Ransomware Attacks Target NHS and American Associated Pharmacies

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 17, 2025 3 min read

Qilin Ransomware Attack on NHS Supplier

The Qilin ransomware gang has released nearly 400GB of sensitive healthcare data online after a significant cyberattack on Synnovis, a pathology laboratory that processes blood tests for NHS organizations in London. The incident, detected on June 3, disrupted several NHS trusts and GP surgeries, leading to blood stock shortages, delays in medical procedures, and appointment cancellations.

Ransomware Attack

Image courtesy of Computer Weekly

On June 21, NHS England confirmed that Qilin had published vast amounts of Synnovis's stolen data online. The agency is collaborating with Synnovis and the National Cyber Security Centre (NCSC) to assess the data's contents. The published files reportedly include patient names, dates of birth, NHS numbers, and descriptions of blood tests, although the inclusion of test results remains uncertain. Additionally, business account spreadsheets detailing hospital and GP service arrangements with Synnovis were also uploaded.

A spokesperson for Synnovis stated, “We know how worrying this development may be for many people. We are taking it very seriously and an analysis of this data is already underway.” The NCSC is involved in validating whether the data originated from Synnovis’s systems.

The Qilin gang has a history of extortion, previously indicating their intent to publish private information unless a ransom was paid. According to the BBC, it is estimated that the group has conducted eight confirmed attacks in 2023 alone. They utilize a ransomware-as-a-service model, employing double extortion tactics that combine data encryption with threats of data publication. The gang predominantly spreads its malware through phishing emails, but has also exploited exposed applications and interfaces, including remote desktop protocols.

Ransomware Attack on American Associated Pharmacies

American Associated Pharmacies (AAP) has been targeted by a ransomware attack conducted by a group known as Embargo. The hackers claim to have stolen over 1.4 terabytes of data, encrypting files and demanding $1.3 million for decryption. Reports from The Register indicate that AAP paid the initial ransom but is now facing an additional demand for another $1.3 million to ensure the stolen data remains private.

Ransomware Attack

Image courtesy of Dark Daily

AAP has not publicly acknowledged the ransomware incident, but posted an “Important Notice” on its website, indicating that limited ordering capabilities have been restored for API Warehouse, a subsidiary that manages over 2,000 independent pharmacies in the U.S. The notice also stated that all user passwords for its sites were reset.

Mike Hamilton, founder and CISO of Critical Insight, commented on the situation, stating, “Embargo seems to have international and multi-sector victims and is not focusing on a specific victim profile. They seem opportunistic.” The attack has raised alarms about the vulnerability of healthcare organizations, with 80% of medical records consisting of clinical laboratory testing data, making patients particularly susceptible to breaches.

ESET, an internet security company, first identified the Embargo group in June. Their toolkit is designed to disable security solutions, allowing them to exfiltrate sensitive data effectively. Embargo has also been linked to recent attacks on Memorial Hospital and Manor in Georgia, which forced a transition to a paper-based system due to compromised email and electronic medical record systems.

Healthcare entities are urged to reconsider their cybersecurity measures, as the threat landscape continues to evolve with more sophisticated attacks.

By staying informed and implementing robust security protocols, organizations can better protect themselves from similar cyber threats, ensuring the safety and privacy of their patients' information.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

Instagram Vulnerability Exposes Private Data of Millions
Instagram security

Instagram Vulnerability Exposes Private Data of Millions

Instagram's private posts exposed, millions affected by data breaches, and new location features pose risks. Discover how Gopher Security's AI-powered Zero-Trust architecture protects your data. Learn more!

By Brandon Woo January 27, 2026 4 min read
common.read_full_article
Closing the Cloud Complexity Gap: Insights from 2026 Security Reports
cloud security

Closing the Cloud Complexity Gap: Insights from 2026 Security Reports

Navigate the escalating complexity of cloud security. Discover how AI, Zero-Trust, and unified ecosystems are essential to combatting modern threats. Learn more!

By Divyansh Ingle January 26, 2026 6 min read
common.read_full_article
AI-Driven Cybersecurity Innovations: The Future of Threat Prevention
AI agents security

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention

AI agents are prime targets for cyberattacks. Discover evolving threats like prompt injection & AI-powered exploits, and learn how to fortify your defenses. Read now!

By Brandon Woo January 22, 2026 5 min read
common.read_full_article
GootLoader Malware Evades Detection Using Nested ZIP Archives
GootLoader

GootLoader Malware Evades Detection Using Nested ZIP Archives

GootLoader is back with advanced tricks, using malformed ZIPs to bypass security & target businesses. Learn how to detect and defend against this threat. Protect your assets!

By Edward Zhou January 21, 2026 3 min read
common.read_full_article