #databreach #cybersecurity

@campuscodi @amvinfe

𝐍𝐨𝐯𝐚 𝐑𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞: 𝐛𝐞𝐭𝐰𝐞𝐞𝐧 𝐩𝐫𝐨𝐩𝐚𝐠𝐚𝐧𝐝𝐚, 𝐭𝐡𝐫𝐞𝐚𝐭𝐬, 𝐚𝐧𝐝 𝐜𝐨𝐧𝐭𝐫𝐚𝐝𝐢𝐜𝐭𝐢𝐨𝐧𝐬 – 𝐰𝐡𝐚𝐭 𝐞𝐦𝐞𝐫𝐠𝐞𝐬 𝐟𝐫𝐨𝐦 𝐝𝐢𝐫𝐞𝐜𝐭 𝐢𝐧𝐭𝐞𝐫𝐚𝐜𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐭𝐡𝐞 𝐠𝐫𝐨𝐮𝐩

Nova claims to have targeted dozens of organizations and to have conducted negotiations with numerous companies, many of which have allegedly never become public. The group insists that many victims prefer silence to avoid reputational damage.

https://www.suspectfile.com/nova-ransomware-between-propaganda-threats-and-contradictions-what-emerges-from-direct-interaction-with-the-group/

#Interview #Katana #Nova #RaaS #Ransomware

𝐏𝐮𝐛𝐥𝐢𝐬𝐡𝐞𝐫𝐬 𝐂𝐥𝐞𝐚𝐫𝐢𝐧𝐠 𝐇𝐨𝐮𝐬𝐞: 𝐑𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐀𝐭𝐭𝐚𝐜𝐤, 𝐁𝐚𝐧𝐤𝐫𝐮𝐩𝐭𝐜𝐲, 𝐚𝐧𝐝 𝐭𝐡𝐞 𝐂𝐨𝐥𝐥𝐚𝐩𝐬𝐞 𝐨𝐟 𝐓𝐫𝐮𝐬𝐭

Between late February and early March 2026, #PCH reportedly became the target of a ransomware operation attributed to the group #Anubis, active in the double-extortion ecosystem.

https://www.suspectfile.com/publishers-clearing-house-ransomware-attack-bankruptcy-and-the-collapse-of-trust/

#ARB #Data_Breach #FTC #PII #Ransomware