550,000 Red Cross blood donor records leaked due to "human error"
Australian Red Cross Blood Service reports massive security breach
A huge security breach at the Red Cross has resulted in the leak of half a million Australian blood donor records, including names, addresses and emails.
A backup file containing information on 550,000 blood donors was leaked as a result of human error, according to Australian Red Cross Blood Service chief executive, Shelly Park.
"We learned that a file, containing donor information, which was located on a development website, was left unsecured by a contracted third party who develops and maintains our website," said Park, in a press conference on Friday.
The file, which held results from a questionnaire that assessed donor suitability between 2010 and 2015, was then accessed by an 'unauthorised person'.
"The type of information included in the files include name, address, personal details that come about from completing our short questionnaire, which is a bit like a gateway to see whether people can go ahead to donate blood," said Park.
"I wish to stress that this file does not contain the deep personal records of people's medical history or of their test results. We are notifying donors as early as we believe we can, and we are notifying donors today," added Park.
Personal details such as date of birth, blood type, and country of birth were also included in the backup file. The Australian Red Cross admits it has "let down" its users.
"We are extremely sorry. We are deeply disappointed to have put our donors in this position. We apologise and take full responsibility for this. We acknowledge that this is unacceptable. Donors have an expectation and a right to think that all of their information that they share with us is held accountably and responsibly," said Park.
The breach was first discovered by security expert Troy Hunt, who was contacted by an unknown individual claiming to have data from the Australian Red Cross Blood Service.
To gain access to the records, the hacker had employed a relatively simple scanning method to look for vulnerabilities, according to Hunt.
"What he'd actually been doing is simply scanning internet IP addresses and looking for publically exposed web servers returning directory listings," said Hunt, in a blog post. "He'd then look to see if any of those files contained a .sql extension which would indicate a database backup... and that is all," added Hunt.
Cybersecurity experts have reassured the organisation that the risk of data being used maliciously was fairly low, however donors have been warned to be on the look out for email or phone scams.
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency planDownload now
Trends in modern data protection
A comprehensive view of the data protection landscapeDownload now
How do vulnerabilities get into software?
90% of security incidents result from exploits against defects in softwareDownload now
Delivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.Download now