Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Founded in 1964, New York Blood Center (NYBC) is a nonprofit organization that is one of the largest independent, community-based blood centers in the world. NYBC, along with its partner organizations Community Blood Center of Kansas City, Missouri (CBC), Innovative Blood Resources (IBR), Blood Bank of Delmarva (BBD), and Rhode Island Blood Center (RIBC), collect approximately 4,000 units of blood products each day and serve local communities of more than 45 million people in the Tri-State area (NY, NJ, CT), Mid Atlantic area (PA, DE, MD), the Kansas City metropolitan area, Minnesota, Nebraska, Rhode Island, and Southern New England. NYBC and its partners also provide a wide array of transfusion-related medical services, including Comprehensive Cell Solutions, the National Center for Blood Group Genomics, the National Cord Blood Program, and the Lindsley F. Kimball Research Institute, which — among other milestones — developed the Hepatitis B vaccine and a patented solvent detergent plasma process innovating blood-purification technology worldwide.

New York Blood Center A.I CyberSecurity Scoring

NYBC

Company Details

Linkedin ID:

new-york-blood-center

Employees number:

1,051

Number of followers:

10,110

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

nybc.org

IP Addresses:

0

Company ID:

NEW_2781146

Scan Status:

In-progress

AI scoreNYBC Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/new-york-blood-center.jpeg
NYBC Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreNYBC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/new-york-blood-center.jpeg
NYBC Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

NYBC Company CyberSecurity News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
New York Blood CenterRansomware10052/2025NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: The New York Blood Center (NYBC) experienced a ransomware attack leading to the disruption of its operations, including the rescheduling of appointments. While the center continues to accept blood donations, processing times may be delayed. The attack's timing exacerbated the already critical situation due to a recent blood emergency declared following a decline in donations and a rise in COVID cases. There has been no confirmation about the exfiltration of sensitive data, and restoration efforts for affected systems are ongoing without a specified timeline for full recovery.

New York Blood CenterBreach10051/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: In January 2025, New York Blood Center Enterprises (NYBCe) suffered a data breach exposing the personal and sensitive information of 193,822 individuals. The compromised data included names, Social Security numbers, state-issued IDs (e.g., driver’s licenses), bank account details (for direct deposit participants), health information, and test results. An unauthorized party accessed NYBCe’s network between January 20–26, 2025, acquiring copies of internal files. While no cybercriminal group has publicly claimed responsibility, the breach forced NYBCe to take immediate containment measures to mitigate disruption to critical blood and medical services. The organization is offering affected individuals free credit and identity monitoring via Experian. The incident ranks as the fourth-largest healthcare breach of 2025 in the U.S. by records compromised. NYBCe, a nonprofit serving over 75 million patients across 600+ hospitals, did not disclose whether ransomware was involved or if a ransom was paid.

New York Blood CenterRansomware10051/2024NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: New York Blood Center, one of the largest independent blood centers in the U.S. serving over 75 million people, suffered a ransomware attack in January 2024. Hackers accessed its network between January 20 and 26, exfiltrating sensitive data before deploying ransomware. The breach compromised patient data (names, health information, test results) and employee information (Social Security numbers, driver’s licenses, government IDs, and financial account details for current/former staff). Over 10,557 Texas residents were confirmed affected, though total victim counts remain undisclosed. The organization, which supplies ~4,000 blood units daily to 400+ hospitals, also had clinical data tied to services like apheresis, cell therapy, and diagnostic testing exposed. The attack disrupted operations, required a months-long investigation (concluded June 30), and triggered regulatory notifications. The incident aligns with a broader trend of ransomware targeting blood service providers, including OneBlood and Synnovis.

New York Blood Center
Ransomware
Severity: 100
Impact: 5
Seen: 2/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: The New York Blood Center (NYBC) experienced a ransomware attack leading to the disruption of its operations, including the rescheduling of appointments. While the center continues to accept blood donations, processing times may be delayed. The attack's timing exacerbated the already critical situation due to a recent blood emergency declared following a decline in donations and a rise in COVID cases. There has been no confirmation about the exfiltration of sensitive data, and restoration efforts for affected systems are ongoing without a specified timeline for full recovery.

New York Blood Center Enterprises (NYBCe)
Breach
Severity: 100
Impact: 5
Seen: 1/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: In January 2025, New York Blood Center Enterprises (NYBCe) suffered a data breach exposing the personal and sensitive information of 193,822 individuals. The compromised data included names, Social Security numbers, state-issued IDs (e.g., driver’s licenses), bank account details (for direct deposit participants), health information, and test results. An unauthorized party accessed NYBCe’s network between January 20–26, 2025, acquiring copies of internal files. While no cybercriminal group has publicly claimed responsibility, the breach forced NYBCe to take immediate containment measures to mitigate disruption to critical blood and medical services. The organization is offering affected individuals free credit and identity monitoring via Experian. The incident ranks as the fourth-largest healthcare breach of 2025 in the U.S. by records compromised. NYBCe, a nonprofit serving over 75 million patients across 600+ hospitals, did not disclose whether ransomware was involved or if a ransom was paid.

New York Blood Center
Ransomware
Severity: 100
Impact: 5
Seen: 1/2024
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: New York Blood Center, one of the largest independent blood centers in the U.S. serving over 75 million people, suffered a ransomware attack in January 2024. Hackers accessed its network between January 20 and 26, exfiltrating sensitive data before deploying ransomware. The breach compromised patient data (names, health information, test results) and employee information (Social Security numbers, driver’s licenses, government IDs, and financial account details for current/former staff). Over 10,557 Texas residents were confirmed affected, though total victim counts remain undisclosed. The organization, which supplies ~4,000 blood units daily to 400+ hospitals, also had clinical data tied to services like apheresis, cell therapy, and diagnostic testing exposed. The attack disrupted operations, required a months-long investigation (concluded June 30), and triggered regulatory notifications. The incident aligns with a broader trend of ransomware targeting blood service providers, including OneBlood and Synnovis.

Ailogo

NYBC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for NYBC

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for New York Blood Center in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for New York Blood Center in 2026.

Incident Types NYBC vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for New York Blood Center in 2026.

Incident History — NYBC (X = Date, Y = Severity)

NYBC cyber incidents detection timeline including parent company and subsidiaries

NYBC Company Subsidiaries

SubsidiaryImage

Founded in 1964, New York Blood Center (NYBC) is a nonprofit organization that is one of the largest independent, community-based blood centers in the world. NYBC, along with its partner organizations Community Blood Center of Kansas City, Missouri (CBC), Innovative Blood Resources (IBR), Blood Bank of Delmarva (BBD), and Rhode Island Blood Center (RIBC), collect approximately 4,000 units of blood products each day and serve local communities of more than 45 million people in the Tri-State area (NY, NJ, CT), Mid Atlantic area (PA, DE, MD), the Kansas City metropolitan area, Minnesota, Nebraska, Rhode Island, and Southern New England. NYBC and its partners also provide a wide array of transfusion-related medical services, including Comprehensive Cell Solutions, the National Center for Blood Group Genomics, the National Cord Blood Program, and the Lindsley F. Kimball Research Institute, which — among other milestones — developed the Hepatitis B vaccine and a patented solvent detergent plasma process innovating blood-purification technology worldwide.

Loading...
similarCompanies

NYBC Similar Companies

NHG Health

NHG Health is a leading public healthcare provider in Singapore recognised for its quality clinical care and its commitment in enabling healthier lives through preventive health, innovative solutions and person-centred programmes tailored to every life stage. Our integrated health system, which span

The Netcare Group (JSE: NTC) offers a unique, comprehensive range of medical services across the healthcare spectrum, enabling us to serve the health and care needs of each individual who entrust their care to us. Our focus on implementing sophisticated digital systems will enable us to provide care

Mercy Health

At Mercy Health, we understand that every family is a universe. A network of people who love, and support, and count on one other to be there. Everybody means the world to someone and we are committed to care for others so they can be there for the ones they love. With nearly 35,000 employees across

Northwestern Medicine

Northwestern Medicine is the collaboration between Northwestern Memorial HealthCare and Northwestern University Feinberg School of Medicine around a strategic vision to transform the future of health care. It encompasses the research, teaching, and patient care activities of the academic medical cen

Dr. Sulaiman Al Habib Medical Group

Leading Private Healthcare Provider in the Middle East With a vision to be the most trusted healthcare provider in medical excellence and patient experience globally, Dr. Sulaiman Al-Habib Medical Group (HMG) has become the largest provider of comprehensive healthcare services in the Middle East. A

Cedars-Sinai

Since its beginning in 1902, Cedars-Sinai has evolved to meet the healthcare needs of one of the most diverse regions in the nation, continually setting new standards for quality and innovation in patient care, research, teaching and community service. Today, Cedars-Sinai is widely known for its na

