OneBlood reports data breach to state regulators after ransomware attack

Avatar

Names and Social Security numbers were stolen from the nonprofit blood donation organization OneBlood during a ransomware attack last year. 

The organization, which provides blood to healthcare facilities across the southeastern U.S., reported a cyberattack to regulators in Maine, Vermont and Massachuests this week but declined to say how many people were impacted by the incident.

In the letters to victims, OneBlood said it discovered suspicious activity on its network around July 26 last year.

During a two-week period that month, they said, “certain files and folders were copied from our network without authorization.”

“We conducted a comprehensive review of the affected files to identify the types of information contained in them and to whom the information relates,” the organization said. 

The company completed its review in mid-December. 

Law enforcement was notified about the attack, according to the letters, and OneBlood will be offering victims one year of credit monitoring services. 

Maine’s incident reporting site asks organizations to list how many total people were affected by a breach but OneBlood took the unusual step of leaving that part of the form blank, only writing that 281 people based in Maine were impacted. OneBlood did not respond to requests for comment. 

The attack on OneBlood forced the organization to operate at reduced capacity for days, limiting the amount of blood that could be provided to the 250 hospitals it serves across Alabama, South Carolina, Florida, Georgia and North Carolina. 

The hospitals had to activate their critical blood shortage protocols and OneBlood had to manually label blood products due to the ransomware attack, CNN reported

No ransomware gang ever took credit for the attack. 

NewsNews BriefsCybercrimePrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

No new funding in EU plan to tackle ransomware attacks against hospitals

Related Posts

Dutch DPA Fines Netflix €4.75 Million for GDPR Violations Over Data Transparency

The Dutch Data Protection Authority (DPA) on Wednesday fined video on-demand streaming service Netflix €4.75 million ($4.93 million) for not giving consumers enough information about how it used their data between 2018 and 2020. An investigation launched by the DPA in 2019 found that the tech giant did not inform customers clearly enough in its privacy statement about what it does with the data
Avatar
Read More

5 Steps to Boost Detection and Response in a Multi-Layered Cloud

The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt cloud environments, security strategies have largely focused on "shift-left" practices—securing code, ensuring proper cloud posture, and fixing misconfigurations. However, this approach has led to an over-reliance on a multitude of DR tools spanning
Avatar
Read More