October 31, 2016 By Douglas Bonderud 3 min read

When donors finish giving blood, they’re often handed some sweet treats, like cookies or juice, to help get them back to full strength. But for the Australian Red Cross, the end of October 2016 comes with not-so-funny tricks along with those treats. According to CSO Online, the service was recently notified that registration data of more than 550,000 individuals was compromised thanks to third-party error.

One of the biggest cybersecurity issues in the history of Australian health care, the Red Cross donor breach showcased the persistent problem with third-party vendors — unfettered access. But how do companies stay safe in a world where internal IT can’t do it all?

At an Arm’s Length

Ideally, the relationship between health services and third-party IT contractors should be a combination of familiarity and distance. Providers need enough information and access to do their jobs, but they should also be kept at arm’s length from potential areas of compromise.

In the case of the Australian Red Cross, problems occurred when an employee working with the web developer that handles the agency’s Blood Service website accidentally left a 1.74 GB file sitting in an unsecure environment. Preliminary investigations suggested the data was potentially accessible on the site from Sept. 5 to Oct. 25 of this year. If a seemingly white hat hacker hadn’t contacted a reputable security researcher, the Red Cross donor breach could have gone completely unnoticed.

As noted by The Guardian, the incident came to light when an anonymous Twitter user sent security expert Troy Hunt a message that read, “Here’s your personal data.” The message was quickly followed by some of Hunt’s details, including full name, email, phone number and date of birth — all pieces of information he entered into an online Red Cross donation form.

Hunt convinced his contact to send over the entire file and delete the initial copy. He then contacted Australia’s Computer Emergency Response Team (AusCERT), which notified the Red Cross.

The final tally: 550,000 records, many containing detailed personal histories, were left completely unsecured on a website backup database. Even more worrisome, the agency has no idea how many people have accessed the data, have copies of the data or plan to use the data for personal gain.

Red Cross Donor Breach Highlights Third-Party Risk

While the Australian Red Cross donor breach raises red flags for the agency, this has become a common concern for American health organizations as well. As noted by Dark Reading, the health care industry has suffered approximately $6.2 billion worth of data breaches over the last two years. In fact, Cyber Scoop reported that almost 250,000 medical records were breached just last month.

Efforts are underway to limit the risks of health breaches, often through increased employee training and better data handling practices. According to a recent Ponemon Institute survey, however, third-party threats are also a critical factor. Almost half of respondents said they had experienced a vendor-caused data breach, and 16 percent were “unsure,” often because third parties did not report this information.

Even with Business Associate Agreements and the specter of Health Insurance Portability and Accountability Act (HIPAA) compliance, small mistakes by third parties can cause big problems. For the Red Cross, all it took was one developer accidentally leaving backup servers accessible on the public-facing website to compromise half a million records.

Juice and Cookies

The solution boils down to access and control. Vendors need specific permissions to complete assigned tasks and nothing else, even if it makes the job easier down the line. In addition, companies must vet the work of third parties after completion to ensure nothing is left open to the public that should be kept private.

It’s an extra step and another inconvenience for health agencies, but it is both necessary and beneficial. Think of it like the juice and cookies after a blood donation — enough time and oversight ensures no system walks away at risk.

More from

How a new wave of deepfake-driven cybercrime targets businesses

5 min read - As deepfake attacks on businesses dominate news headlines, detection experts are gathering valuable insights into how these attacks came into being and the vulnerabilities they exploit.Between 2023 and 2024, frequent phishing and social engineering campaigns led to account hijacking and theft of assets and data, identity theft, and reputational damage to businesses across industries.Call centers of major banks and financial institutions are now overwhelmed by an onslaught of deepfake calls using voice cloning technology in efforts to break into customer…

Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns

16 min read - Since March 2024, IBM X-Force has been tracking several large-scale phishing campaigns distributing the Grandoreiro banking trojan, which is likely operated as a Malware-as-a-Service (MaaS). Analysis of the malware revealed major updates within the string decryption and domain generating algorithm (DGA), as well as the ability to use Microsoft Outlook clients on infected hosts to spread further phishing emails. The latest malware variant also specifically targets over 1500 global banks, enabling attackers to perform banking fraud in over 60 countries…

New cybersecurity sheets from CISA and NSA: An overview

4 min read - The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments.This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat mitigation, identity and access management, network security and more. Here's our overview of the new CSI sheets, what they address and the key takeaways from each.Implementing…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today