Piedmont

Piedmont is empowering Georgians by changing health care. We continue to fuel Georgia’s growth through safe, cost-effective, high-quality care close to home through an integrated health care system that provides a hassle-free, unified experience. We are a private, not-for-profit organization with mo

CVS Health

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues. Wherever and whenever people need us, we help them

GE HealthCare

Every day millions of people feel the impact of our intelligent devices, advanced analytics and artificial intelligence. As a leading global medical technology and digital solutions innovator, GE HealthCare enables clinicians to make faster, more informed decisions through intelligent devices, data

newsone

NYBC CyberSecurity News

December 30, 2025 09:46 AM
New Liberty Hospital; New York Blood Center; Memorial Blood Centers Settle Data Breach Lawsuits

New Liberty Hospital in Missouri, Memorial Blood Centers in Minnesota, and the New York Blood Center have settled class action lawsuits over...

October 14, 2025 07:00 AM
SimonMed discloses 1.27M-record healthcare data breach

Radiology practice SimonMed disclosed a large healthcare data breach that was claimed by the Medusa ransomware group.

October 12, 2025 07:00 AM
How New York State can guard its cyber borders

As New York's attorney general, my top priority was protecting consumers from fraud, scams, and corporate misconduct.

September 26, 2025 07:00 AM
New York Blood Center faces lawsuits after data breach exposed 194K donors

Blood donors from other states are suing the New York Blood Center for failing to promptly notify them about a cyberattack that compromised...

September 23, 2025 07:00 AM
News - New York Blood Center Confirms Data Breach Impacting Over 190,000 Donors

New York Blood Center Enterprises said the data security incident it suffered earlier this year exposed highly sensitive personal...

September 20, 2025 07:00 AM
New York Blood Center confirms it notified 194k people of data breach

New York Blood Center (NYBCe) Enterprises has confirmed that it had notified 193,822 people of a data leak in a January 2025 breach.

September 20, 2025 07:00 AM
North Carolina healthcare center informs 456K people of data breach

Goshen Medical Center has started informing 456385 people that their data has been accessed in a cyberattack.

September 19, 2025 07:00 AM
Major blood center says data leaked in ransomware attack

Major ransomware attack on New York Blood Center exposed sensitive patient and employee data, highlighting security gaps in healthcare.

September 18, 2025 07:00 AM
New York Blood Center data breach sees 200,000 affected - and you might not even know you've been hit

NYBCE suffered a cyberattack in January 2025, exposing sensitive patient and financial data; Victims may include those with SSNs,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

NYBC CyberSecurity History Information

Official Website of New York Blood Center

The official website of New York Blood Center is http://www.nybloodcenter.org.

New York Blood Center’s AI-Generated Cybersecurity Score

According to Rankiteo, New York Blood Center’s AI-generated cybersecurity score is 531, reflecting their Critical security posture.

How many security badges does New York Blood Center’ have ?

According to Rankiteo, New York Blood Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has New York Blood Center been affected by any supply chain cyber incidents ?

According to Rankiteo, New York Blood Center has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does New York Blood Center have SOC 2 Type 1 certification ?

According to Rankiteo, New York Blood Center is not certified under SOC 2 Type 1.

Does New York Blood Center have SOC 2 Type 2 certification ?

According to Rankiteo, New York Blood Center does not hold a SOC 2 Type 2 certification.

Does New York Blood Center comply with GDPR ?

According to Rankiteo, New York Blood Center is not listed as GDPR compliant.

Does New York Blood Center have PCI DSS certification ?

According to Rankiteo, New York Blood Center does not currently maintain PCI DSS compliance.

Does New York Blood Center comply with HIPAA ?

According to Rankiteo, New York Blood Center is not compliant with HIPAA regulations.

Does New York Blood Center have ISO 27001 certification ?

According to Rankiteo,New York Blood Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of New York Blood Center

New York Blood Center operates primarily in the Hospitals and Health Care industry.

Number of Employees at New York Blood Center

New York Blood Center employs approximately 1,051 people worldwide.

Subsidiaries Owned by New York Blood Center

New York Blood Center presently has no subsidiaries across any sectors.

New York Blood Center’s LinkedIn Followers

New York Blood Center’s official LinkedIn profile has approximately 10,110 followers.

NAICS Classification of New York Blood Center

New York Blood Center is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

New York Blood Center’s Presence on Crunchbase

No, New York Blood Center does not have a profile on Crunchbase.

New York Blood Center’s Presence on LinkedIn

Yes, New York Blood Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/new-york-blood-center.

