Thousands of patients
A gynecology clinic in Serbia has become the victim of a brutal double-extortion ransomware attack. After gaining access to the clinic's network, attackers encrypted its systems and exfiltrated a complete copy of its patient database. The attackers then demanded a ransom, and when the clinic refused to pay, they published the entire database on a dark web forum. The leaked data contains highly sensitive personal and medical information of thousands of patients, representing a catastrophic privacy breach. This incident is a stark example of the increasing trend of ransomware groups targeting the healthcare sector, where the potential for harm and coercion is at its highest.
This attack follows the classic double-extortion model popularized by many ransomware gangs. The attack chain consists of two primary phases:
T1486: Data Encrypted for Impact.The ransom note demanded payment in cryptocurrency in exchange for a decryption key and a promise to delete the stolen data. By refusing to pay—a decision often recommended by law enforcement—the clinic triggered the attackers' secondary threat: public data leakage. The release of such intimate medical data is intended not only to punish the victim but also to serve as a warning to future victims, increasing the pressure on them to pay.
The initial access vector for the attack was not specified, but common entry points for ransomware attacks against smaller organizations like clinics include:
Once inside, the attackers likely performed reconnaissance, escalated privileges, and located the main database server. The data would have been compressed and exfiltrated using common protocols like FTP, HTTPS, or cloud storage services, a technique known as T1567: Exfiltration Over Web Service. Finally, the ransomware was deployed across the network to cause maximum disruption.
The impact of this breach is devastating on multiple levels:
Detecting double-extortion attacks before encryption occurs is key.
T1490: Inhibit System Recovery).Preventing ransomware remains one of the highest priorities for any organization, especially in healthcare.
M1053: Data Backup.M1030: Network Segmentation.M1017: User Training).M1051: Update Software).The most critical mitigation for ransomware. Regular, tested, and offline/immutable backups ensure data can be restored without paying a ransom.
Proper network segmentation can contain a ransomware outbreak and prevent it from spreading to critical assets like backup systems and databases.
Training users to identify and report phishing emails can prevent the initial access that often leads to ransomware attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats