Insights, news, education and announcements from PolySwarm

Critical Condition: The 2026 Healthcare Cyber Threat Landscape

Written by The Hivemind | May 4, 2026 6:15:01 PM

Verticals Targeted: Healthcare
Regions Targeted: US, Global
Related Families & Threat Actors: Lynx, ANUBIS, Rhysida, LockBit, ALPHV/BlackCat, Qilin, Medusa, The Gentleman, Payload, NetRunner, Genesis, ShinyHunters, Pay2Key, Handala

Executive Summary

Healthcare remains the most targeted critical infrastructure sector for cyberattacks, driven by ransomware, large-scale data theft, and increasing geopolitical activity. In 2026, threat activity reflects a convergence of ransomware operators, data extortion groups, and Iran-linked cyber operations, significantly increasing risk to healthcare delivery, patient safety, and supply chain stability.

Key Takeaways

  • Healthcare remains the most targeted sector for ransomware, with continued disruption across hospitals and providers.
  • Emerging and mid-tier ransomware groups are actively targeting healthcare organizations in 2026.
  • Data extortion operations are increasing alongside traditional ransomware activity.
  • Iran-linked actors continue to expand targeting of healthcare and medical technology infrastructure.

Threat Overview

The healthcare sector remains highly vulnerable due to operational urgency, high-value data, and reliance on interconnected systems. In 2026, the threat landscape reflects a multi-layered adversary model:

  • Ransomware operators targeting availability
  • Data extortion groups targeting sensitive patient and operational data
  • Nation-state and aligned actors targeting disruption and strategic signaling

A recently disclosed breach affecting Medtronic underscores the growing risk to the healthcare supply chain. The incident, claimed by ShinyHunters, involved unauthorized access to corporate systems and potential large-scale data exfiltration. While no clinical disruption was reported, the breach highlights how compromise of medical technology providers can expose sensitive data and introduce downstream risk across healthcare environments. Attackers are no longer focused solely on hospitals but are increasingly targeting the broader healthcare ecosystem, including vendors, medical device manufacturers, and service providers.

ShinyHunters’ approach reflects a broader evolution in threat actor strategy, where attackers prioritize access to centralized data environments over operational disruption. By targeting corporate IT infrastructure rather than clinical systems, the group is able to operate with reduced likelihood of immediate detection while still achieving high-impact outcomes. This model enables large-scale data theft without the complexity or risk associated with deploying ransomware in environments where disruption may trigger rapid incident response.

The incident also underscores the importance of viewing healthcare as an interconnected ecosystem rather than isolated organizations. Medical technology providers, billing platforms, and healthcare IT vendors maintain extensive access to sensitive data and systems, making them high-value targets for attackers seeking to scale impact. Compromise at this level can expose data across multiple healthcare entities simultaneously, amplifying the reach of a single intrusion and complicating mitigation efforts across affected organizations.

Threat Actors Targeting The Healthcare Sector

Lynx

Lynx is a ransomware group operating under a double extortion model, combining encryption with data exfiltration. In 2026, Lynx was linked to a healthcare sector intrusion targeting a provider organization, leveraging stolen data and operational disruption to pressure payment, reflecting continued focus on healthcare entities with low downtime tolerance.

ANUBIS

ANUBIS is a ransomware operation targeting mid-sized organizations using encryption-based payloads and extortion tactics. In 2026, the group targeted Signature Healthcare, disrupting systems and forcing downtime procedures, demonstrating continued targeting of regional healthcare providers outside large hospital networks.

Rhysida

Rhysida is a ransomware group known for targeting healthcare, education, and government sectors through opportunistic intrusion methods. In 2026, Rhysida activity continues to impact healthcare organizations, with campaigns involving data exfiltration and encryption to pressure payment from hospitals and healthcare systems.

LockBit

LockBit is a mature ransomware-as-a-service operation with a large affiliate network. Despite law enforcement disruption, LockBit affiliates continue to target healthcare organizations in 2026, particularly through third-party compromise and supply chain access, impacting providers and healthcare service vendors.

ALPHV/BlackCat

ALPHV, also known as BlackCat, is a ransomware group associated with high-impact extortion campaigns. Although direct activity has declined, its tooling and affiliate ecosystem continue to influence ransomware targeting healthcare organizations in 2026, particularly through successor operations and shared techniques.

