Jump to content
  • Sign Up
×
×
  • Create New...

Recommended Posts

  • Diamond Member



Qilin ransomware gang publishes stolen NHS data online

Ransomware gang Qilin has published almost 400GB of sensitive healthcare data online following its high-profile malware ******* on pathology laboratory Synnovis, which processes blood tests for NHS organisations across London.

The ransomware incident – which was first detected on 3 June – has affected a number of NHS trusts and GP surgeries using Synnovis’s services across the capital, prompting major disruptions in their ability to deliver patient care, including through blood stock shortages, delays in medical procedures and cancelled appointments.

On 21 June, NHS England said it was made aware that Qilin had published huge amounts of Synnovis’s stolen data online the night before, and that it is working with the company, the National Cyber Security Centre (NCSC) and others to determine the content of the published files as quickly as possible.

“This includes whether it is data extracted from the Synnovis system, and if so whether it relates to NHS patients,” it said in a statement. “As more information becomes available through Synnovis’s full investigation, the NHS will continue to update patients and the public.”

The Russia-based ransomware gang has been attempting to extort Synnovis since hacking the firm, previously telling the BBC they would publish the private information online unless they got paid.

This is the hidden content, please
, the data now uploaded to Qilin’s darknet site and Telegram channel includes patient names, dates of birth, NHS numbers and descriptions of blood tests, but it’s currently unknown if test results are also included in the data.

Business account spreadsheets have also been uploaded, detailing arrangements between hospitals, GP services and Synnovis.

Published online

Commenting on the data dump, a Synnovis spokesperson said: “Last night a group claiming responsibility for the cyber ******* published data online that they allege belongs to Synnovis.

“We know how worrying this development may be for many people. We are taking it very seriously and an analysis of this data is already underway. This analysis, run in conjunction with the NHS, the National Cyber Security Centre and other partners, aims to confirm whether the data was taken from Synnovis’s systems and what information it contains. We will keep our service users, employees and partners updated as the investigation progresses.”

This is the hidden content, please
 on 5 June, former NCSC chief executive Ciaran Martin said it was unlikely the gang would receive any money thanks to the *** government’s policy of not allowing public sector organisations to pay ransoms, although he noted that Synnovis, as a private sector organisation, is not under such restrictions.

Martin added that the gang was likely just looking for a quick pay-off and probably didn’t expect to cause such intense disruption when it attacked Synnovis.

Between 10 and 16 June, the second week after the *******, more than 320 planned operations and 1,294 outpatient appointments were postponed at King’s College Hospital NHS Foundation Trust and Guy’s and St Thomas’ NHS Foundation Trust.

In total, 1,134 operations have been cancelled in the wake of the *******, which also affected the South London and Maudsley NHS Foundation Trust and Oxleas NHS Foundation Trust, along with GP surgeries, clinics and services in Bexley, Bromley, Greenwich, Lambeth, Lewisham and Southwark.

“Unfortunately, healthcare organisations have been – and will continue to be – a prime target for ransomware attacks because the services they provide are so critical to the communities they serve, and this puts pressure on the targets to get back online as fast as possible,” said Peter Mackenzie, director of incident response at Sophos.

“Further complicating matters is the rise in supply chain attacks across industries,” he said. “They are a preferred method of compromise for a number of ********* groups because, as well as being difficult to defend against, they also have a ripple effect, allowing attackers to infiltrate multiple systems at a time. In fact, IT and cyber professionals working in the *** healthcare sector perceive partners and the supply chain to be their single biggest cyber security risk.”

According to Comparitech, the Qilin gang was responsible for eight confirmed attacks in 2023, and so far this year has claimed over 30.

The ransomware-as-a-service operation uses the now standard double extortion tactic to pressurise its victims. Its ransomware locker uses the cross-platform coding languages Rust and Golang, and spreads mostly through phishing emails – although it has also been known to use exposed applications and interfaces, including remote desktop protocol and Citrix.

Earlier in 2024, it attacked the systems of ***-based publisher and social enterprise The Big Issue, stealing over 500GB of personnel and partner information, contracts, and financial and investment data.





This is the hidden content, please

#Qilin #ransomware #gang #publishes #stolen #NHS #data #online

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.