Company Details
new-york-blood-center
1,051
10,110
62
nybc.org
0
NEW_2781146
In-progress


New York Blood Center Company CyberSecurity Posture
nybc.orgFounded in 1964, New York Blood Center (NYBC) is a nonprofit organization that is one of the largest independent, community-based blood centers in the world. NYBC, along with its partner organizations Community Blood Center of Kansas City, Missouri (CBC), Innovative Blood Resources (IBR), Blood Bank of Delmarva (BBD), and Rhode Island Blood Center (RIBC), collect approximately 4,000 units of blood products each day and serve local communities of more than 45 million people in the Tri-State area (NY, NJ, CT), Mid Atlantic area (PA, DE, MD), the Kansas City metropolitan area, Minnesota, Nebraska, Rhode Island, and Southern New England. NYBC and its partners also provide a wide array of transfusion-related medical services, including Comprehensive Cell Solutions, the National Center for Blood Group Genomics, the National Cord Blood Program, and the Lindsley F. Kimball Research Institute, which — among other milestones — developed the Hepatitis B vaccine and a patented solvent detergent plasma process innovating blood-purification technology worldwide.
Company Details
new-york-blood-center
1,051
10,110
62
nybc.org
0
NEW_2781146
In-progress
Between 0 and 549

NYBC Global Score (TPRM)XXXX

Description: The New York Blood Center (NYBC) experienced a ransomware attack leading to the disruption of its operations, including the rescheduling of appointments. While the center continues to accept blood donations, processing times may be delayed. The attack's timing exacerbated the already critical situation due to a recent blood emergency declared following a decline in donations and a rise in COVID cases. There has been no confirmation about the exfiltration of sensitive data, and restoration efforts for affected systems are ongoing without a specified timeline for full recovery.
Description: In January 2025, New York Blood Center Enterprises (NYBCe) suffered a data breach exposing the personal and sensitive information of 193,822 individuals. The compromised data included names, Social Security numbers, state-issued IDs (e.g., driver’s licenses), bank account details (for direct deposit participants), health information, and test results. An unauthorized party accessed NYBCe’s network between January 20–26, 2025, acquiring copies of internal files. While no cybercriminal group has publicly claimed responsibility, the breach forced NYBCe to take immediate containment measures to mitigate disruption to critical blood and medical services. The organization is offering affected individuals free credit and identity monitoring via Experian. The incident ranks as the fourth-largest healthcare breach of 2025 in the U.S. by records compromised. NYBCe, a nonprofit serving over 75 million patients across 600+ hospitals, did not disclose whether ransomware was involved or if a ransom was paid.
Description: New York Blood Center, one of the largest independent blood centers in the U.S. serving over 75 million people, suffered a ransomware attack in January 2024. Hackers accessed its network between January 20 and 26, exfiltrating sensitive data before deploying ransomware. The breach compromised patient data (names, health information, test results) and employee information (Social Security numbers, driver’s licenses, government IDs, and financial account details for current/former staff). Over 10,557 Texas residents were confirmed affected, though total victim counts remain undisclosed. The organization, which supplies ~4,000 blood units daily to 400+ hospitals, also had clinical data tied to services like apheresis, cell therapy, and diagnostic testing exposed. The attack disrupted operations, required a months-long investigation (concluded June 30), and triggered regulatory notifications. The incident aligns with a broader trend of ransomware targeting blood service providers, including OneBlood and Synnovis.


No incidents recorded for New York Blood Center in 2026.
No incidents recorded for New York Blood Center in 2026.
No incidents recorded for New York Blood Center in 2026.
NYBC cyber incidents detection timeline including parent company and subsidiaries

Founded in 1964, New York Blood Center (NYBC) is a nonprofit organization that is one of the largest independent, community-based blood centers in the world. NYBC, along with its partner organizations Community Blood Center of Kansas City, Missouri (CBC), Innovative Blood Resources (IBR), Blood Bank of Delmarva (BBD), and Rhode Island Blood Center (RIBC), collect approximately 4,000 units of blood products each day and serve local communities of more than 45 million people in the Tri-State area (NY, NJ, CT), Mid Atlantic area (PA, DE, MD), the Kansas City metropolitan area, Minnesota, Nebraska, Rhode Island, and Southern New England. NYBC and its partners also provide a wide array of transfusion-related medical services, including Comprehensive Cell Solutions, the National Center for Blood Group Genomics, the National Cord Blood Program, and the Lindsley F. Kimball Research Institute, which — among other milestones — developed the Hepatitis B vaccine and a patented solvent detergent plasma process innovating blood-purification technology worldwide.


