550,000 Red Cross blood donor records leaked due to "human error"
Australian Red Cross Blood Service reports massive security breach
A huge security breach at the Red Cross has resulted in the leak of half a million Australian blood donor records, including names, addresses and emails.
A backup file containing information on 550,000 blood donors was leaked as a result of human error, according to Australian Red Cross Blood Service chief executive, Shelly Park.
"We learned that a file, containing donor information, which was located on a development website, was left unsecured by a contracted third party who develops and maintains our website," said Park, in a press conference on Friday.
The file, which held results from a questionnaire that assessed donor suitability between 2010 and 2015, was then accessed by an 'unauthorised person'.
"The type of information included in the files include name, address, personal details that come about from completing our short questionnaire, which is a bit like a gateway to see whether people can go ahead to donate blood," said Park.
"I wish to stress that this file does not contain the deep personal records of people's medical history or of their test results. We are notifying donors as early as we believe we can, and we are notifying donors today," added Park.
Personal details such as date of birth, blood type, and country of birth were also included in the backup file. The Australian Red Cross admits it has "let down" its users.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
"We are extremely sorry. We are deeply disappointed to have put our donors in this position. We apologise and take full responsibility for this. We acknowledge that this is unacceptable. Donors have an expectation and a right to think that all of their information that they share with us is held accountably and responsibly," said Park.
The breach was first discovered by security expert Troy Hunt, who was contacted by an unknown individual claiming to have data from the Australian Red Cross Blood Service.
To gain access to the records, the hacker had employed a relatively simple scanning method to look for vulnerabilities, according to Hunt.
"What he'd actually been doing is simply scanning internet IP addresses and looking for publically exposed web servers returning directory listings," said Hunt, in a blog post. "He'd then look to see if any of those files contained a .sql extension which would indicate a database backup... and that is all," added Hunt.
Cybersecurity experts have reassured the organisation that the risk of data being used maliciously was fairly low, however donors have been warned to be on the look out for email or phone scams.
Dale Walker is a contributor specializing in cybersecurity, data protection, and IT regulations. He was the former managing editor at ITPro, as well as its sibling sites CloudPro and ChannelPro. He spent a number of years reporting for ITPro from numerous domestic and international events, including IBM, Red Hat, Google, and has been a regular reporter for Microsoft's various yearly showcases, including Ignite.