DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.

Posted on June 19, 2025 by Dissent

Today’s post is a reminder why maybe we should all wait a bit before just repeating criminals’ claims about an attack.

The group known as World Leaks recently added Freedman Healthcare to their leak site, claiming to have acquired 52.4 GB of data comprising more than 42,000 files. Some news sites reporting on the listing used words like “ransomware” and “patient data” or “e-health data.”

None of those descriptions was really accurate and World Leaks never claimed to have acquired patient data or “e-health” data.

When World Leaks first added Freedman to its site, DataBreaches sent a contact form inquiry to Freedman asking if they had confirmed that there had been any breach, and if so, whether protected health information (PHI) of patients was involved. No reply was immediately received.

When World Leaks subsequently added the ability to see directories and filenames, DataBreaches sent a second contact form inquiry to Freedman.

And then we waited. Others published, but based on what we saw when we scrolled filenames and folder names, we waited because we had seen no clear indication that patient data was leaked.

Freedman responded to our inquiries by email the following day. John Freedman, CEO of Freedman Healthcare wrote, “Who are you?” And that was all he wrote.

Fighting the impulse to get distracted by the existential question, DataBreaches answered his question, observed that there was a lot of sensitive personnel information such as W-2’s in the data tranche, and then added another question to the inquiries we had sent:

I also saw a purchase order for $100k in BTC from May of 2022, reportedly for a ransomware payment. Were you the victim of a ransomware attack in 2022?

He did not reply to that, either. But he did send Cybernews a statement in response to their earlier reporting. His statement included, in bold face, a statement that “no health data was compromised in this incident.”

Rather than just updating or apologizing for any possible errors in previous coverage, Cybernews decided to try to salvage some story by writing, “The problem here is that Freedman’s declaration, while possibly true, does not account for the other 52.4 GB of sensitive data claimed by the cybercriminals – and published on the gang’s dark leak site as promised, also on Tuesday.”

Cybernews’ second report on the incident contains what appears to be some accurate descriptions of data in the leak. DataBreaches had also found years’ worth of employee salary and tax information as well as other internal documents. But as Freedman told Cybernews, the incident did not appear to involve any protected health information of patients, even though Cybernews tries to raise the possibility of misuse of what was leaked to enable access to patient data.

Addressing other inaccuracies in reports circulating about the attack on Freedman Healthcare, DataBreaches would note:

  1. This was not a ransomware attack and World Leaks does not describe themselves as a “ransomware” gang or group.” World Leaks reportedly broke away from Hunters International because World Leaks did not want to use ransomware, as a spokesperson told DataBreaches in a recent chat. Whether the individuals involved in World Leaks had previously been involved in Hunters’ devastating ransomware attacks on medical entities is unknown to DataBreaches.
  2. Freedman’s statement does not indicate there was any encryption or ransomware involved.  But since Freedman’s statement to Cybernews mentioned “malicious files,” DataBreaches has reached out to World Leaks to confirm the nature of the “malicious” files and will update this post if a reply is received.
  3. Hunters International had reportedly planned to stop using ransomware and to go to an exfiltration-extortion model only, re-branding as World Leaks. Some sites report that they did abandon using ransomware, but if one simply looks at their leak site, it is clear that Hunters International is still encrypting some of their victims.

But the bottom line is that this appears to be an attack that resulted in the leak of employees’ financial and other information (PII), as well as internal and business files of Freedman, but not patient data or PHI.

If Freedman answers this site’s question about the purchase of BTC in 2022 presumably to pay for a ransomware attack, this post will be updated.

 

 

Category: Commentaries and Analyses

Post navigation

← Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
Ireland’s Data Protection Commission publishes 2024 Annual Report →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed (1)
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.