Monday, June 16, 2025
HomeCyber Security NewsNew York Blood Center Targeted by Ransomware, IT Operations Impacted

New York Blood Center Targeted by Ransomware, IT Operations Impacted

Published on

SIEM as a Service

Follow Us on Google News

New York Blood Center Enterprises (NYBC), one of the nation’s largest blood donation and research organizations, has fallen victim to a ransomware attack, severely disrupting its IT systems.

The incident, which was detected on Sunday, January 26, has triggered swift action from the organization to minimize its impact on critical blood donation and distribution services.

NYBC announced that it identified suspicious activity affecting its IT infrastructure and quickly engaged third-party cybersecurity experts to investigate the matter.

- Advertisement - Google News

 “We immediately confirmed that the activity was a result of a ransomware incident,” the organization stated.

Efforts to contain the threat and safely restore systems are ongoing, with law enforcement also notified as part of the process.

IT Operations Impacted

Blood banks and donation centers are deemed essential to public health, and the incident has raised concerns about possible disruptions to lifesaving services.

NYBC emphasized its commitment to its mission, noting, “The health of our communities remains our top priority.”

The organization is working closely with hospital partners and implementing alternative solutions to maintain services and fulfill orders.

The organization has not disclosed whether any sensitive data has been compromised or if demands from the ransomware operators have been received or negotiated.

Cybersecurity experts are continuing forensic investigations to determine the extent of the breach.

Despite the challenges, NYBC has expressed gratitude for the outpouring of support from the extended blood donation and healthcare community.

Hospital associations, blood centers nationwide, and the AABB Interorganizational Task Force have stepped in to provide assistance and resources. Generous blood donors have also continued to support the effort to prevent service disruptions.

This attack underscores the increasing vulnerability of healthcare entities to ransomware incidents. Cybercriminals are targeting critical sectors due to their reliance on uninterrupted services.

Experts warn that such attacks could potentially delay medical procedures if swift resolutions aren’t achieved.

NYBC has assured the public that its teams are working tirelessly to resolve the issue and restore normal operations as soon as possible.

In the meantime, the organization urges continued support from donors and partners to ensure that no patients in need go without vital medical supplies.

This incident highlights the pressing need for robust cybersecurity measures in healthcare and public service organizations to safeguard against future threats.

Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...