Security

Cyber-crime

Ransomware infection cuts off blood supply to 250+ hospitals

Scumbags go for the jugular


A ransomware attack against blood-donation nonprofit OneBlood, which services more than 250 American hospitals, has "significantly reduced" the org's ability to take, test, and distribute blood.

In a notice today, OneBlood revealed the intrusion disrupted a "software system," and had forced the organization to use manual processes and procedures to remain operational. The outfit provides blood for healthcare facilities across Florida, Georgia, North Carolina, and South Carolina.

We have asked the hospitals we serve to activate their critical blood shortage protocols

"Manual processes take significantly longer to perform and impact inventory availability," OneBlood spokesperson Susan Forbes explained in a statement.

"In an effort to further manage the blood supply we have asked the more than 250 hospitals we serve to activate their critical blood shortage protocols and to remain in that status for the time being."

Other blood centers across the US are sending blood and platelets to OneBlood, with the AABB Disaster Task Force coordinating the national response. And while all blood types are in demand, the nonprofit says there's an urgent need for O Positive, O Negative, and platelet donations.

The org is working with cybersecurity specialists and government agencies to respond to the intrusion. While the spokesperson didn't indicate a timeframe to recover the infected computer system, Forbes said incident responders are "working diligently to restore full functionality to our systems as expeditiously as possible."

Forbes didn't immediately respond to The Register's questions – including how the intruders gained access to the blood bank's network, who was responsible for the ransomware infection, and whether they demanded a payment from the nonprofit. It's also unclear if any sensitive information was stolen.

When giving blood at one of the organization's centers, donors are asked about their medical history, blood type, test results, and other personal details. 

In a Q&A section on the website, under "Has my personal data been compromised?" the nonprofit says only that it "does not have additional information at this time and will provide relevant updates as the investigation continues."

So far, it doesn't appear that any of the usual suspects have claimed responsibility for the intrusion. The ransomware infection does, however, sound similar to the Qilin attack against NHS England pathology services provider Synnovis in June. 

That incident canceled blood transfusions and surgeries at London hospitals and incurred the wrath of both UK and US police. 

Also in June, the US Department of Health and Human Services issued a warning [PDF] about Qilin, and pinned at least 15 healthcare sector infections since October 2022 on that particular gang. About half of these were targeting American organizations in Indiana, Florida, Ohio, Georgia, Minnesota, Nevada, and Arizona. ®

Send us news
39 Comments

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Enzo Biochem ordered to cough up $4.5 million over lousy security that led to ransomware disaster

Three state attorneys general probed the company and found plenty to chastise

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals