Medical testing company LifeLabs failed to protect customer data, report finds


In 2019, a ransomware attack hit LifeLabs, a Canadian medical testing company. The ransomware encrypted the lab results of 15 million Canadians, and personally identifiable information (PII) of 8.6 million people was stolen.

After noticing the attack, LifeLabs informed its customers and the Canadian privacy regulators, which immediately announced an investigation. The privacy commissioners of both British Columbia and Ontario finished writing a report about the incident in 2020 but LifeLabs managed to hold that up in court for four years. Now the report is publicly available and some of the findings are both shocking and unsurprising.

Read more…
Source: Malwarebytes Labs


Sign up for our Newsletter


Related:

  • Hacker leaks full database of 77 million Nitro PDF user records

    January 20, 2021

    A stolen database containing the email addresses, names, and passwords of more than 77 million records of Nitro PDF service users was leaked today for free. The 14GB leaked database contains 77,159,696 records with users’ email addresses, full names, bcrypt hashed passwords, titles, company names, IP addresses, and other system-related information. The massive Nitro PDF data breach ...

  • UK MoD under fire over multiple data breaches

    January 18, 2021

    The UK Ministry of Defense (MoD) suffered more data breaches in 2020 than in the year prior, seven of which were reported to the Information Commissioner’s Office (ICO) for further investigation. This is according to a new report from the Parliament Street Think Tank, and based on data provided by the MoD itself. Overall, there was an ...

  • Hackers leak stolen Pfizer COVID-19 vaccine data online

    January 12, 2021

    The European Medicines Agency (EMA) today revealed that some of the Pfizer/BioNTech COVID-19 vaccine data stolen from its servers in December was leaked online. EMA is a decentralized agency responsible for reviewing and approving COVID-19 vaccines, as well as for evaluating, monitoring, and supervising any new medicines introduced to the EU. “The ongoing investigation of the cyberattack ...

  • New Zealand Reserve Bank breached using bug patched on Xmas Eve

    January 12, 2021

    A recent data breach at the Reserve Bank of New Zealand, known as Te Pūtea Matua, was caused by attackers exploiting a critical vulnerability patched the same day. Over the weekend, the Reserve Bank disclosed that they suffered a data breach after an attacker hacked a third-party file sharing service containing sensitive data. In a new advisory ...

  • United Nations data breach exposed over 100k UNEP staff records

    January 11, 2021

    Today, researchers have responsibly disclosed a security vulnerability by exploiting which they could access over 100,000 private employee records of United Nations Environmental Programme (UNEP). The data breach stemmed from exposed Git directories and credentials, which allowed the researchers to clone Git repositories and gather a large amount of personally identifiable information (PII) associated with over ...

  • Nissan NA source code leaked due to default admin:admin credentials

    January 8, 2021

    Multiple code repositories from Nissan North America became public this week after the company left an exposed Git server protected with default access credentials. The entire collection is around 20 gigabytes large and contains source code for mobile apps and various tools used by Nissan internally for diagnostics, client acquisition, market research, or NissanConnect services. It is ...