550,000 Red Cross blood donor records leaked due to "human error"

Australian Red Cross Blood Service reports massive security breach

Hackers

A huge security breach at the Red Cross has resulted in the leak of half a million Australian blood donor records, including names, addresses and emails.

A backup file containing information on 550,000 blood donors was leaked as a result of human error, according to Australian Red Cross Blood Service chief executive, Shelly Park.

"We learned that a file, containing donor information, which was located on a development website, was left unsecured by a contracted third party who develops and maintains our website," said Park, in a press conference on Friday.

The file, which held results from a questionnaire that assessed donor suitability between 2010 and 2015, was then accessed by an 'unauthorised person'.

"The type of information included in the files include name, address, personal details that come about from completing our short questionnaire, which is a bit like a gateway to see whether people can go ahead to donate blood," said Park.

"I wish to stress that this file does not contain the deep personal records of people's medical history or of their test results. We are notifying donors as early as we believe we can, and we are notifying donors today," added Park.

Personal details such as date of birth, blood type, and country of birth were also included in the backup file. The Australian Red Cross admits it has "let down" its users.

"We are extremely sorry. We are deeply disappointed to have put our donors in this position. We apologise and take full responsibility for this. We acknowledge that this is unacceptable. Donors have an expectation and a right to think that all of their information that they share with us is held accountably and responsibly," said Park.

The breach was first discovered by security expert Troy Hunt, who was contacted by an unknown individual claiming to have data from the Australian Red Cross Blood Service.

To gain access to the records, the hacker had employed a relatively simple scanning method to look for vulnerabilities, according to Hunt.

"What he'd actually been doing is simply scanning internet IP addresses and looking for publically exposed web servers returning directory listings," said Hunt, in a blog post. "He'd then look to see if any of those files contained a .sql extension which would indicate a database backup... and that is all," added Hunt.

Cybersecurity experts have reassured the organisation that the risk of data being used maliciously was fairly low, however donors have been warned to be on the look out for email or phone scams.

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now

Recommended

Russia hacked Liam Fox's personal email to steal trade documents
phishing

Russia hacked Liam Fox's personal email to steal trade documents

4 Aug 2020
British teenager charged over Twitter hack
hacking

British teenager charged over Twitter hack

3 Aug 2020
Mid-year report says vulnerabilities up 22% in 2020
hacking

Mid-year report says vulnerabilities up 22% in 2020

30 Jul 2020
BlackRock banking Trojan targets Android apps
trojans

BlackRock banking Trojan targets Android apps

27 Jul 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
How do I fix the Windows 10 Start Menu if it's frozen?
operating systems

How do I fix the Windows 10 Start Menu if it's frozen?

3 Aug 2020