Abdali Hospital Rhysida Ransomware Targets Jordan's Premier Healthcare Provider

Dec 2023 · 10 BTC ransom

By Karim El Labban · ZERO|TOLERANCE

🇯🇴 JordanDecember 202310 min read

# Abdali Hospital: Rhysida Ransomware Targets Jordan's Premier Healthcare Provider

In December 2023, the Rhysida ransomware group - a rapidly ascending criminal

operation that had already struck Kuwait's Ministry of Finance the same quarter

-- listed Abdali Hospital on its dark web leak site, demanding a 10 BTC ransom

payment (approximately $430,000 USD at December 2023 valuations) in exchange for

withholding stolen data. Abdali Hospital, located in the heart of Amman's

modern Abdali development district, is widely regarded as one of Jordan's

premier private multi-specialty healthcare facilities, serving both domestic patients

and medical tourists from across the broader MENA region.

The attack resulted in the confirmed theft of patient medical records, diagnostic

data, and staff personal information, which Rhysida threatened to publish in full

if its financial demands were not met. The incident placed Jordan's healthcare

sector under intense scrutiny, exposing the vulnerability of institutions that hold

among the most sensitive categories of personal data - detailed medical histories,

diagnoses, treatment plans, and biometric information - without the benefit of

the enforceable minimum-security standards that a standalone data protection law would

impose. It also represented the third Rhysida attack against a Middle Eastern government

or major institution within a six-week window, suggesting a deliberate regional targeting

strategy by the group.

## Key Facts

  • .**What:** Rhysida ransomware attacked Abdali Hospital in Amman, demanding 10 BTC.
  • .**Who:** Patients and staff at Jordan's premier private multi-specialty hospital.
  • .**Data Exposed:** Patient medical records, diagnostic imaging data, and staff information.
  • .**Outcome:** Third Rhysida MENA attack in six weeks; no data protection law in Jordan.

## What Was Exposed

  • .Patient medical records including diagnoses, treatment histories, prescribed medications, surgical records, and discharge summaries spanning Abdali Hospital's multi-specialty departments
  • .Diagnostic imaging data - radiology reports, MRI and CT scan metadata, pathology laboratory results - constituting some of the most sensitive health data a hospital processes
  • .Staff personal information including employee identification documents, employment contracts, salary records, and potentially medical records for employees who received care at the facility
  • .Patient demographic and contact data: full names, national identification numbers, dates of birth, home addresses, and telephone numbers for individuals who sought treatment
  • .Insurance and billing records, potentially including coverage details, claim histories, and payment card information for patients who settled accounts electronically
  • .Referral documentation and correspondence between Abdali's specialists and referring physicians, exposing the medical trajectories of patients and their external healthcare relationships
  • .Administrative system credentials and internal network architecture documentation that would materially assist any subsequent intrusion attempt
  • .Potentially research data, clinical trial documentation, or academic medical records if Abdali's facilities hosted any affiliated research programs

Abdali Hospital was inaugurated in 2016 as the flagship medical facility of the Abdali

Boulevard development - a landmark urban regeneration project in central Amman

modeled partly on mixed-use developments in the Gulf states. The hospital was designed

to position Jordan as a regional medical tourism hub, offering specialist care that would

attract patients from Iraq, Syria, Libya, Yemen, and other MENA nations where healthcare

infrastructure has been degraded by conflict or chronic underinvestment. This regional

patient base amplifies the jurisdictional complexity of the breach: the stolen medical

data likely includes records for patients from at least a dozen countries, each with

different data protection frameworks and different expectations of privacy.

Rhysida is a ransomware-as-a-service (RaaS) operation that emerged publicly in May 2023

and achieved rapid notoriety through a series of high-profile attacks against critical

sectors. The group is assessed to operate through an affiliate model, in which a central

organization provides the ransomware toolkit, leak infrastructure, and negotiation services

while independent criminal actors - affiliates - conduct the actual intrusions

and share ransom proceeds with the core group. This affiliate model means that the technical

sophistication and intrusion methods can vary between attacks, though Rhysida affiliates

have consistently demonstrated proficiency with phishing-based initial access, exploitation

of internet-facing remote access services, and lateral movement via compromised Active

Directory environments.

Healthcare is a perennial target for ransomware operations because hospital systems create

an acute operational incentive to restore services rapidly - delayed access to patient

records in a clinical setting can directly compromise patient safety. Ransomware operators

exploit this by presenting hospital victims with a stark choice: pay the ransom quickly

to restore encrypted systems, or face both the operational disruption of rebuilding from

scratch and the reputational catastrophe of stolen medical records appearing on a public

dark web site. Abdali Hospital's position as a regional medical tourism center

heightens this calculus: the reputational damage of a publicized data breach would

disproportionately affect an institution whose competitive differentiation rests on

patient trust and premium service quality.

