Tuesday, March 4, 2025
HomeCyber Security NewsNew York Blood Center Targeted by Ransomware, IT Operations Impacted

New York Blood Center Targeted by Ransomware, IT Operations Impacted

Published on

SIEM as a Service

Follow Us on Google News

New York Blood Center Enterprises (NYBC), one of the nation’s largest blood donation and research organizations, has fallen victim to a ransomware attack, severely disrupting its IT systems.

The incident, which was detected on Sunday, January 26, has triggered swift action from the organization to minimize its impact on critical blood donation and distribution services.

NYBC announced that it identified suspicious activity affecting its IT infrastructure and quickly engaged third-party cybersecurity experts to investigate the matter.

 “We immediately confirmed that the activity was a result of a ransomware incident,” the organization stated.

Efforts to contain the threat and safely restore systems are ongoing, with law enforcement also notified as part of the process.

IT Operations Impacted

Blood banks and donation centers are deemed essential to public health, and the incident has raised concerns about possible disruptions to lifesaving services.

NYBC emphasized its commitment to its mission, noting, “The health of our communities remains our top priority.”

The organization is working closely with hospital partners and implementing alternative solutions to maintain services and fulfill orders.

The organization has not disclosed whether any sensitive data has been compromised or if demands from the ransomware operators have been received or negotiated.

Cybersecurity experts are continuing forensic investigations to determine the extent of the breach.

Despite the challenges, NYBC has expressed gratitude for the outpouring of support from the extended blood donation and healthcare community.

Hospital associations, blood centers nationwide, and the AABB Interorganizational Task Force have stepped in to provide assistance and resources. Generous blood donors have also continued to support the effort to prevent service disruptions.

This attack underscores the increasing vulnerability of healthcare entities to ransomware incidents. Cybercriminals are targeting critical sectors due to their reliance on uninterrupted services.

Experts warn that such attacks could potentially delay medical procedures if swift resolutions aren’t achieved.

NYBC has assured the public that its teams are working tirelessly to resolve the issue and restore normal operations as soon as possible.

In the meantime, the organization urges continued support from donors and partners to ensure that no patients in need go without vital medical supplies.

This incident highlights the pressing need for robust cybersecurity measures in healthcare and public service organizations to safeguard against future threats.

Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...