Between April 28 and April 29, 2026, APT73/Bashe executed ransomware attacks against Al-Gosaibi GTB (a financial services entity) and Medika Plaza (a healthcare provider), according to DeXpose threat reporting aggregated across 17 independent signals. Both attacks remain active as of the last observation window.
What makes this noteworthy: The group is demonstrating operational capability against two distinct critical sectors—financial services and healthcare—within a compressed timeframe. Financial institutions and hospitals represent high-value targets because of their operational dependence on systems availability and their historically elevated willingness to negotiate ransom settlements to restore service.
The geographic focus on the Middle East suggests either targeted sectoral reconnaissance or access development against specific regional networks. The parallel targeting of both sectors within hours of each other may indicate either: (a) opportunistic exploitation of pre-existing access across multiple organizations, or (b) a deliberate campaign to maximize disruption and negotiation pressure across a wider operational theater.
Why this matters: Ransomware attacks on financial infrastructure can disrupt payment processing, settlement systems, and cash liquidity. Healthcare facility compromises create direct patient safety risk by degrading diagnostic and treatment systems. The active status of both incidents as of April 29 means remediation and recovery are still underway—critical visibility into real-time threat operations remains limited to private threat intelligence sources.
What to watch: Monitor sector-specific incident response channels and regional financial/healthcare ISACs for indicators of whether these attacks represent isolated incidents or early signals of a broader APT73/Bashe campaign arc. Watch for any public statements from affected organizations acknowledging system restoration timelines or ransom negotiations, which would confirm active operational impact beyond the initial intrusion.