[RADAR] – Ransomware Victim: My Florida Case Management Services, LLC
![[RADAR] - Ransomware Victim: My Florida Case Management Services, LLC 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the RADAR Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
My Florida Case Management Services, LLC, a healthcare-focused professional case management firm operating in Florida, is identified as the victim in a ransomware leak entry attributed to the radar group. The leak page lists the Healthcare industry and provides no explicit compromise date; the only date present in the data is 2025-10-19 16:04:38.000000, which should be treated as the post date. The entry does not indicate an encryption event or data exfiltration, nor does it present a ransom amount or any downloadable content. The page’s description includes a note suggesting that the term “Case Management Services” could refer to Florida Medicaid mental health targeted case management programs or to court-based case management, which seems to be contextual rather than a direct incident detail. The victim name is preserved exactly as provided.
The metadata shows no visual assets or downloads on the leak page: there are 0 images, and no links or photos are present. There is no claim URL or other external content associated with this entry. Because there is no explicit mention of encryption, data theft, or a ransom demand, the impact of the incident cannot be determined from the available material. The absence of a stated compromise date and of concrete data-exfiltration details suggests this listing may be preliminary or incomplete, and additional updates from the same leak site would be needed to confirm the incident’s scope or nature.
CTI takeaway: In healthcare-targeted listings with ambiguous content, analysts should monitor for updates and cross-reference with additional sources to determine whether patient data was affected or if the entry is a mislabeling or placeholder. In the meantime, maintain standard data protection and regulatory compliance measures for healthcare entities, and remain vigilant for any future updates that might indicate data leakage, encryption, or ransom demands.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.