NHG Health is a leading public healthcare provider in Singapore recognised for its quality clinical care and its commitment in enabling healthier lives through preventive health, innovative solutions and person-centred programmes tailored to every life stage. Our integrated health system, which span
The Netcare Group (JSE: NTC) offers a unique, comprehensive range of medical services across the healthcare spectrum, enabling us to serve the health and care needs of each individual who entrust their care to us. Our focus on implementing sophisticated digital systems will enable us to provide care
At Mercy Health, we understand that every family is a universe. A network of people who love, and support, and count on one other to be there. Everybody means the world to someone and we are committed to care for others so they can be there for the ones they love. With nearly 35,000 employees across
Northwestern Medicine is the collaboration between Northwestern Memorial HealthCare and Northwestern University Feinberg School of Medicine around a strategic vision to transform the future of health care. It encompasses the research, teaching, and patient care activities of the academic medical cen

Leading Private Healthcare Provider in the Middle East With a vision to be the most trusted healthcare provider in medical excellence and patient experience globally, Dr. Sulaiman Al-Habib Medical Group (HMG) has become the largest provider of comprehensive healthcare services in the Middle East. A

Since its beginning in 1902, Cedars-Sinai has evolved to meet the healthcare needs of one of the most diverse regions in the nation, continually setting new standards for quality and innovation in patient care, research, teaching and community service. Today, Cedars-Sinai is widely known for its na

Piedmont is empowering Georgians by changing health care. We continue to fuel Georgia’s growth through safe, cost-effective, high-quality care close to home through an integrated health care system that provides a hassle-free, unified experience. We are a private, not-for-profit organization with mo