Qilin

Qilin is a ransomware group associated with double extortion operations targeting critical infrastructure sectors. In 2026, Qilin has been observed targeting healthcare organizations, including hospitals and clinical service providers, leveraging data exfiltration and encryption to disrupt operations and extract payment.

Medusa

Medusa is a ransomware group employing double extortion tactics and public data leak strategies. In 2026, Medusa has targeted healthcare organizations including hospitals and healthcare service providers, focusing on exfiltrating sensitive patient and operational data to increase pressure on victims.

The Gentlemen

The Gentlemen is a ransomware operation observed targeting enterprise and infrastructure organizations. In 2026, the group has been linked to healthcare sector targeting, including attacks against provider organizations and healthcare-related services, using encryption and extortion techniques to disrupt operations.

Payload

Payload ransomware is a lesser-known but active ransomware variant used in targeted campaigns across enterprise environments. In 2026, it has been observed targeting healthcare entities, including smaller providers and clinics, leveraging opportunistic access and encryption-based disruption.

NetRunner

NetRunner is a threat actor associated with data exfiltration and extortion operations, often targeting enterprise environments with large data stores. In 2026, NetRunner activity has included targeting healthcare-related organizations and service providers, focusing on extracting sensitive data for extortion rather than relying solely on encryption.

Genesis

Genesis is associated with credential access and underground market activity, including the sale of compromised access to enterprise environments. In 2026, Genesis-linked activity has contributed to healthcare intrusions by enabling initial access to healthcare systems through stolen credentials, facilitating downstream ransomware and data theft operations.

ShinyHunters

ShinyHunters is a data extortion group specializing in large-scale data breaches and exposure of stolen datasets. In 2026, the group targeted healthcare-adjacent organizations, including medical technology companies, focusing on mass data exfiltration and leak-based extortion rather than encryption.

Pay2Key

Pay2Key is an Iran-linked ransomware operation aligned with state interests. In 2026, the group targeted a US healthcare provider, combining ransomware deployment with strategic disruption, reflecting the intersection of cybercrime and geopolitical objectives.

Handala

Handala is an Iran-aligned cyber group conducting disruptive operations with political messaging. In 2026, the group targeted a medical technology organization, conducting data exfiltration and destructive actions, highlighting expansion into healthcare-related infrastructure. Our analysts previously highlighted this activity in the threat bulletin entitled Healthcare in the Crosshairs: Iran-Linked Cyber Threats Raise Risk for Hospitals, MedTech, and Care Delivery Supply Chains.

Supply Chain and Ecosystem Risk

Supply chain and ecosystem risk in healthcare reflects the sector’s dependence on a tightly interconnected network of vendors, platforms, and service providers that collectively support clinical and administrative operations. Medical device manufacturers, healthcare IT vendors, billing and clearinghouse platforms, and managed service providers are deeply embedded in day-to-day healthcare delivery, often maintaining privileged access to internal systems or handling sensitive patient and operational data. This level of integration creates multiple external entry points into healthcare environments, expanding the attack surface beyond what a single organization can directly control. As a result, a compromise at any one of these nodes can introduce risk into otherwise secure healthcare networks.

Recent threat activity demonstrates that attackers are increasingly targeting these third-party relationships as a means of scaling impact. Rather than breaching individual hospitals, adversaries can compromise a vendor or service provider to gain access to multiple downstream healthcare organizations simultaneously. This approach enables more efficient targeting, broader data exposure, and faster propagation of ransomware or data exfiltration campaigns. In practice, this has led to cascading disruptions, where a single incident affecting a billing platform or IT provider results in widespread outages, delayed claims processing, or loss of system availability across numerous healthcare entities.

This interconnected risk model reinforces that healthcare cybersecurity is no longer confined to organizational boundaries but must be addressed at the ecosystem level. Attacks targeting these entities can result in cascading disruption across multiple healthcare organizations, amplifying impact beyond a single victim.

Operational Impact on Healthcare Delivery and Patient Safety

Cyber incidents in healthcare can directly impact patient care and system operations. Observed effects of cyber incidents in healthcare include system outages that delay procedures, patient diversion that reduces care capacity, temporary loss of access to clinical systems, and increased strain on healthcare personnel. Collectively, these impacts extend beyond operational disruption, elevating healthcare cyber incidents into the domain of public safety and national security.

