Security

Cyber-crime

Ransomware infection cuts off blood supply to 250+ hospitals

Scumbags go for the jugular


A ransomware attack against blood-donation nonprofit OneBlood, which services more than 250 American hospitals, has "significantly reduced" the org's ability to take, test, and distribute blood.

In a notice today, OneBlood revealed the intrusion disrupted a "software system," and had forced the organization to use manual processes and procedures to remain operational. The outfit provides blood for healthcare facilities across Florida, Georgia, North Carolina, and South Carolina.

We have asked the hospitals we serve to activate their critical blood shortage protocols

"Manual processes take significantly longer to perform and impact inventory availability," OneBlood spokesperson Susan Forbes explained in a statement.

"In an effort to further manage the blood supply we have asked the more than 250 hospitals we serve to activate their critical blood shortage protocols and to remain in that status for the time being."

Other blood centers across the US are sending blood and platelets to OneBlood, with the AABB Disaster Task Force coordinating the national response. And while all blood types are in demand, the nonprofit says there's an urgent need for O Positive, O Negative, and platelet donations.

The org is working with cybersecurity specialists and government agencies to respond to the intrusion. While the spokesperson didn't indicate a timeframe to recover the infected computer system, Forbes said incident responders are "working diligently to restore full functionality to our systems as expeditiously as possible."

Forbes didn't immediately respond to The Register's questions – including how the intruders gained access to the blood bank's network, who was responsible for the ransomware infection, and whether they demanded a payment from the nonprofit. It's also unclear if any sensitive information was stolen.

When giving blood at one of the organization's centers, donors are asked about their medical history, blood type, test results, and other personal details. 

In a Q&A section on the website, under "Has my personal data been compromised?" the nonprofit says only that it "does not have additional information at this time and will provide relevant updates as the investigation continues."

So far, it doesn't appear that any of the usual suspects have claimed responsibility for the intrusion. The ransomware infection does, however, sound similar to the Qilin attack against NHS England pathology services provider Synnovis in June. 

That incident canceled blood transfusions and surgeries at London hospitals and incurred the wrath of both UK and US police. 

Also in June, the US Department of Health and Human Services issued a warning [PDF] about Qilin, and pinned at least 15 healthcare sector infections since October 2022 on that particular gang. About half of these were targeting American organizations in Indiana, Florida, Ohio, Georgia, Minnesota, Nevada, and Arizona. ®

Send us news
39 Comments

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks

IOCONTROL targets IoT and OT devices from a ton of makers, apparently

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware

Heart surgery device maker's security bypassed, data encrypted and stolen

Sounds like th-aorta get this sorted quickly

China's Salt Typhoon recorded top American officials' calls, says White House

No word yet on who was snooped on. Any bets?