OneBlood reports data breach to state regulators after ransomware attack

Avatar

Names and Social Security numbers were stolen from the nonprofit blood donation organization OneBlood during a ransomware attack last year. 

The organization, which provides blood to healthcare facilities across the southeastern U.S., reported a cyberattack to regulators in Maine, Vermont and Massachuests this week but declined to say how many people were impacted by the incident.

In the letters to victims, OneBlood said it discovered suspicious activity on its network around July 26 last year.

During a two-week period that month, they said, “certain files and folders were copied from our network without authorization.”

“We conducted a comprehensive review of the affected files to identify the types of information contained in them and to whom the information relates,” the organization said. 

The company completed its review in mid-December. 

Law enforcement was notified about the attack, according to the letters, and OneBlood will be offering victims one year of credit monitoring services. 

Maine’s incident reporting site asks organizations to list how many total people were affected by a breach but OneBlood took the unusual step of leaving that part of the form blank, only writing that 281 people based in Maine were impacted. OneBlood did not respond to requests for comment. 

The attack on OneBlood forced the organization to operate at reduced capacity for days, limiting the amount of blood that could be provided to the 250 hospitals it serves across Alabama, South Carolina, Florida, Georgia and North Carolina. 

The hospitals had to activate their critical blood shortage protocols and OneBlood had to manually label blood products due to the ransomware attack, CNN reported

No ransomware gang ever took credit for the attack. 

NewsNews BriefsCybercrimePrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

No new funding in EU plan to tackle ransomware attacks against hospitals

Next Post

Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager

Related Posts

North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps

The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting Korean and English-speaking users. Lookout, which shared details of the malware campaign, said the earliest versions date back to March 2022. The most recent samples were flagged in March 2024. It's not clear how successful these efforts were. "
Avatar
Read More

European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China

Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users' data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield user data
Avatar
Read More