Emerging Threat Vectors

Identity and Credential Abuse

Identity and credential abuse has become a primary access vector in healthcare environments, particularly as organizations expand their use of cloud platforms, remote access solutions, and SaaS-based clinical systems. Threat actors increasingly rely on stolen or purchased credentials to bypass traditional perimeter defenses, enabling access without deploying malware. These credentials are often obtained via phishing, infostealer malware, or underground marketplaces, and are then used to access electronic health record (EHR) systems, administrative platforms, and cloud infrastructure. Once inside, attackers can move laterally, escalate privileges, and maintain persistence while remaining difficult to detect, as activity appears to originate from legitimate users.

IoT and Medical Device Exposure

The proliferation of connected medical devices introduces a persistent and often undersecured attack surface within healthcare environments. Devices such as imaging systems, infusion pumps, patient monitoring systems, and other clinical technologies frequently operate on legacy software, lack regular patching, and are not designed with modern security controls. These constraints make them difficult to secure and monitor, while still requiring network connectivity for clinical use. Threat actors can exploit these devices as entry points into broader networks or use them as footholds for lateral movement. In some cases, compromise of these systems may also pose direct risks to patient safety if device functionality is disrupted or manipulated.

Cloud Misconfiguration

Healthcare’s rapid migration to cloud infrastructure has introduced new risks tied to misconfiguration and access control weaknesses. Improperly configured storage buckets, overly permissive identity roles, and exposed APIs can allow unauthorized access to sensitive patient data and internal systems. These exposures are often not the result of advanced exploitation but rather configuration errors that leave data accessible over the internet. Attackers actively scan for such weaknesses, enabling opportunistic data theft at scale. As healthcare organizations continue to adopt cloud-based EHR platforms, analytics systems, and collaboration tools, misconfiguration remains a critical and recurring source of risk.

AI-Enhanced Social Engineering

Threat actors are increasingly leveraging AI to enhance the effectiveness and scale of social engineering campaigns targeting healthcare organizations. AI-generated phishing emails, voice impersonation, and realistic communication patterns enable attackers to convincingly mimic executives, vendors, or clinical staff. These campaigns can be tailored to healthcare-specific workflows, such as billing inquiries or patient coordination, increasing the likelihood of successful compromise. The use of AI reduces the effort required to generate targeted lures while improving their quality, resulting in higher success rates for credential harvesting and initial access operations.

Analyst Commentary

The healthcare threat landscape in 2026 reflects a convergence of ransomware, data extortion, and geopolitical cyber activity. This layered threat model increases both the likelihood and severity of incidents, particularly as attackers expand targeting beyond hospitals to include the broader healthcare ecosystem.

The recent Medtronic breach further illustrates the growing effectiveness of data-centric extortion models targeting healthcare-adjacent organizations. By focusing on corporate IT environments rather than operational or clinical systems, the threat actors were able to obtain large volumes of sensitive data without triggering immediate disruption, allowing the intrusion to persist long enough for significant exfiltration. This approach reduces operational risk for the attacker while maximizing leverage through reputational damage, regulatory exposure, and downstream fraud risk tied to compromised patient or business data. The incident also reinforces that healthcare exposure is no longer limited to direct providers, as compromise of medical technology and service vendors can introduce substantial risk across the broader healthcare ecosystem even in the absence of clinical impact.

PolySwarm’s multi-engine malware analysis marketplace enables organizations to analyze suspicious files and artifacts across a diverse set of detection engines, aggregating results into a unified PolyScore with contextual insights such as behavioral indicators and malware family classifications. This approach can increase the likelihood of identifying emerging or low-consensus threats, particularly in healthcare environments where new ransomware variants and supply chain payloads frequently evade traditional detection methods.

IOCs

PolySwarm has multiple samples of malware associated with the malware families and threat actors profiled above. Below is a selection of hashes of samples from those families and threat actor groups.

