Hackers in London hospitals leak stolen blood test results

Hackers in London hospitals leak stolen blood test results

A gang of cyber criminals has caused significant disruption to multiple London hospitals by publishing sensitive data stolen from an NHS blood testing company. The group, known as Qilin, shared almost 400GB of private information on their darknet site and Telegram channel. This data includes patient names, dates of birth, NHS numbers, and descriptions of blood tests, along with business account spreadsheets detailing financial arrangements between hospitals, GP services, and Synnovis, the hacked company.

The NHS and Synnovis are working to determine the authenticity and scope of the published data, which has raised concerns about patient privacy and the impact on healthcare services. The ransomware attack on Synnovis has been described as one of the worst cyber-attacks in the UK, affecting over 1,000 hospital and GP appointments and operations.

Ransomware expert Brett Callow warns that healthcare organizations are increasingly targeted by hackers due to the potential for large ransom payments. Despite efforts to negotiate with Qilin, Synnovis did not pay the ransom, leading to the publication of the stolen data.

Qilin claims to have targeted Synnovis as a form of protest against the UK government, citing a lack of support in an unspecified war. However, their activist motives are met with skepticism, given their history of extorting money from various organizations worldwide. The group’s refusal to disclose their location or political allegiances adds to the mystery surrounding their operations.

While the origin of the cyber criminals remains uncertain, the incident highlights the growing threat of ransomware attacks on critical infrastructure and the need for enhanced cybersecurity measures. As law enforcement agencies continue to investigate the situation, it is essential for organizations to prioritize cybersecurity resilience and readiness to mitigate the impact of cyber threats.