- Barts Health NHS Trust confirmed that Cl0p ransomware exploited the Oracle E-Business Suite and stole invoice-related data
- Exposed information includes names, addresses and patient and former staff records
- Trust says systems remain secure, asks High Court to block data use
Barts Health NHS Trust is the latest organization to confirm it has suffered a ransomware attack through the Oracle E-Business Suite vulnerability.
In a data breach notification letter sent late last week, the organization said the notorious ransomware group Cl0p used the E-Business Suite flaw in August to breach IT infrastructure and access a database “containing invoices”.
The breach was not discovered until recently when Cl0p published the stolen data on the dark web. This data, according to the Trust, includes people’s names and addresses as well as data “related to accounting services provided since April 2024 to Barking, Havering and Redbridge University Hospitals NHS Trust”.
Urgent action
Patients and former employees appear to be among those affected, but it is not yet known exactly how many people have had their data stolen. Barts says its electronic patient record and clinical systems were not affected, “and we are confident that our core IT infrastructure is secure.”
Still, it urges everyone to be wary of incoming emails and instant messages. The information stolen in the breach cannot be used to cause direct harm, but it can be used to tailor convincing phishing emails, trick victims into sharing passwords with the attackers, make payments – or even as leverage for identity theft.
The data has not yet spilled onto the clearweb, the Trust says, adding that it has taken “urgent action” and is seeking a High Court order to ban the publication, use or sharing of that data. However, we are not sure how important such an order would be to cybercriminals.
“We are working with NHS England, the National Cyber Security Center and the Metropolitan Police, and reported the breach to relevant regulators, including the Information Commissioner’s Office,” the statement read.
“We are very sorry that this has happened and are taking steps with our suppliers to ensure that it could not happen again.”
Via Cyber news
The best antivirus for all budgets
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews and opinions in your feeds. Be sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, video unboxings, and get regular updates from us on WhatsApp also.



