Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Synnovis Finally Issues Breach Notification After 2024 Ransomware Atta
News

Synnovis Finally Issues Breach Notification After 2024 Ransomware Atta

Team-CWDBy Team-CWDNovember 13, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


An NHS pathology provider that was hit by ransomware in one of the worst breaches of 2024 has finally begun to notify its clients about how much data was stolen.

A ransomware attack on Synnovis in June 2024 led to blood supply shortages and the cancellation of 10,000 acute outpatient appointments and over 1700 elective operations in London and the South East. At least one fatality has been linked to the attack perpetrated by a Qilin affiliate.

On June 20 2024, threat actors from the group published 400GB of data they claimed was exfiltrated from the firm, including patient names, NHS numbers and descriptions of blood tests.

As the company refused to pay its extorters, it’s presumed the stolen data was subsequently sold on the cybercrime underground.

Read more on Synnovis breach: Synnovis Restores Systems After Cyber-Attack, But Blood Shortages Remain

However, the extent of the breach has until now been a mystery, although some estimates put the number at around one million patients.

Synnovis said in an update this week that it was now in the process of notifying the affected data controllers – which in this case will be its NHS customers.

“Each affected organization will, under UK data protection laws, decide if any patients need to be notified and how they will make those notifications,” it added.

The process will be completed by November 21, although the data controllers themselves will need time to sift through the relevant information before they notify impacted patients.

Complexity and Delays

Synnovis blamed the delay on the “exceptional scale and complexity” of the investigation, adding that during the attack “data was stolen in haste and in a random manner from Synnovis’ working drives.”

Its statement continued: “This investigation has taken more than a year to complete because the compromised data was unstructured, incomplete and fragmented, and often very difficult to understand. We appointed cybersecurity experts who had to use highly specialized platforms and bespoke processes to piece it together.”

However, experts have slammed the slow pace of progress.

Damon Small, a board member at Xcape, described the 17-month delay as “a completely unacceptable failure” in incident response.

“The human impact, including a patient death and severe service interruptions, far surpasses the complexities of the forensic investigation,” he added.

“When a vendor fails, the clock on patient safety and privacy must start immediately, not 17 months later.”

Denis Calderone, COO at Suzu, argued that the delay is likely due to poor data management.

“Unstructured and fragmented data isn’t a valid excuse; it’s evidence of inadequate data management. If you can’t quickly identify compromised information, you’ve fundamentally failed basic data governance,” he added.

“Incident response in healthcare is genuinely difficult, but when a breach reportedly contributes to patient deaths and impacts nearly a million people, the industry needs more than lessons learned behind closed doors. We need transparency that helps others defend themselves.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleU.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks
Next Article Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors
Team-CWD
  • Website

Related Posts

News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

What is it, and how do I get it off my device?

September 11, 2025

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.