Cybersecurity Incidents Involving New York Blood Center

As of January 24, 2026, Rankiteo reports that New York Blood Center has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

New York Blood Center has an estimated 31,611 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at New York Blood Center ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.

How does New York Blood Center detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with restoration efforts ongoing, and and communication strategy with notification letters (mailed starting 2024-09-05), communication strategy with website notice, communication strategy with dedicated call center, and and third party assistance with experian (credit/identity monitoring), and containment measures with immediate actions to contain the threat and reduce disruption, and communication strategy with public notice to victims; free credit/identity monitoring offered; call-in verification for affected patients..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Ransomware Attack on New York Blood Center

Description: The New York Blood Center (NYBC) experienced a ransomware attack leading to the disruption of its operations, including the rescheduling of appointments. While the center continues to accept blood donations, processing times may be delayed. The attack's timing exacerbated the already critical situation due to a recent blood emergency declared following a decline in donations and a rise in COVID cases. There has been no confirmation about the exfiltration of sensitive data, and restoration efforts for affected systems are ongoing without a specified timeline for full recovery.

Type: Ransomware

Incident : ransomware

Title: Ransomware Attack on New York Blood Center

Description: One of the largest independent blood centers serving over 75 million people across the U.S. suffered a ransomware attack in January 2024. Hackers accessed the network between January 20 and 26, exfiltrating patient and employee data before deploying ransomware. The stolen information included names, health data, test results, Social Security numbers, driver’s licenses, government IDs, and financial account information for some current and former employees. Notification letters were mailed to victims starting September 5, 2024.

Date Detected: 2024-01-26

Date Publicly Disclosed: 2024-09-05

Date Resolved: 2024-06-30

Type: ransomware

Incident : Data Breach

Title: New York Blood Center Enterprises Data Breach (January 2025)

Description: New York Blood Center Enterprises (NYBCe) confirmed a data breach in January 2025 that exposed personal information of 193,822 individuals, including names, Social Security numbers, state-issued ID numbers, bank account info (for direct deposit participants), health information, and test results. The breach occurred between January 20 and January 26, 2025, when an unauthorized party accessed the network and acquired copies of files. No cybercriminal group has publicly claimed responsibility. NYBCe took immediate containment actions and offered free credit/identity monitoring to victims via Experian.

Date Detected: 2025-01-26

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware NEW000020225

Data Compromised: No confirmation

Systems Affected: Operational systems

Downtime: Ongoing

Operational Impact: Rescheduling of appointments, delayed processing times

Incident : ransomware NEW4302343091025

Identity Theft Risk: True

Payment Information Risk: True

Incident : Data Breach NEW3292232091725

Systems Affected: Internal computer systems

Operational Impact: Disruption to critical services (reduced via containment)

Brand Reputation Impact: Potential reputational harm due to exposure of sensitive health and financial data

Identity Theft Risk: High (SSNs, bank account info, and health data exposed)

Payment Information Risk: Moderate (bank account info for direct deposit participants)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Names, Health Information, Test Results, Employee Social Security Numbers, Driver’S Licenses, Government Id Cards, Financial Account Information, Clinical Data From Healthcare Providers, , Names, Social Security Numbers, State-Issued Id Numbers (E.G., Driver’S License), Bank Account Information (Direct Deposit Participants), Health Information, Test Results and .

Which entities were affected by each incident ?

Incident : Ransomware NEW000020225

Entity Name: New York Blood Center

Entity Type: Organization

Industry: Healthcare

Location: New York

Incident : ransomware NEW4302343091025

Entity Name: New York Blood Center

Entity Type: non-profit organization

Industry: healthcare (blood services)

Location: New York, USA (serving nationwide)

Size: large (serves 75+ million people, 400+ hospitals)

Customers Affected: 10557

Incident : Data Breach NEW3292232091725

Entity Name: New York Blood Center Enterprises (NYBCe)

Entity Type: Non-profit organization

Industry: Healthcare (Blood/Stem Cell Services, Pharmaceuticals, Medical Testing)

Location: New York, USA

Size: 10 locations; collaborates with 600+ hospitals; served 75M+ patients

Customers Affected: 193,822 individuals

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Ransomware NEW000020225

Remediation Measures: Restoration efforts ongoing

Incident : ransomware NEW4302343091025

Incident Response Plan Activated: True

Communication Strategy: notification letters (mailed starting 2024-09-05)website noticededicated call center

Incident : Data Breach NEW3292232091725

Incident Response Plan Activated: True

Third Party Assistance: Experian (Credit/Identity Monitoring).

