Security

Cyber-crime

Ransomware infection cuts off blood supply to 250+ hospitals

Scumbags go for the jugular


A ransomware attack against blood-donation nonprofit OneBlood, which services more than 250 American hospitals, has "significantly reduced" the org's ability to take, test, and distribute blood.

In a notice today, OneBlood revealed the intrusion disrupted a "software system," and had forced the organization to use manual processes and procedures to remain operational. The outfit provides blood for healthcare facilities across Florida, Georgia, North Carolina, and South Carolina.

We have asked the hospitals we serve to activate their critical blood shortage protocols

"Manual processes take significantly longer to perform and impact inventory availability," OneBlood spokesperson Susan Forbes explained in a statement.

"In an effort to further manage the blood supply we have asked the more than 250 hospitals we serve to activate their critical blood shortage protocols and to remain in that status for the time being."

Other blood centers across the US are sending blood and platelets to OneBlood, with the AABB Disaster Task Force coordinating the national response. And while all blood types are in demand, the nonprofit says there's an urgent need for O Positive, O Negative, and platelet donations.

The org is working with cybersecurity specialists and government agencies to respond to the intrusion. While the spokesperson didn't indicate a timeframe to recover the infected computer system, Forbes said incident responders are "working diligently to restore full functionality to our systems as expeditiously as possible."

Forbes didn't immediately respond to The Register's questions – including how the intruders gained access to the blood bank's network, who was responsible for the ransomware infection, and whether they demanded a payment from the nonprofit. It's also unclear if any sensitive information was stolen.

When giving blood at one of the organization's centers, donors are asked about their medical history, blood type, test results, and other personal details. 

In a Q&A section on the website, under "Has my personal data been compromised?" the nonprofit says only that it "does not have additional information at this time and will provide relevant updates as the investigation continues."

So far, it doesn't appear that any of the usual suspects have claimed responsibility for the intrusion. The ransomware infection does, however, sound similar to the Qilin attack against NHS England pathology services provider Synnovis in June. 

That incident canceled blood transfusions and surgeries at London hospitals and incurred the wrath of both UK and US police. 

Also in June, the US Department of Health and Human Services issued a warning [PDF] about Qilin, and pinned at least 15 healthcare sector infections since October 2022 on that particular gang. About half of these were targeting American organizations in Indiana, Florida, Ohio, Georgia, Minnesota, Nevada, and Arizona. ®

Send us news
39 Comments

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Atos denies Space Bears' ransomware claims – with a 'but'

Points finger at third-party infrastructure being breached

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

UK floats ransomware payout ban for public sector

Stronger proposals may also see private sector applying for a payment 'license'

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed

How cops taking down LockBit, ALPHV led to RansomHub's meteoric rise

Cut off one head, two more grow back in its place