Patients left in the dark months after cybercriminals leak testing lab data

Avatar

More than 11 months after a ransomware group published information from a U.K. pathology services company, the affected patients still have not been informed about what data of theirs was exposed in the incident, with material about sexually transmitted infections and cancer cases being included in the leaks.

The data was compromised during an attack by the Qilin cybercrime group against London-based Synnovis last June. The attack severely disrupted care at a large number of National Health Service (NHS) hospitals and care providers in London.

Synnovis maintains an information page about the incident, but it still has not provided an estimate of the number of patients impacted, nor a detailed list of what data was published by the criminals. The page confirms that some patient information was compromised, and says: “In some circumstances this information may contain personal data such as names, NHS numbers and test codes (identifying the requested test), although analysis is ongoing.”

Contacted again this week, the company described the process as “significantly advanced” but still ongoing.

An analysis of the data by data breach specialists CaseMatrix suggests more than 900,000 individuals were impacted, with the published material including names, dates of birth, NHS numbers, and in some cases personal contact details. But the most sensitive information CaseMatrix identified included pathology and histology forms used to share patient details between medical departments and institutions. These forms often describe symptoms of intimate and private medical conditions, including cancer and STIs.

Immediately following the attack, Synnovis had to focus on recovering its critical blood testing services. The impact of the cyberattack severely reduced blood stocks across the United Kingdom as medical professionals were forced to use universal donor types because of limitations on blood matching, leaving several hospitals on the brink of limiting transfusions to only the most critical patients.

Three months after the incident, when Synnovis announced having successfully rebuilt the majority of its core IT systems and recovered its diagnostic services, individuals whose data was compromised in the attack had still not been provided with even a preliminary warning about the sensitivity of what was exposed.

At the time, Synnovis said it had “initiated an eDiscovery process shortly after the cyberattack to interrogate the data that was stolen and to identify any organisations and individuals it may relate to,” and last September described the process as “advanced.” 

Synnovis stated: “We will notify any relevant organisations directly should this process determine that data associated with their organisation was impacted.”

A spokesperson for two NHS Trusts that used Synnovis — Guy’s Hospital and St Thomas’ and King’s College Hospital — told Recorded Future News they were awaiting the outcome of Synnovis’ eDiscovery process to be notified about what data had been affected.

A spokesperson for NHS England redirected Recorded Future News to Synnovis.

According to guidance from the Information Commissioner’s Office (ICO), Britain’s privacy laws recognise that data breaches cannot always be fully investigated within a short time period — but there remains a legal requirement for organisations to inform data subjects about the compromise of sensitive details.

A relevant example published by the ICO states: “A hospital suffers a breach that results in accidental disclosure of patient records. There is likely to be a significant impact on the affected individuals because of the sensitivity of the data and their confidential medical details becoming known to others. This is likely to result in a high risk to their rights and freedoms, so they would need to be informed about the breach.”

A spokesperson for Synnovis stated:  “We understand and share the eagerness for this investigation to conclude. It is nearing completion, which is significant progress, and allows us to now finalise the processes and mechanisms required to update any affected organisations and individuals as appropriate.”

CybercrimeNewsIndustryPrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

Next Post

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

Related Posts

Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now

For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks
Avatar
Read More

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a threat actor known as SideWinder. "The attackers used spear phishing emails paired with geofenced payloads to ensure that only victims in specific countries received the malicious content," Acronis researchers Santiago Pontiroli, Jozsef Gegeny, and Prakas
Avatar
Read More

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously unreported tooling, highlighting continued effort by the threat actors to increase the sophistication and effectiveness of their malware. This includes updated versions of a known backdoor called TONESHELL, as well as a new lateral movement
Avatar
Read More