midas attacks Crossroads Health

Incident Date:

January 18, 2022

World map

Overview

Title

midas attacks Crossroads Health

Victim

Crossroads Health

Attacker

Midas

Location

Mentor, USA

Ohio, USA

First Reported

January 18, 2022

Crossroads Health Suffers Ransomware Attack by Midas Group

Crossroads Health, a community-based 501(c)(3) nonprofit organization offering a continuum of recovery, mental, and primary healthcare programs and services, has been targeted by the ransomware group Midas. The attack was announced on the group's dark web leak site, and the victim's website is crossroadshealth.org.

Crossroads Health operates in the Healthcare Services sector and has faced a data security incident in the past. In March 2022, the organization disclosed a breach affecting former Beacon Health patients, with the attackers gaining access to their systems from November 21, 2021, to January 18, 2022, and removing some files.

The size of Crossroads Health is not explicitly stated in the search results, but it is known to be a nonprofit organization with a commitment to providing trauma-informed, evidence-based services that change lives and impact communities. The company's vulnerabilities in being targeted by threat actors are not explicitly mentioned in the search results, but the healthcare industry has seen an increase in ransomware attacks in recent years, with the trend expected to continue.

The Midas ransomware group has claimed responsibility for the attack, but further details about the attack, such as the extent of the damage and the ransom demanded, are not provided in the search results.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.