World News

Hackers release ‘evidence pack’ as threat group has huge cache of stolen data from NHS Dumfries and Galloway


A ransomware group has released an “evidence pack” amid threats that a huge cache of data was stolen from a Scottish health board in a cyberattack.

NHS Dumfries and Galloway was targeted earlier this month and it is confirmed that the hackers were able to access a “significant amount of data”, including identifiable information about patients and staff.

Reports emerged on Wednesday that a group calling itself INC Ransom had posted on its dark web blog that it was in possession of three terabytes of NHS data. Scotland.

The message included an “evidence file” of some data, including confidential information about a small number of patients, the authenticity of which was confirmed by the health board.

Jeff Ace, chief executive of NHS Dumfries and Galloway, said: “We absolutely deplore the disclosure of confidential patient data as part of this criminal act.

“This information was leaked by hackers to prove that it is in their possession.”

The health board continues to work with Police Scotland, the National Cyber ​​Security Centre, the Scottish Government and other agencies in response to the “evolving situation”.

Follow Sky News on WhatsApp
Follow Sky News on WhatsApp

Keep up to date with all the latest news from the UK and around the world by following Sky News

Tap here

Mr Ace added: “As part of this response, we will contact all patients whose data has been disclosed at this stage and continue to work to limit any sharing of this information.

“NHS Dumfries and Galloway is very aware of the potential impact of this development on patients whose data has been published, as well as the general anxiety that may result within our patient population.”

Read more from Sky News:
70-year-old woman ‘afraid to leave her house’ after sexual assault
Family in shock over death of teenager who died in electric bike accident

Patient services will continue as normal.

The health council has implemented a dedicated web page regarding the attack.


Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button