The 10 BTC ransom demand is consistent with Rhysida's observed pricing model for

mid-tier private healthcare institutions. For comparison, Rhysida demanded approximately

50 BTC ($2 million) from the Chilean Army in May 2023, and similar double-digit BTC

demands from healthcare and government victims across Europe and the Americas. The demand

against Abdali Hospital suggests that Rhysida's affiliates assessed the institution

as financially capable of paying but not large enough to warrant a maximum-tier demand.

Whether Abdali Hospital paid the ransom or allowed the data to be published has not been

publicly confirmed, a pattern common to ransomware victims in jurisdictions without

mandatory breach disclosure requirements.

The Rhysida attack on Abdali Hospital was not an isolated incident in the context of

Jordan's healthcare sector. Jordan's National Cybersecurity Centre (NCSC)

reported handling 6,758 cybersecurity incidents in 2024 - a 175% increase over

2023 - with healthcare among the sectors experiencing elevated threat activity.

The concentration of private hospitals and specialist clinics in Amman, combined with

the digital transformation of patient record management systems across the sector, has

created a large attack surface. Many smaller Jordanian private clinics and hospitals lack

dedicated IT security teams and rely on general IT contractors who may not have the

specialist expertise to defend against a determined ransomware affiliate.

## Regulatory Analysis

Jordan's regulatory response to a healthcare ransomware attack of this nature is

constrained by a foundational gap in the country's legal architecture: the absence

of a standalone Personal Data Protection Law. Unlike the UAE, Bahrain, Qatar, and

Saudi Arabia - all of which have enacted dedicated data protection legislation with

defined breach notification obligations and data security requirements - Jordan has

no equivalent framework. The primary legislative tool for addressing the Abdali Hospital

breach under Jordanian law is the Cybercrime Law No. 17/2023, which entered into force

on September 13, 2023, just months before the Rhysida attack.

The Cybercrime Law No. 17/2023 replaced the 2015 Cybercrimes Law and expanded the scope

of prosecutable offenses related to unauthorized system access, data theft, and the

operation of malicious software. Under this framework, the Rhysida group's conduct

-- unauthorized access to hospital systems, exfiltration of patient data, and

threatened publication of that data to extort payment - constitutes multiple

discrete criminal offenses. However, the law's architecture is fundamentally

oriented toward criminal prosecution of attackers, not toward establishing minimum

security obligations for organizations that hold sensitive personal data. There is no

provision in the Cybercrime Law that would compel Abdali Hospital to notify affected

patients, report the breach to a supervisory authority, or demonstrate that it had

implemented security measures appropriate to the sensitivity of its data processing

activities.

The constitutional dimension of the breach is also significant. Article 18 of Jordan's

Constitution provides that “all postal, telegraphic, and telephonic communications

shall be considered secret and shall not be subject to censorship, suspension, confiscation,

delay, or perusal except by judicial order.” While Article 18 was drafted in an era

before digital health records existed, Jordanian constitutional scholars and civil society

organizations have argued that its privacy protection principle should be read to extend to

personal medical information in the digital age. A breach that places patients' most

intimate health data in the hands of criminal actors, and potentially on a publicly

accessible dark web site, engages this constitutional privacy interest. However, without

a dedicated data protection authority and enabling legislation, Article 18 provides a

declaratory framework without an enforcement mechanism.

The Ministry of Digital Economy and Entrepreneurship (MoDEE), which oversees Jordan's

digital infrastructure policy and has acknowledged data privacy as a national priority,

and the NCSC, which handles national cybersecurity incident response, collectively represent

the institutional framework through which Jordan addresses incidents of this type. Neither

body, however, has statutory authority to impose fines, mandate remediation, or require

breach notification under existing legislation. The result is that Abdali Hospital faced

no formal regulatory consequence for a breach that, in the EU, would have triggered GDPR

Article 33 notification obligations within 72 hours and potential fines of up to 4% of

global annual turnover. Jordan's legislative gap transforms what should be a

regulatory enforcement event into a purely reputational one.

The healthcare sector in Jordan is regulated primarily by the Ministry of Health and

the Jordan Medical Council. Neither body has issued specific cybersecurity standards

for hospitals or clinics that process electronic patient records, though the Ministry

of Health has issued general guidelines on health information system management.

The absence of sector-specific cybersecurity standards creates a regulatory vacuum

in which hospitals can operate electronic health records systems without demonstrating

compliance with any defined baseline of security controls. This vacuum is particularly

consequential given that Jordanian hospitals routinely process data for patients from

countries whose own regulatory frameworks would impose cross-border data transfer

obligations and require evidence of adequate protection at the receiving institution.

