- Barts Health NHS Trust has confirmed that Cl0p ransomware exploited Oracle E-Business Suite, stealing invoice data
- Exposed information includes names, addresses and records of patients and former staff members.
- Trust says systems remain secure, seeks High Court order to block use of data
Barts Health NHS Trust is the latest organization to confirm it has suffered a ransomware attack via the Oracle E-Business Suite vulnerability.
In a data breach notification letter released last week, the organization said the infamous Cl0p ransomware group used the E-Business Suite bug in August to breach IT infrastructure and access a database “containing invoices.”
The flaw was only spotted recently, when Cl0p published the stolen data on the dark web. This data, according to the Trust, includes people’s names and addresses, as well as data “relating to accounting services provided since April 2024 to University Hospitals Barking, Havering and Redbridge NHS Trust”.
Urgent action
Patients and former staff members appear to be among those affected, but it is not yet clear how many people have had their data stolen. Barts says its electronic patient record and clinical systems have not been affected, “and we are confident that our core IT infrastructure is secure.”
However, he urges everyone to be wary of incoming emails and instant messages. The information stolen in the breach cannot be used to cause direct damage, but it can be used to personalize convincing phishing emails, trick victims into sharing their passwords with attackers, make payments – or even as leverage for identity theft.
The data has not yet been released to ClearWeb, the Trust says, adding that it has taken “urgent action”, seeking a High Court order to prohibit the publication, use or sharing of this data. However, we do not know how important such an order would be for cybercriminals.
“We are working with NHS England, the National Cyber Security Center and the Metropolitan Police, and have reported the breach to relevant regulators, including the Information Commissioner’s Office,” the notice said.
“We are very sorry this happened and are taking action with our suppliers to ensure this cannot happen again.”
Via Cybernews
The best antivirus for every budget
Follow TechRadar on Google News And add us as your favorite source to get our news, reviews and expert opinions in your feeds. Make sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp Also.