 

Lynx

961d5041e9687ed97102502f6d8d4d92e6147f59925b3114e93e02a5f18dbe8e

8e4f678651d94011755d87f1878e4f7e6ff9880ef78a1017d84760cdb371a962

ae2a0cf65907cad7c5888ef8dcd4dd66e8e5095a13937c62ee62c48d3c4dc5e9

b6abd70f49ea02723f11b49b2190ae31750cffdf867f7f94f1ef4f22c89343b4

3b10201b04aa42c5ed08f6faff7feb6aed0b2cd95409a1053aa0730a7f1f7eed

27bdef9628ffec40ebd6e510c98aecdc6c6322284937a78c882a7ac1598b50ed

9439d0eefa0150d16217c5f0c422f8404f635bb46581058d8a03be754669eeac

f9d55e5054887d9b714161876b97b2d9df59c0ea183b66569000e12203bc649e

06468fead589c4f5e91a5d4edcd9ca79611c64b942e74581591f0bfb3c82984e

8b40b59077f999f47027df98a8e0ecbfea3a54e70bd46ac3b86b0ae72f023969

4f363419dae1a8384df74e51f76812140a086a388902df086d2c50e109e7286d

2b046c7f474809ee3b79fbeb02ffb318be6cdd0ad7590b2af70dda3d18afee7d

bf00dab757de9f2987d6dbcfc3bb7ee1efec969e3f6ccff1b0488a346b24cbf1

cdfbed1cbe09a700e99b6af91e112906be2385714cdf14b16b88de0f85e36aef

d320b56f3d73d657d3bb7b2dbe5d3c3773299f15e682203bfe488ff972407f3b

 

ANUBIS

33b3cc77ed83f91ded6ef700bfd93d4aace530452a1e688e01c914c4f37e7605

9be76e224fb857a93a3859792dcc368dc16c5ac6df185621c1bbee6044ee9729

25f5300e140d43e5eb6742f27ffca716fab7d143776b906b5d375d3f26d5b35c

3d3db692be45e7bda3694b9f47367c44ecdfcd095328a939442f288b6b5c77e4

6d78e6b11494be4d5a6d2ab6a1b7b60601516ff2d417b1b2c034acdc70ec167b

ccb4f50c45f53bc39a3e4e5c1daf0ecb48ea4c76815a45d713e61e428e9fb276

a3140f71ee376693d574d5961769972a9045b41e4272c732bc87879dde01aa4f

1af99891fbe6320b86c56e5318f1e1a4e53e5ee1cd6439ddb98578b811277cb2

ea1a28ff5880b830314ea6cb5243697065b3a35d35dcf95cf5723bc9fc920de7

f32f20dc68968da557b34ae3f16835f720df39bfae9d96952da7ab725257fb69

d9ebeeccd455e2dbf65acdc70326842343f62d77ce311cfa13e4ea796ba8fc3d

53fc0234c1852a4d92633f03b6f8be706ad2554d04683cbe92427bd0ae079dd5

bc9af7804d8601a1c9a327d4896628923d03b1f2d5573b77d045858fcb1e7c26

77a6d639f659d9390423b654a6c405a6b2862ddfd3eb4406ffaf8b399c83b513

c7775a3ce32ce8936302f971e923bc3fa0dbde3fe48f4a8f4f816d0b803ff034

 

Rhysida

cf69493e7765f91f5ff07db0cdde50d377770978b5a4ffb6cab20c3a220acd92

6f810084ecb920565e9bcdea711bcc1e788d8372727725b0fc5cb2cc8909ea62

845d1aafefc1736a9efd6e09d307abc9953c40290f0fcb8f56c2001c0be599a5

d3ea67651720d26ade4837ffd6e0f8a5d8120491ef4719848fabb494e15d5a0a

d4bfdb76a3ea03dd31a96179394c1c453efd8a3694185a23b7b4ad5178b81e4a

6e289cbf5d7203cf43a35bbd09aec4818c97c9341ea890e160d386b1611fc09c

9cc63a1961f8bb4394b0963261e94f43000a4f8d9f6eb37a83608e401b5f608f

3c56482abfdd26a8fd0e5843557c28c2c7aa6d3e9d7cfef22c469e7ee7d18828

5818f60e9b4213231d97dc7e33f43cf823646da0e5552a9112e479dfcd87bc4b

8220a20a98173ddf2330fe08f84e603ce05bcb686b9caed134ac084a4c63d77a

9e88ac415d6823b48a2de3adf41979ffba16dbfaded7aa8a071ed0a36a211c64

6bfe06fd5e1d3df1a26770822c234eabadff8d7077b147ada48e74ade483a175

3a7b8c4762f3490794790a2e98377af7ed1438150e2d94b1809a7571bb05067d

0256c332fa0156ab7cbf3f44ecfe8e358616f533490f936294b246f9c56ceae3

0050a69d6e93eddcd1ea4b7e951945f8970e5700d9436238bde7f63d757988ae

 

