[BABUK] – Ransomware Victim: APMS ( Advanced Physician Management Service LLC

image

Ransomware Group: BABUK

VICTIM NAME: APMS ( Advanced Physician Management Service LLC

NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the BABUK Onion Dark Web Tor Blog page.


AI Generated Summary of the Ransomware Leak Page

The ransomware leak page reveals information about Advanced Physician Management Services LLC (APMS), a healthcare management company located in Jenkintown, Pennsylvania. This company specializes in medical billing, personnel management, and other essential administrative operations that support healthcare facilities. APMS operates with a modest team of approximately 15 employees and generates an annual revenue of $4.3 million. The compromising data highlights how the company’s operational efficiency is critical to healthcare providers, allowing them to focus on delivering quality patient care.

Furthermore, the leak boasts the availability of over 21 GB of sensitive information that includes employee data and patient information, such as dates of birth and confidential identifiers. The extracted dataset reportedly encompasses various documents, including payment scans, lab test results, medical records, and internal financial documents. Such leaks can pose significant risks to individuals and the company’s operational integrity. The page suggests that interested parties may click a link to gain access to this information, although download links were not explicitly present. Additionally, there is an image included that presumably provides further context regarding the leaked data.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.