550,000 Red Cross blood donor records leaked due to "human error"

Australian Red Cross Blood Service reports massive security breach


A huge security breach at the Red Cross has resulted in the leak of half a million Australian blood donor records, including names, addresses and emails.

A backup file containing information on 550,000 blood donors was leaked as a result of human error, according to Australian Red Cross Blood Service chief executive, Shelly Park.

"We learned that a file, containing donor information, which was located on a development website, was left unsecured by a contracted third party who develops and maintains our website," said Park, in a press conference on Friday.

The file, which held results from a questionnaire that assessed donor suitability between 2010 and 2015, was then accessed by an 'unauthorised person'.

Advertisement - Article continues below

"The type of information included in the files include name, address, personal details that come about from completing our short questionnaire, which is a bit like a gateway to see whether people can go ahead to donate blood," said Park.

"I wish to stress that this file does not contain the deep personal records of people's medical history or of their test results. We are notifying donors as early as we believe we can, and we are notifying donors today," added Park.

Personal details such as date of birth, blood type, and country of birth were also included in the backup file. The Australian Red Cross admits it has "let down" its users.

"We are extremely sorry. We are deeply disappointed to have put our donors in this position. We apologise and take full responsibility for this. We acknowledge that this is unacceptable. Donors have an expectation and a right to think that all of their information that they share with us is held accountably and responsibly," said Park.

The breach was first discovered by security expert Troy Hunt, who was contacted by an unknown individual claiming to have data from the Australian Red Cross Blood Service.

To gain access to the records, the hacker had employed a relatively simple scanning method to look for vulnerabilities, according to Hunt.

"What he'd actually been doing is simply scanning internet IP addresses and looking for publically exposed web servers returning directory listings," said Hunt, in a blog post. "He'd then look to see if any of those files contained a .sql extension which would indicate a database backup... and that is all," added Hunt.

Cybersecurity experts have reassured the organisation that the risk of data being used maliciously was fairly low, however donors have been warned to be on the look out for email or phone scams.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now



How to protect against a DDoS attack

25 Oct 2019
data breaches

Ex-Equifax CIO to serve four months for insider trading

2 Jul 2019
data breaches

Ex-Equifax CIO to serve four months for insider trading

2 Jul 2019
data breaches

Ex-Equifax CIO to serve four months for insider trading

2 Jul 2019

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
cyber security

Millions of text messages leaked through exposed TrueDialog server

2 Dec 2019