Ransomware Strikes Again: Cl0p Breach Exposes NHS Invoice Data, Raises Fraud Fears

Cl0p ransomware strikes Barts Health NHS Trust, exploiting a vulnerability in Oracle E-Business Suite to nab invoice data. The breach exposed names, addresses, and payment details. While clinical records remain safe, Barts urges everyone to review invoices and stay vigilant. Remember, in the world of ransomware, it’s always “Cl0p” o’clock somewhere!

Pro Dashboard

Hot Take:

Well, it seems the Cl0p ransomware gang has decided to play Robin Hood, except instead of stealing from rich and giving to poor, they’re just stealing data and giving it to the dark web. Barts Health NHS Trust was the latest victim, caught off guard like a deer in the headlights. If only the Oracle E-Business Suite had a crystal ball feature to predict these breaches!

Key Points:

  • Cl0p ransomware exploited a vulnerability in Oracle E-Business Suite to steal files from Barts Health NHS Trust.
  • 241 GB of data, including patient invoices and supplier payment details, was leaked.
  • Clinical systems and patient records remained unaffected, but personal data was compromised.
  • The breach occurred in August and went unnoticed until November when the data appeared on the dark web.
  • Barts is working with authorities and has advised patients to check their invoices for potential data involvement.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?