Powered by MOMENTUM MEDIA
cyber daily logo

Powered by MOMENTUMMEDIA

Breaking news and updates daily. Subscribe to our Newsletter

Exclusive: Sydney medical practice cyber incident claimed by INC Ransom

Threat actors have claimed a ransomware attack against an Australian medical imaging firm, claiming to have exfiltrated sensitive data.

user icon Daniel Croft
Tue, 14 Jan 2025
Sydney medical practice cyber incident claimed by INC Ransom
expand image

INC Ransom listed independent radiology practice Spectrum Medical Imaging on its dark web blog this week, threatening to publish exfiltrated data in four days.

According to the listing, INC Ransom has exfiltrated financial and customer data, a claim that the group has backed up with sample screenshots, which include documents with names, medical information and more.

Speaking with Cyber Daily, Spectrum Medical Imaging said that it was unaware of the incident and had not been contacted by the group.

It also said that in the event of a ransomware incident, its policy is not to pay.

This is an ongoing story. Cyber Daily will provide updates as the incident develops.

INC Ransom has listed a number of Australian organisations over the last few months. In November, the group listed the Victorian laser-cutting firm AC Laser.

Speaking with Cyber Daily, AC Laser confirmed the incident, saying that two months prior to the listing, it detected unauthorised activity on its network.

“Close to two months ago, a breach was detected in the early morning,” said a company spokesperson.

“Whilst it was still in progress, our companies’ servers and systems were all immediately disconnected, interrupting the hack.

“With the help of IT specialists and a comprehensive backup procedure, we were able to fully recover all data.”

Despite the incident occurring in September, INC Ransom listed the Aussie firm on its dark web leak site on 23 November.

While it did not specify what was allegedly exfiltrated in the incident, it posted a sample of the company’s data, which largely contained internal business documents such as tax invoices, meeting minutes, analytics, and file trees.

One sample document showed names, email addresses, mobile numbers and work phone numbers.

That same month, ATF Services confirmed that INC Ransom had breached its network and exfiltrated one terabyte of data.

The gang listed ATF as a victim on its darknet leak site on 23 November, when it shared details of the hack and several documents to prove its claim.

“We have 1 TB data of this company,” a spokesperson for the gang said, alongside the proof-of-hack documents.

These include screenshots of file structures and folders, internal contact lists, loan and tax documents, details of debtors and creditors, customer data, and earnings forecasts.

INC Ransom has not listed a ransom demand nor a ransom deadline. According to a counter on the leak site, the details of the hack have been viewed 400 times at the time of writing.

ATF Services has confirmed that it is aware of the incident.

“ATF Services is aware of a recent cyber incident that occurred in early October 2024,” an ATF Services spokesperson told Cyber Daily.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.