Ransomware Attacks Target NHS and American Associated Pharmacies

Edward Zhou
Edward Zhou

CEO & Founder

 
July 16, 2025 3 min read

Qilin Ransomware Attack on NHS Supplier

The Qilin ransomware gang has released nearly 400GB of sensitive healthcare data online after a significant cyberattack on Synnovis, a pathology laboratory that processes blood tests for NHS organizations in London. The incident, detected on June 3, disrupted several NHS trusts and GP surgeries, leading to blood stock shortages, delays in medical procedures, and appointment cancellations.

Ransomware Attack
Image courtesy of Computer Weekly

On June 21, NHS England confirmed that Qilin had published vast amounts of Synnovis's stolen data online. The agency is collaborating with Synnovis and the National Cyber Security Centre (NCSC) to assess the data's contents. The published files reportedly include patient names, dates of birth, NHS numbers, and descriptions of blood tests, although the inclusion of test results remains uncertain. Additionally, business account spreadsheets detailing hospital and GP service arrangements with Synnovis were also uploaded.

A spokesperson for Synnovis stated, “We know how worrying this development may be for many people. We are taking it very seriously and an analysis of this data is already underway.” The NCSC is involved in validating whether the data originated from Synnovis’s systems.

The Qilin gang has a history of extortion, previously indicating their intent to publish private information unless a ransom was paid. According to the BBC, it is estimated that the group has conducted eight confirmed attacks in 2023 alone. They utilize a ransomware-as-a-service model, employing double extortion tactics that combine data encryption with threats of data publication. The gang predominantly spreads its malware through phishing emails, but has also exploited exposed applications and interfaces, including remote desktop protocols.

Ransomware Attack on American Associated Pharmacies

American Associated Pharmacies (AAP) has been targeted by a ransomware attack conducted by a group known as Embargo. The hackers claim to have stolen over 1.4 terabytes of data, encrypting files and demanding $1.3 million for decryption. Reports from The Register indicate that AAP paid the initial ransom but is now facing an additional demand for another $1.3 million to ensure the stolen data remains private.

Ransomware Attack
Image courtesy of Dark Daily

AAP has not publicly acknowledged the ransomware incident, but posted an “Important Notice” on its website, indicating that limited ordering capabilities have been restored for API Warehouse, a subsidiary that manages over 2,000 independent pharmacies in the U.S. The notice also stated that all user passwords for its sites were reset.

Mike Hamilton, founder and CISO of Critical Insight, commented on the situation, stating, “Embargo seems to have international and multi-sector victims and is not focusing on a specific victim profile. They seem opportunistic.” The attack has raised alarms about the vulnerability of healthcare organizations, with 80% of medical records consisting of clinical laboratory testing data, making patients particularly susceptible to breaches.

ESET, an internet security company, first identified the Embargo group in June. Their toolkit is designed to disable security solutions, allowing them to exfiltrate sensitive data effectively. Embargo has also been linked to recent attacks on Memorial Hospital and Manor in Georgia, which forced a transition to a paper-based system due to compromised email and electronic medical record systems.

Healthcare entities are urged to reconsider their cybersecurity measures, as the threat landscape continues to evolve with more sophisticated attacks.

By staying informed and implementing robust security protocols, organizations can better protect themselves from similar cyber threats, ensuring the safety and privacy of their patients' information.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article