Company Details
harbourview-family-health-team
16
114
621
hfht.ca
0
HAR_2645371
In-progress

Harbourview Family Health Team Company CyberSecurity Posture
hfht.caHarbourview Family Health Team (HFHT) is a well-established primary care team based in Thunder Bay, dedicated to delivering high-quality, team-based care to our patients and their families. Our interdisciplinary team includes nurse practitioners, registered nurses, a registered dietitian, social workers, administrative professionals, and 14 family physicians.
Company Details
harbourview-family-health-team
16
114
621
hfht.ca
0
HAR_2645371
In-progress
Between 600 and 649

HFHT Global Score (TPRM)XXXX

Description: **Rhysida Ransomware Group Claims Attack on Queensland Medical Centre, Threatens Patient Data Sale** The Rhysida ransomware group has listed **Harbour Town Doctors**, a Queensland-based medical centre, as a victim on its dark web extortion site. The attack was publicly claimed on **December 11**, with the group posting low-resolution images of allegedly stolen data, including files bearing the clinic’s letterhead, **patient health summaries**, medical record transfer requests, and pathology reports. Rhysida set a **seven-day ransom deadline** and is currently offering the data for sale to a single buyer for **five Bitcoin (approximately $137,000)**. The group stated that the data would be sold exclusively, with no resale permitted, framing it as a "unique opportunity" for potential buyers. Harbour Town Doctors has not responded to requests for comment. **About Rhysida** Rhysida is a **ransomware-as-a-service (RaaS) operation**, first observed in mid-2023, with **254 claimed victims** to date. The financially motivated group, which communicates in Russian, has a history of targeting the **healthcare sector**. Notable past attacks include: - **Prospect Medical Holdings (August 2023)**: Disrupted 17 hospitals and 166 clinics in the U.S., exposing **500,000 Social Security numbers, medical records, and passport details**. - **Sunflower Medical Group (January 2025)**: Allegedly stole **three terabytes of data**, impacting over **400,000 patients**. - **Daughterly Care (September 2024)**: A Sydney-based aged-care provider, marking Rhysida’s previous Australian healthcare victim. **About Harbour Town Doctors** Located in **Biggera Waters, Queensland**, the clinic provides **family medicine, skin cancer treatment, and chronic disease management**, employing five doctors and administrative staff. The centre markets itself as offering **personalised, team-based care** through experienced healthcare professionals.


Harbourview Family Health Team has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.
Harbourview Family Health Team has 28.21% more incidents than the average of all companies with at least one recorded incident.
Harbourview Family Health Team reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
HFHT cyber incidents detection timeline including parent company and subsidiaries

Harbourview Family Health Team (HFHT) is a well-established primary care team based in Thunder Bay, dedicated to delivering high-quality, team-based care to our patients and their families. Our interdisciplinary team includes nurse practitioners, registered nurses, a registered dietitian, social workers, administrative professionals, and 14 family physicians.


Hamad Medical Corporation (HMC) is the main provider of secondary and tertiary healthcare in Qatar and one of the leading hospital providers in the Middle East. For more than three decades, HMC has been dedicated to delivering the safest, most effective and compassionate care to all its patients.
.png)
It is with heavy hearts that we announce the passing of Joe Behse with family by his side at the Thunder Bay Regional Health Sciences Centre.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Harbourview Family Health Team is www.hfht.ca.
According to Rankiteo, Harbourview Family Health Team’s AI-generated cybersecurity score is 634, reflecting their Poor security posture.
According to Rankiteo, Harbourview Family Health Team currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Harbourview Family Health Team is not certified under SOC 2 Type 1.
According to Rankiteo, Harbourview Family Health Team does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Harbourview Family Health Team is not listed as GDPR compliant.
According to Rankiteo, Harbourview Family Health Team does not currently maintain PCI DSS compliance.
According to Rankiteo, Harbourview Family Health Team is not compliant with HIPAA regulations.
According to Rankiteo,Harbourview Family Health Team is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Harbourview Family Health Team operates primarily in the Medical Practices industry.
Harbourview Family Health Team employs approximately 16 people worldwide.
Harbourview Family Health Team presently has no subsidiaries across any sectors.
Harbourview Family Health Team’s official LinkedIn profile has approximately 114 followers.
Harbourview Family Health Team is classified under the NAICS code 621, which corresponds to Ambulatory Health Care Services.
No, Harbourview Family Health Team does not have a profile on Crunchbase.
Yes, Harbourview Family Health Team maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/harbourview-family-health-team.
As of December 15, 2025, Rankiteo reports that Harbourview Family Health Team has experienced 1 cybersecurity incidents.
Harbourview Family Health Team has an estimated 9,003 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: Rhysida Ransomware Attack on Harbour Town Doctors
Description: A ransomware group, Rhysida, listed Queensland-based medical centre Harbour Town Doctors as a victim on its dark net extortion site. The group claimed the attack on December 11, posting low-resolution images of allegedly exposed patient data, including medical records, health summaries, and pathology reports. The data was put up for sale for five Bitcoin (roughly $137,000) with a seven-day ransom deadline.
Date Publicly Disclosed: 2023-12-11
Type: Ransomware
Threat Actor: Rhysida
Motivation: Financial
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Patient data, medical records, health summaries, pathology reports
Brand Reputation Impact: Likely significant
Legal Liabilities: Potential
Identity Theft Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Data, Medical Records, Health Summaries, Pathology Reports and .

Entity Name: Harbour Town Doctors
Entity Type: Medical Centre
Industry: Healthcare
Location: Bigger Waters, Queensland, Australia
Size: 5 doctors and administrative staff

Type of Data Compromised: Patient data, Medical records, Health summaries, Pathology reports
Sensitivity of Data: High
Data Exfiltration: Yes
Data Encryption: Yes (ransomware encryption)
File Types Exposed: Medical documentsPatient health summariesPathology reports
Personally Identifiable Information: Yes

Ransom Demanded: 5 Bitcoin (~$137,000)
Ransomware Strain: Rhysida
Data Encryption: Yes
Data Exfiltration: Yes

Regulations Violated: Likely Australian Privacy Principles (APP), Potential Notifiable Data Breaches (NDB) scheme,

Source: Cyber Daily
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyber Daily.
Last Ransom Demanded: The amount of the last ransom demanded was 5 Bitcoin (~$137,000).
Last Attacking Group: The attacking group in the last incident was an Rhysida.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-12-11.
Most Significant Data Compromised: The most significant data compromised in an incident were Patient data, medical records, health summaries and pathology reports.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patient data, medical records, health summaries and pathology reports.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was 5 Bitcoin (~$137,000).
Most Recent Source: The most recent source of information about an incident is Cyber Daily.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.