Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Payload Ransomware Strikes Royal Bahrain Hospital: A Breach of Unprecedented Proportions



Payload Ransomware has claimed another high-profile victim - the Royal Bahrain Hospital (RBH), a leading healthcare facility in Bahrain. The breach, which is believed to have occurred in recent days, has left authorities scrambling to contain the situation and protect patient data. Experts warn of the devastating consequences of such a breach and highlight the ongoing need for robust cybersecurity measures in healthcare facilities.

  • Royal Bahrain Hospital (RBH) has been breached by the ransomware group Payload Ransomware.
  • The breach resulted in the theft of 110 GB of sensitive data, which was published on a Tor data leak site as proof of the attack.
  • The group is threatening to release the stolen data if a ransom is not paid by March 23.
  • Experts warn that the breach could have severe consequences for patient data due to Payload Ransomware's history of releasing stolen data in exchange for ransom payments.
  • The attack highlights the need for robust cybersecurity measures in healthcare facilities, particularly when sensitive patient data is involved.



  • Payload Ransomware, a relatively new and feared cybercrime operation, has claimed another high-profile victim - the Royal Bahrain Hospital (RBH), a leading healthcare facility in Bahrain. The breach, which is believed to have occurred in recent days, has left authorities scrambling to contain the situation and protect patient data.

    According to reports, Payload Ransomware, a group that operates under a double-extortion model, claims to have breached RBH and stolen 110 GB of sensitive data. The ransomware gang added the healthcare facility to its Tor data leak site and published the images of allegedly hacked systems as proof of the attack.

    The group is now threatening to release the stolen data if the ransom is not paid by March 23. This move has sent shockwaves through the cybersecurity community, with many experts warning of the devastating consequences of such a breach.

    Royal Bahrain Hospital, founded in 2011, is a healthcare facility with 70 beds offering inpatient and outpatient services, including surgery, maternity care, and diagnostics. It serves patients from Bahrain and neighboring countries such as Oman, Qatar, Saudi Arabia, and the United Arab Emirates.

    The breach at RBH has been attributed to Payload Ransomware, which has been targeting mid- to large-size companies in sectors such as real estate and logistics, mainly in emerging markets. The group uses a combination of techniques, including ChaCha20 for file encryption and Curve25519 for key exchange, while deleting shadow copies and disabling security tools.

    Technically, the ransomware is believed to be part of a ransomware-as-a-service scheme, with the Payload Ransomware operating out of a Tor leak site. This move has allowed the group to publish data from non-paying victims, further highlighting the brazen nature of the attack.

    Experts warn that the breach at RBH could have severe consequences for patient data, particularly in light of the group's history of releasing stolen data in exchange for ransom payments. The incident highlights the ongoing need for robust cybersecurity measures in healthcare facilities, where sensitive patient data is often involved.

    As the situation unfolds, authorities and cybersecurity experts are working to contain the breach and protect patient data. The incident serves as a stark reminder of the evolving threat landscape in the world of cybercrime, where attacks like Payload Ransomware can have far-reaching consequences for individuals and organizations alike.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Payload-Ransomware-Strikes-Royal-Bahrain-Hospital-A-Breach-of-Unprecedented-Proportions-ehn.shtml

  • Published: Sun Mar 15 11:26:10 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us