Containment Measures: Immediate actions to contain the threat and reduce disruption

Communication Strategy: Public notice to victims; free credit/identity monitoring offered; call-in verification for affected patients

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Experian (credit/identity monitoring), .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware NEW000020225

Data Exfiltration: No confirmation

Incident : ransomware NEW4302343091025

Type of Data Compromised: Patient names, Health information, Test results, Employee social security numbers, Driver’s licenses, Government id cards, Financial account information, Clinical data from healthcare providers

Number of Records Exposed: 10557

Sensitivity of Data: high (PII, PHI, financial data)

Data Encryption: True

Incident : Data Breach NEW3292232091725

Type of Data Compromised: Names, Social security numbers, State-issued id numbers (e.g., driver’s license), Bank account information (direct deposit participants), Health information, Test results

Number of Records Exposed: 193822

Sensitivity of Data: High (PII, financial, and health data)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Restoration efforts ongoing.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by immediate actions to contain the threat and reduce disruption.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware NEW000020225

Data Exfiltration: No confirmation

Incident : ransomware NEW4302343091025

Data Encryption: True

Data Exfiltration: True

Incident : Data Breach NEW3292232091725

Data Exfiltration: True

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : ransomware NEW4302343091025

Regulatory Notifications: MaineTexasNew HampshireCalifornia

Incident : Data Breach NEW3292232091725

Regulatory Notifications: Oregon Attorney General (193,822 victims reported)

References

Where can I find more information about each incident ?

Incident : ransomware NEW4302343091025

Source: New York Blood Center website notice

Incident : ransomware NEW4302343091025

Source: Regulatory filings (Maine, Texas, New Hampshire, California)

Incident : Data Breach NEW3292232091725

Source: Comparitech

Incident : Data Breach NEW3292232091725

Source: New York Blood Center Enterprises Public Notice

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: New York Blood Center website notice, and Source: Regulatory filings (Maine, Texas, New Hampshire, California), and Source: Comparitech, and Source: New York Blood Center Enterprises Public Notice.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Ransomware NEW000020225

Investigation Status: Ongoing

Incident : ransomware NEW4302343091025

Investigation Status: completed (as of 2024-06-30)

Incident : Data Breach NEW3292232091725

Investigation Status: Ongoing (as of publication)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification Letters (Mailed Starting 2024-09-05), Website Notice, Dedicated Call Center and Public notice to victims; free credit/identity monitoring offered; call-in verification for affected patients.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : ransomware NEW4302343091025

Customer Advisories: notification letterswebsite noticecall center support

Incident : Data Breach NEW3292232091725

Stakeholder Advisories: Victims advised to call NYBCe to confirm data compromise; free credit/identity monitoring offered via Experian

Customer Advisories: Patients whose data was shared with NYBCe urged to verify exposure status via phone

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notification Letters, Website Notice, Call Center Support, , Victims advised to call NYBCe to confirm data compromise; free credit/identity monitoring offered via Experian and Patients whose data was shared with NYBCe urged to verify exposure status via phone.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : ransomware NEW4302343091025

Reconnaissance Period: 2024-01-20 to 2024-01-26

High Value Targets: Patient Data, Employee Records, Clinical Information,

Data Sold on Dark Web: Patient Data, Employee Records, Clinical Information,

Post-Incident Analysis

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Experian (Credit/Identity Monitoring), .

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2024-01-26.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-09-05.

What was the most recent incident resolved ?

Most Recent Incident Resolved: The most recent incident resolved was on 2024-06-30.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were No confirmation, and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Internal computer systems.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was experian (credit/identity monitoring), .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Immediate actions to contain the threat and reduce disruption.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was No confirmation.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.2K.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are New York Blood Center Enterprises Public Notice, New York Blood Center website notice, Regulatory filings (Maine, Texas, New Hampshire, California) and Comparitech.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Victims advised to call NYBCe to confirm data compromise; free credit/identity monitoring offered via Experian, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an notification letterswebsite noticecall center support and Patients whose data was shared with NYBCe urged to verify exposure status via phone.

Initial Access Broker

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was 2024-01-20 to 2024-01-26.

cve

Latest Global CVEs (Not Company-Specific)

Description

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Description

Azure Entra ID Elevation of Privilege Vulnerability

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

Risk Information
cvss4
Base: 2.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=new-york-blood-center' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge