Header image

NHS Attackers Leak Patient Data

The data is suspected to have been breached from Synnovis.

The Qilin threat actor has published around 400GB of patient names, dates of birth, NHS numbers and descriptions of blood tests.

The name of the attackers was disclosed when it was revealed it had been seeking a $50 million payment to stop the attack on Synnovis, a provider to London hospitals who have had to cancel more than 1500 procedures.

According to BBC News, Qilin previously told the BBC they would publish the data unless they got paid. NHS England told the BBC it was aware of the publication of the data, but could not be completely sure the shared data was real.

Conor Agnew, lead cyber security assessor at Closed Door Security called the ongoing incident “the worst outcome of any cyber incident.”

Agnew said: “We don’t know how Qilin breached Synnovis’s network, but the attackers are not backing down. They have set their demand, and they want to be paid. This recent leak is to apply more pressure on Synnovis and motivate the company into paying, while demonstrating the highly sensitive data the Qilin now has in its possession.”


Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

11
Jul

Beyond Cloud Security Posture Management:

Validating Cloud Effectiveness with Attack Simulation

image image image image