OneBlood reports data breach to state regulators after ransomware attack

Avatar

Names and Social Security numbers were stolen from the nonprofit blood donation organization OneBlood during a ransomware attack last year. 

The organization, which provides blood to healthcare facilities across the southeastern U.S., reported a cyberattack to regulators in Maine, Vermont and Massachuests this week but declined to say how many people were impacted by the incident.

In the letters to victims, OneBlood said it discovered suspicious activity on its network around July 26 last year.

During a two-week period that month, they said, “certain files and folders were copied from our network without authorization.”

“We conducted a comprehensive review of the affected files to identify the types of information contained in them and to whom the information relates,” the organization said. 

The company completed its review in mid-December. 

Law enforcement was notified about the attack, according to the letters, and OneBlood will be offering victims one year of credit monitoring services. 

Maine’s incident reporting site asks organizations to list how many total people were affected by a breach but OneBlood took the unusual step of leaving that part of the form blank, only writing that 281 people based in Maine were impacted. OneBlood did not respond to requests for comment. 

The attack on OneBlood forced the organization to operate at reduced capacity for days, limiting the amount of blood that could be provided to the 250 hospitals it serves across Alabama, South Carolina, Florida, Georgia and North Carolina. 

The hospitals had to activate their critical blood shortage protocols and OneBlood had to manually label blood products due to the ransomware attack, CNN reported

No ransomware gang ever took credit for the attack. 

NewsNews BriefsCybercrimePrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

No new funding in EU plan to tackle ransomware attacks against hospitals

Related Posts

Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite

A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. "This flaw allows an unauthenticated local attacker to
Avatar
Read More

CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation as a zero-day. The vulnerability in question, tracked as CVE-2024-9537 (CVSS v4 score: 9.3), refers to a bug involving an unspecified third-party component that could
Avatar
Read More