## What Should Have Been Done

Defending a multi-specialty hospital against a ransomware-as-a-service operation like

Rhysida requires addressing the full attack lifecycle: prevention of initial access,

rapid detection of anomalous behavior, containment of lateral movement, and resilient

recovery capabilities that do not depend on the attacker's cooperation. For an

institution of Abdali Hospital's profile - handling sensitive medical data

for a regional patient base, with significant reputational exposure to a breach --

the investment threshold for cybersecurity should reflect the consequences of failure,

not merely the minimum required by regulatory compliance.

Email security represents the most cost-effective single investment for reducing

ransomware risk. Phishing campaigns are the primary initial access vector for Rhysida

affiliates, and a hospital's communications environment - with staff

routinely receiving medical reports, referral documents, insurance correspondence,

and equipment vendor communications from external parties - creates numerous

opportunities for a well-crafted phishing email to succeed. Abdali Hospital should

have deployed an advanced email security gateway with machine-learning detection

of malicious attachments and links, enforced DMARC, DKIM, and SPF authentication

controls on its email domain, and conducted regular phishing simulation exercises

for all clinical and administrative staff. Security awareness training in healthcare

environments must bridge the gap between clinical urgency and security discipline:

staff who open patient referral attachments as a routine part of their workflow are

natural targets for attackers who understand this behavior.

Network segmentation is particularly important in healthcare environments, where

clinical systems (electronic health records, PACS imaging systems, laboratory

information systems) must be isolated from administrative networks, guest Wi-Fi,

and internet-facing services. A properly segmented hospital network prevents a

ransomware affiliate who gains initial access through a phishing email in the

administrative domain from pivoting directly into clinical systems containing

patient records. Abdali Hospital should have implemented a zero-trust network

architecture in which every device, every user account, and every application

was treated as potentially compromised, with access to clinical systems restricted

to authenticated, authorized devices operating within defined behavioral parameters.

Microsegmentation of the electronic health records environment, PACS servers, and

laboratory systems would have materially limited the blast radius of a successful

intrusion.

Privileged access management (PAM) is the critical control for preventing Rhysida's

characteristic lateral movement through Active Directory environments. Hospital IT

environments frequently suffer from privilege sprawl: administrator accounts created

for specific tasks that accumulate permissions over time, service accounts running

with domain admin rights, and shared administrative credentials that make forensic

attribution of access impossible. Abdali Hospital should have deployed a PAM platform

to vault all privileged credentials, rotate them automatically after every use,

require multi-factor authentication for all privileged sessions, and record every

privileged access session for forensic review. The elimination of standing privileged

access - replacing it with just-in-time privilege elevation for specific tasks

-- removes the persistent footholds that ransomware operators depend upon to

achieve domain-wide encryption capability.

Backup and recovery capabilities are the last line of defense when ransomware operators

succeed in deploying their encryption payload. Abdali Hospital should have maintained

an immutable, air-gapped backup of all critical clinical and administrative data,

tested weekly, with restoration time objectives that would allow clinical services

to resume within hours rather than days. Modern ransomware operators routinely

target backup infrastructure before deploying their encryption payload - Rhysida

affiliates have demonstrated this pattern - meaning that backups that are

accessible from the same network environment as production systems will frequently

be destroyed before the ransom demand is issued. Only backups that are physically

or logically isolated from the production network provide reliable protection.

The hospital should have also maintained tested incident response playbooks for

ransomware scenarios, with pre-agreed escalation paths, external forensics retainer

contracts, and communications protocols for notifying affected patients and relevant

authorities.

The Rhysida attack on Abdali Hospital is a textbook illustration of the consequences

when a healthcare institution that processes among the most sensitive categories of

personal data operates in a jurisdiction without enforceable data protection obligations

-- an institution that would face multi-million-euro GDPR fines and mandatory

patient notification in Europe faces no equivalent accountability mechanism in Jordan,

leaving patients whose records were stolen with no formal recourse and no assurance

that the systemic vulnerabilities that enabled the breach have been addressed.

RELATED ANALYSIS

Conduent/SafePay: 25M Americans Exposed in 84-Day Ransomware Dwell - Largest US Government Data Breach
Jan 13, 2025 · 25M+ affected · 8.5TB exfiltrated · 84-day dwell
UAE Foils AI-Powered Ransomware Campaign - 200,000 Attacks/Day Intercepted
Feb 18-21, 2026 · 200K/day
University of Mississippi Medical Center: 35 Clinics Shut Down 9 Days by Ransomware
Feb 19 - Mar 2, 2026 · Healthcare
Passaic County, NJ: Medusa Ransomware Disables Government Services for 526,000 Residents
Mar 4, 2026 · 526K residents · $800K ransom
Omrania & Associates: INC Ransom Publishes 4TB of Saudi Critical Infrastructure Drawings
Jan 9, 2026 · 4TB published · Egis subsidiary
MORE RANSOMWARE →