DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.

Posted on June 19, 2025 by Dissent

Today’s post is a reminder why maybe we should all wait a bit before just repeating criminals’ claims about an attack.

The group known as World Leaks recently added Freedman Healthcare to their leak site, claiming to have acquired 52.4 GB of data comprising more than 42,000 files. Some news sites reporting on the listing used words like “ransomware” and “patient data” or “e-health data.”

None of those descriptions was really accurate and World Leaks never claimed to have acquired patient data or “e-health” data.

When World Leaks first added Freedman to its site, DataBreaches sent a contact form inquiry to Freedman asking if they had confirmed that there had been any breach, and if so, whether protected health information (PHI) of patients was involved. No reply was immediately received.

When World Leaks subsequently added the ability to see directories and filenames, DataBreaches sent a second contact form inquiry to Freedman.

And then we waited. Others published, but based on what we saw when we scrolled filenames and folder names, we waited because we had seen no clear indication that patient data was leaked.

Freedman responded to our inquiries by email the following day. John Freedman, CEO of Freedman Healthcare wrote, “Who are you?” And that was all he wrote.

Fighting the impulse to get distracted by the existential question, DataBreaches answered his question, observed that there was a lot of sensitive personnel information such as W-2’s in the data tranche, and then added another question to the inquiries we had sent:

I also saw a purchase order for $100k in BTC from May of 2022, reportedly for a ransomware payment. Were you the victim of a ransomware attack in 2022?

He did not reply to that, either. But he did send Cybernews a statement in response to their earlier reporting. His statement included, in bold face, a statement that “no health data was compromised in this incident.”

Rather than just updating or apologizing for any possible errors in previous coverage, Cybernews decided to try to salvage some story by writing, “The problem here is that Freedman’s declaration, while possibly true, does not account for the other 52.4 GB of sensitive data claimed by the cybercriminals – and published on the gang’s dark leak site as promised, also on Tuesday.”

Cybernews’ second report on the incident contains what appears to be some accurate descriptions of data in the leak. DataBreaches had also found years’ worth of employee salary and tax information as well as other internal documents. But as Freedman told Cybernews, the incident did not appear to involve any protected health information of patients, even though Cybernews tries to raise the possibility of misuse of what was leaked to enable access to patient data.

Addressing other inaccuracies in reports circulating about the attack on Freedman Healthcare, DataBreaches would note:

  1. This was not a ransomware attack and World Leaks does not describe themselves as a “ransomware” gang or group.” World Leaks reportedly broke away from Hunters International because World Leaks did not want to use ransomware, as a spokesperson told DataBreaches in a recent chat. Whether the individuals involved in World Leaks had previously been involved in Hunters’ devastating ransomware attacks on medical entities is unknown to DataBreaches.
  2. Freedman’s statement does not indicate there was any encryption or ransomware involved.  But since Freedman’s statement to Cybernews mentioned “malicious files,” DataBreaches has reached out to World Leaks to confirm the nature of the “malicious” files and will update this post if a reply is received.
  3. Hunters International had reportedly planned to stop using ransomware and to go to an exfiltration-extortion model only, re-branding as World Leaks. Some sites report that they did abandon using ransomware, but if one simply looks at their leak site, it is clear that Hunters International is still encrypting some of their victims.

But the bottom line is that this appears to be an attack that resulted in the leak of employees’ financial and other information (PII), as well as internal and business files of Freedman, but not patient data or PHI.

If Freedman answers this site’s question about the purchase of BTC in 2022 presumably to pay for a ransomware attack, this post will be updated.

 

 


Related:

  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
Category: Commentaries and Analyses

Post navigation

← Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
Ireland’s Data Protection Commission publishes 2024 Annual Report →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India’s top exchange
  • Government will ‘robustly defend’ compensation claims from Afghans put at risk by data breach
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Singapore Facing ‘Serious’ Cyberattack by Espionage Group With Alleged China Ties
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea’s largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • 𝐔𝐠𝐚𝐧𝐝𝐚 𝐨𝐫𝐝𝐞𝐫𝐬 𝐆𝐨𝐨𝐠𝐥𝐞 𝐭𝐨 𝐫𝐞𝐠𝐢𝐬𝐭𝐞𝐫 𝐚𝐬 𝐚 𝐝𝐚𝐭𝐚‑𝐜𝐨𝐧𝐭𝐫𝐨𝐥𝐥𝐞𝐫 𝐰𝐢𝐭𝐡𝐢𝐧 𝟑𝟎 𝐝𝐚𝐲𝐬 𝐚𝐟𝐭𝐞𝐫 𝐥𝐚𝐧𝐝𝐦𝐚𝐫𝐤 𝐩𝐫𝐢𝐯𝐚𝐜𝐲 𝐫𝐮𝐥𝐢𝐧𝐠.
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access
  • Texas Enacts Electronic Health Record Data Localization Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.