LockBit

911a7c16d81af4714ff2239028a7c5c65bce541175e77004a763854b207ec34e

e85d5b739c510bb3db9de81c11f09ad3eb6806e3362a9abc59ab75c679f8a1c4

e45df726061253ad13fcf8fed548b4f2d5d1dde8d98ac65f2478c1352bf67f03

58ba719453346a433d974976f39e06a5f103684959f1228466ba02ba9ef4182a

49c30eab089183dc0644b3836e924c3f4f42a80a3ed9c0ffb7705254354566dd

a5bfb7a7bfaf645edc78e30796d38508603ae1ea7aa76484138433badcdab329

7be35e662568c8bf8ba478f5e3cd547caf161dc0a433c87615fcdae6cc24594e

2ae19c0f05abacc036f400c290018fda40ae7f72043af705f3b25f31a491b4be

a1aad716ef61cc29379a4fd096f891f86b3aa8c4aea038a09b59e61cc1d36302

c32710f593c26bb8055c4bd3b087165e636ad99fca78c5178e5ab5ad40198e47

08eb5e4b21105373f07c76622ffd0f5d9b7e42f5b6035206f1d399431b7be6e8

f9fb816a81b732b0631d9c1bed2958edc47ca52160c0bb03db352872bbd6cbd9

1129a6c4350a0f452c9a441ec7b847bdbad252f4aacdcc85145473cbcd3fcc52

baf54c7af3955552a324b4ffc16872a1cebc498a46c9cfb82b24bbd412e0aa6f

a003915423021c94c18ded624ac1a1dd393c0e8e94cf962999613ad638d7ed32

 

ALPHV/BlackCat

322ac1edd3e37f39e83bd4c52a0b2648971833a79f80c26680d15d7b5ee0f7d8

ecd3d2d2c06be58865dc5150afeb8c475754440172aa6009592d1571cdd203d2

7c4ce406a1755873a8b06add39e084dcf5de66351520a1bf254eb306972737d7

8eeb26a93c4073376ee489670a63951edf577ea604a86a8a16cbf99e6c9be8dd

c131187b15035868e43baa0c746c99e7da9e0d881a014b97f8e14b6e04e4d39e

5d78f460a633493b198134c75cc288f05d6ab6b030793bec8acb66c97d7134d9

db587901bf335ff024b9d468a0d9ab4c443e8289e58b25f849d21cfca0c38497

7a59bd57e7947b4c2beafe8c04ec145203a90192465f4df4a929075650b9520d

9f5c88b68508710dde3c9893dd7ae14de10ce4d749cef17bed90c446eb40a33a

8c69eec98181203617e36c90b7d37accd96f9fbb2c1d2379f49ef4c5c37b5bb9

f07c511d73520cab8aeb054e40580ed27310dbc12c5e114ca7a17edfe166ffe4

1f0668ecf40948f3d7bd839f26a016e608bb9c7c54a635cbdba8d1e2f93edbfd

908344f79ca6966e9d6f298b7d2b3584a2b0de0a3cd500d4da1dc51134d64e5c

b5bc11739c38bffbc234c95b35f5e237774303f1a0e48c76a62a56fe26fff53f

d6ad5842846c8bae68d05ab1520797346281fa10017666869d15726ae8da1e87

 

