[MEDUSA] – Ransomware Victim: Adore Children and Family Services

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the MEDUSA Onion Dark Web Tor Blog page.

Ransomware group:
MEDUSA
Victim name:
ADORE CHILDREN AND FAMILY SERVICES

AI Generated Summary of the Ransomware Leak Page

On October 22, 2025, a leak post references Adore Children and Family Services, a US-based healthcare organization operating as a foster care agency. The organization describes its mission as providing substitute care for children, with services that include individual case management, behavioral assessments, and training for foster families. The post is timestamped 2025-10-22 16:41:22.000000; in the absence of a separate compromise date, this is treated as the post date. The available excerpt does not explicitly state whether the incident involved encryption or data exfiltration, and there is no ransom amount disclosed in the visible text. The page indicates the presence of a claim URL, suggesting that additional details may be accessible behind a gate.

According to the metadata, there are no visible images or downloadable assets on the page (no screenshots or images and no attached files). The accessible content is limited to a CAPTCHA-based access gate, implying that verification is required before any further details can be viewed. There is no description within the excerpt of data types, volumes, or specific assets affected, nor is there a stated impact such as encryption or data leakage in the text shown. The entry clearly identifies the victim by name, with no other corporate names present in the accessible content. The post lists the United States as the country, and no website is provided in the data.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features