Article Details
Scrape Timestamp (UTC): 2025-10-06 13:23:11.411
Source: https://www.theregister.com/2025/10/06/radiant_group_hospital/
Original Article Text
Click to Toggle View
Radiant Group won't touch kids' data now, but apparently hospitals are fair game. Ransomware crooks utterly fail to find moral compass. First they targeted a preschool network, now new kids on the ransomware block Radiant Group say they've hit a hospital in the US, continuing their deplorable early cybercrime careers. With just three claimed victims on its website, including preschool network Kido Schools, Radiant Group today gave a Minnesota hospital seven days to comply with its demands or risk having its data plastered online. The ransomware crooks have not yet named the hospital, but said they would identify it if their extortion demands are unmet. Radiant added the hospital to its data leak site in the early hours of Monday morning – the latest victim it claimed to have attacked since spinning up in September. The group mired itself in controversy following its inaugural attack on Kido International, primarily due to it leaking images of preschoolers along with their parents' contact details. It wasn't just media and cybersecurity pressure that prompted Radiant to cover its tracks; a rival ransomware crew also appears to have played a role. Rebecca Taylor, a threat intelligence knowledge manager at security biz Sophos, told The Register last week that the Nova group chastised Radiant on the Russian hacker forum RAMP for its treatment of young people. In response, Radiant agreed to remove the children's data. Kido International's listing on Radiant's website now reflects that, with the group saying one of its affiliates went rogue. "All data relating to Kido Schools International has been deleted," its website now reads. "One of our partners violated our rules by targeting a childcare company. Therefore, we will not continue any leakage of this childcare company, and they have been provided with a security report and deletion log." We asked Kido to confirm the veracity of Radiant's claims, specifically about providing a deletion log. A spokesperson for the preschool network said: "We understand that the group responsible has unilaterally elected to delete data they copied. We have continued to monitor their site and can confirm they have removed the information they previously published." "Throughout this incident, we have followed guidance from the authorities that discourages ransom payments as they only fuel and incentivise further criminal activity. We continue to work closely with families, regulators, law enforcement, and our cybersecurity experts, to investigate and take active steps to confirm that the data is permanently deleted." According to Taylor, Radiant said that during the RAMP discussion of its attack on Kido it forbade any attacks that involve children's data. "We have disabled any attacks relating to them, is not allowed anymore," it said. So children are a no-go, yet hospitals are seemingly fair game. Little is known about Radiant Group, although the cyber sleuths at malware collector vx-underground, who claim to have spoken with its hierarchy after the Kido attack, said they appear to be native English speakers and understand how the UK school system works. They said Russian ransomware groups tend not to have a great understanding of what data they steal from Western organizations or how damaging it could be if leaked.
Daily Brief Summary
Radiant Group, a new ransomware actor, has claimed responsibility for an attack on a Minnesota hospital, demanding compliance within seven days to avoid data exposure.
This group previously attacked Kido Schools, leaking sensitive data of preschoolers and their parents, sparking significant backlash from media and rival cybercriminals.
Following criticism, Radiant Group removed the children's data and vowed to avoid targeting minors in future operations.
Despite retracting from targeting children, the group has not hesitated to attack healthcare institutions, indicating a shift in their victim profile.
Radiant Group's actions have prompted ongoing investigations and collaboration with law enforcement, cybersecurity experts, and regulators to ensure data deletion and prevent future attacks.
The group's decision-making and operations suggest a familiarity with Western systems, contrasting with typical Russian ransomware groups.
The incident underscores the persistent threat of ransomware to critical sectors, emphasizing the need for robust cybersecurity measures and incident response strategies.