Qilin

41870d512f107c019caf0dcf3b36f38667e5979c74d7f8d3f526758f18bffb38

db7d2cf9e276307fd8b2ee68ff9ac1d500d9aa7fd305e23ed0fe188a7b5b54b9

cd9cceeee24d80862dfbed92a5730cbeebe5c376b1e60d6214016f31d402a45f

87c818abe58388b4ad7180640ff08d8ac988ea74eb7f540367f756c0e7f0780a

360fe852aa900333145f95e64a956c294950754e590772bb45071f871a464b2d

ac1e24738db284fdc36fe5c6b1e7cfab1c773a4f60f178d4bfa45df487b599fe

4eac69e5cb9e4101d1eb76ec1e8cea128d3e10d577e28d7e954f72ba477214b8

0652209388559ab60da3fa56985bc5596d8b6fb785bc456d64943ab9b9a065f4

3db4e6a271465643e669753592044b879bf107c1e200091295cff928ce1171b4

61d29bf4b6c7fc706839bcb13583410c46c838707424380aae7496e35889b687

fb28c7291d212097db6e82a5c11e2306d364569fdaf095a9abbf5a681462064a

dbcad7f3121dd0ccbcac1315337b25789fa86ca976472bea0531762d87b801a3

e2bb66a2c06d0a681f03723d8918a5ba9efeb63f7576ea325fcae6f8261c5768

79143992c007f9c791bf656fb91377423441a18793ab0ad9e0f8986c891ade90

005a02b2294d897d9cfe1f4a517e083267a7c82e00063e4c51a14b53d774b760

 

MedusaRansomware

c8049e4fcd3dac8c64395fbe3a5d0bc962ff51be8f83cb924331b44ec715bced

37e88752e0c9a780507d5f41a287de8b29a3e2b6afefd02a44db5f2ef7a50ae0

8983b3098019f33486997b071b543327443b1893abc640cf4468517c22f0f01b

daaec57c0ab3706906b9825c8b3b183c1942b96774f4c04c0f1f1d68690cdb49

521f4a86f7838f7bc01769b769356a48b8790bd9e1b2a8648b46ab6b16626fc3

d09d8c701e9e4192f805f5c8803e95371a91cb65d8a54d29bfd6cf717cd89bd0

7a55c6b9b7b0bbc29826a14936953f9861f75bf7cc2d74aecdc375d2f77650a2

10255000e4d52789111be47392001da6f35db6d93743aae798811a5e114c4058

1039a0cb717d8b5dbbe8eb3fe89c23d1d2ef042697a3a4907bc65f8d4a87895e

470d350f4ec525e2a5c41a7b05d902fbc6920de084c0fb75ab4799edd2a806a7

8a7147db7910d616e677f1b433fbfcadc755ea42e8133e3b2729c50f8ec7c571

39448a6d096ea2155b7c30fa835449b5e417d6c7d4dcecb671ce9bf100cb62c2

3f8c3b7658bce59b0ee564f0936d29a266fd588110cb06d0e77eaac7a9b12ec3

ebc38c287913ba9241548169cbdac5f7c3d7616e5df76d2198d2a6a8418de0a6

a2d59325a7fde797af67d0000dada6cb4177457f3cb1fb9fa3dfe4449f28ee8b

 

TheGentlemen

22b38dad7da097ea03aa28d0614164cd25fafeb1383dbc15047e34c8050f6f67

2ed9494e9b7b68415b4eb151c922c82c0191294d0aa443dd2cb5133e6bfe3d5d

3ab9575225e00a83a4ac2b534da5a710bdcf6eb72884944c437b5fbe5c5c9235

48d9b2ce4fcd6854a3164ce395d7140014e0b58b77680623f3e4ca22d3a6e7fd

62c2c24937d67fdeb43f2c9690ab10e8bb90713af46945048db9a94a465ffcb8

860a6177b055a2f5aa61470d17ec3c69da24f1cdf0a782237055cba431158923

87d25d0e5880b3b5cd30106853cbfc6ef1ad38966b30d9bd5b99df46098e546c

8c87134c1b45e990e9568f0a3899b0076f94be16d3c40fa824ac1e6c6ee892db

91415e0b9fe4e7cbe43ec0558a7adf89423de30d22b00b985c2e4b97e75076b1

994d6d1edb57f945f4284cc0163ec998861c7496d85f6d45c08657c9727186e3

9f61ff4deb8afced8b1ecdc8787a134c63bde632b18293fbfc94a91749e3e454

a7a19cab7aab606f833fa8225bc94ec9570a6666660b02cc41a63fe39ea8b0ad

b67958afc982cafbe1c3f114b444d7f4c91a88a3e7a86f89ab8795ac2110d1e6

c7f7b5a6e7d93221344e6368c7ab4abf93e162f7567e1a7bcb8786cb8a183a73

ec368ae0b4369b6ef0da244774995c819c63cffb7fd2132379963b9c1640ccd2

efaf8e7422ffd09c7f03f1a5b4e5c2cc32b05334c18d1ccb9673667f8f43108f

f736be55193c77af346dbe905e25f6a1dee3ec1aedca8989ad2088e4f6576b12

fc75ed2159e0c8274076e46a37671cfb8d677af9f586224da1713df89490a958

788ba200f776a188c248d6c2029f00b5d34be45d4444f7cb89ffe838c39b8b19

 

