[EVEREST] – Ransomware Victim: Pureform Radiology Center

image

Ransomware Group: EVEREST

VICTIM NAME: Pureform Radiology Center

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the EVEREST Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page associated with Pureform Radiology Center indicates a significant breach of data culminating in the theft of medical records and internal documents. The post asserts that the breach occurred in Canada and highlights a notable discovery of a zero-day exploit in the software of Synthesis Health, the company that acquired Pureform. According to the extract, the ransom group claims to have access to medical records of over 10 million patients, emphasizing the gravity of the data compromised. There is an implication that the president of Pureform engaged a recovery negotiator who was not adequately equipped to manage the situation, adding another layer of complexity to the breach.

The leak page also mentions that the upcoming data release will consist of more than 150 GB of medical records along with insights into the vulnerabilities of the software involved. Additionally, it details compliance obligations that Synthesis claims to adhere to, including HIPAA and PIPEDA standards, which underscores the potential regulatory consequences of the breach. The presence of a download link for the leaked data has been reported, though the specifics have not been disclosed for security reasons. The page includes one image, presumably related to the incident, contributing to the alarming portrayal of the breach within the cybersecurity community.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.