NetRunner

6c1f961b27a9ce4348dec24210c640471b74e23e19108770228251ebf6267106

77619d07ad663028d2da71d7a7aa6aee3deac355327f9dd42cf7d7a9a8c63254

c663a516b286e6f791ec18fe85848d72b9f34e517ba949506a2a5c6999e56449

121d9e29c0c2d16241e206dceb5b9f07300cd8881e2ee51ecc434f5a94ad351b

0182fa149c967cb0cd5bba410ed6a6b74e243eecf60fcde315fccf81c4c8b743

d3ee457f1476e976415b00cbabb6d44f15f168eb811746f0be41c7f406cd3163

e3e411b55c859d05b834ebad44b9c984170deab09d1068134d504c72d8bff07a

42d33d25820886ab249eb7f5bcd58b3bae21d57ecd5feb431e3439ea7bebf177

5a9e4ec588c14106664e66ad1da120cf49b5d4b22f0bda8bf5810123494fe20b

fcb362d60ee80a3c149a822f13f2278d62fed9f5c0e84b2869d6e928ad012c5e

d913c9ad8a62789d256419408f3bb591cb5778e0d33fe95ce9e7ed5ccd96c01e

9d566e97bed38f5b3cd4a5dacce6c003886d7fc180c36a1896aa0e09650fae58

abd6505cd3a0273c53d5f7e692e8d631684345af730c2d185471e69ec8e42516

21c1b585d3b5b7ecfda570f57899914192a6dd25965ebd61fd67a1de3918471a

5c5b453ef5b0b6c9e3717865ad72d5a2c5dafa6435417daaad5fc96acdecaf1b

 

Genesis

68823b7cafbb036c45b9cbf944c732b3702c8123dd7a83ccbbb04611ae4831eb

3e26e4300e90cb6e5fb2a77fb979a451aad8868bd603aee3d3486f21625e8a71

74ff4ff97c0c65e4a9657f8ba258ba81f23a7e7eff495b39a6da32cb9ec6fdec

961dee91fa582e6832e00e113434ed79a518f0ac54fd93ab6753fc565e15a0fe

c9b2488ab234c6a3e678e1c9d5320af0000f81805cc24ae52f626e25a58b2a71

3f304616418cadbedf4ce79cdf24f0e03fcc3d6757ffc0ebeece367c0a7ddd2d

66ca8e1ddc2599ba9c2c14488aeb0d1fe702045790845b68f79cf78edc0d8250

26595fb6e30d67d26a6ee13cb36fbb9225f9d4a64e1789ee7af85424f43d967d

2a4a370f395e4c94e416058739813e24de6c8be2f527242be88872f557839d88

266aa87020ec4ddcd60099cfaf7283ff7b6dde562e4978e78b12706a909bee18

07f5255526c62595ccdc18522bd8b1409b1aea8b35eb457128de5285372d17e1

2d44a32debfd3f576d2c56bc3edffe448dedbaaa79dec2fb47c8ec4d5c3ff60b

4b9b4c4be8efe4431c8b012df1483363656363648ad624d6fed851d85b081512

f0112648b66efbf4315965314b7cb4aa048532a9698d2791dc02003696bcdf42

99bd373803d36b46e67b70202399bc0a54b31e809710a87618318abe2c6b9207

 

Pay2Key

cf5a02b9aed5d4b3c82f596dd066d4de39a5656b34e3f49df8a390407078cf33

f7130464821513644ab5aa4b495126f7ae62e56f10d300d7ca73fb9561211695

d2b612729d0c106cb5b0434e3d5de1a5dc9d065d276d51a3fb25a08f39e18467

 

Handala

e28085e8d64bb737721b1a1d494f177e571c47aab7c9507dba38253f6183af35

4491901eff338ab52c85a77a3fbd3ce80fda738046ee3b7da7be468da5b331a3

fe07dca68f288a4f6d7cbd34d79bb70bc309635876298d4fde33c25277e30bd2

865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4

 

Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.

Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.