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues. Wherever and whenever people need us, we help them
Every day millions of people feel the impact of our intelligent devices, advanced analytics and artificial intelligence. As a leading global medical technology and digital solutions innovator, GE HealthCare enables clinicians to make faster, more informed decisions through intelligent devices, data
.png)
New Liberty Hospital in Missouri, Memorial Blood Centers in Minnesota, and the New York Blood Center have settled class action lawsuits over...
Radiology practice SimonMed disclosed a large healthcare data breach that was claimed by the Medusa ransomware group.
As New York's attorney general, my top priority was protecting consumers from fraud, scams, and corporate misconduct.
Blood donors from other states are suing the New York Blood Center for failing to promptly notify them about a cyberattack that compromised...
New York Blood Center Enterprises said the data security incident it suffered earlier this year exposed highly sensitive personal...
New York Blood Center (NYBCe) Enterprises has confirmed that it had notified 193,822 people of a data leak in a January 2025 breach.
Goshen Medical Center has started informing 456385 people that their data has been accessed in a cyberattack.
Major ransomware attack on New York Blood Center exposed sensitive patient and employee data, highlighting security gaps in healthcare.
NYBCE suffered a cyberattack in January 2025, exposing sensitive patient and financial data; Victims may include those with SSNs,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of New York Blood Center is http://www.nybloodcenter.org.
According to Rankiteo, New York Blood Center’s AI-generated cybersecurity score is 531, reflecting their Critical security posture.
According to Rankiteo, New York Blood Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, New York Blood Center has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, New York Blood Center is not certified under SOC 2 Type 1.
According to Rankiteo, New York Blood Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, New York Blood Center is not listed as GDPR compliant.
According to Rankiteo, New York Blood Center does not currently maintain PCI DSS compliance.
According to Rankiteo, New York Blood Center is not compliant with HIPAA regulations.
According to Rankiteo,New York Blood Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
New York Blood Center operates primarily in the Hospitals and Health Care industry.
New York Blood Center employs approximately 1,051 people worldwide.
New York Blood Center presently has no subsidiaries across any sectors.
New York Blood Center’s official LinkedIn profile has approximately 10,110 followers.
New York Blood Center is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, New York Blood Center does not have a profile on Crunchbase.
Yes, New York Blood Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/new-york-blood-center.
As of January 24, 2026, Rankiteo reports that New York Blood Center has experienced 3 cybersecurity incidents.
New York Blood Center has an estimated 31,611 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with restoration efforts ongoing, and and communication strategy with notification letters (mailed starting 2024-09-05), communication strategy with website notice, communication strategy with dedicated call center, and and third party assistance with experian (credit/identity monitoring), and containment measures with immediate actions to contain the threat and reduce disruption, and communication strategy with public notice to victims; free credit/identity monitoring offered; call-in verification for affected patients..
Title: Ransomware Attack on New York Blood Center
Description: The New York Blood Center (NYBC) experienced a ransomware attack leading to the disruption of its operations, including the rescheduling of appointments. While the center continues to accept blood donations, processing times may be delayed. The attack's timing exacerbated the already critical situation due to a recent blood emergency declared following a decline in donations and a rise in COVID cases. There has been no confirmation about the exfiltration of sensitive data, and restoration efforts for affected systems are ongoing without a specified timeline for full recovery.
Type: Ransomware
Title: Ransomware Attack on New York Blood Center
Description: One of the largest independent blood centers serving over 75 million people across the U.S. suffered a ransomware attack in January 2024. Hackers accessed the network between January 20 and 26, exfiltrating patient and employee data before deploying ransomware. The stolen information included names, health data, test results, Social Security numbers, driver’s licenses, government IDs, and financial account information for some current and former employees. Notification letters were mailed to victims starting September 5, 2024.
Date Detected: 2024-01-26
Date Publicly Disclosed: 2024-09-05
Date Resolved: 2024-06-30
Type: ransomware
Title: New York Blood Center Enterprises Data Breach (January 2025)
Description: New York Blood Center Enterprises (NYBCe) confirmed a data breach in January 2025 that exposed personal information of 193,822 individuals, including names, Social Security numbers, state-issued ID numbers, bank account info (for direct deposit participants), health information, and test results. The breach occurred between January 20 and January 26, 2025, when an unauthorized party accessed the network and acquired copies of files. No cybercriminal group has publicly claimed responsibility. NYBCe took immediate containment actions and offered free credit/identity monitoring to victims via Experian.
Date Detected: 2025-01-26
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: No confirmation
Systems Affected: Operational systems
Downtime: Ongoing
Operational Impact: Rescheduling of appointments, delayed processing times

Systems Affected: Internal computer systems
Operational Impact: Disruption to critical services (reduced via containment)
Brand Reputation Impact: Potential reputational harm due to exposure of sensitive health and financial data
Identity Theft Risk: High (SSNs, bank account info, and health data exposed)
Payment Information Risk: Moderate (bank account info for direct deposit participants)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Names, Health Information, Test Results, Employee Social Security Numbers, Driver’S Licenses, Government Id Cards, Financial Account Information, Clinical Data From Healthcare Providers, , Names, Social Security Numbers, State-Issued Id Numbers (E.G., Driver’S License), Bank Account Information (Direct Deposit Participants), Health Information, Test Results and .

Entity Name: New York Blood Center
Entity Type: Organization
Industry: Healthcare
Location: New York

Entity Name: New York Blood Center
Entity Type: non-profit organization
Industry: healthcare (blood services)
Location: New York, USA (serving nationwide)
Size: large (serves 75+ million people, 400+ hospitals)
Customers Affected: 10557

Entity Name: New York Blood Center Enterprises (NYBCe)
Entity Type: Non-profit organization
Industry: Healthcare (Blood/Stem Cell Services, Pharmaceuticals, Medical Testing)
Location: New York, USA
Size: 10 locations; collaborates with 600+ hospitals; served 75M+ patients
Customers Affected: 193,822 individuals

Remediation Measures: Restoration efforts ongoing

Incident Response Plan Activated: True
Communication Strategy: notification letters (mailed starting 2024-09-05)website noticededicated call center

Incident Response Plan Activated: True
Third Party Assistance: Experian (Credit/Identity Monitoring).
Containment Measures: Immediate actions to contain the threat and reduce disruption
Communication Strategy: Public notice to victims; free credit/identity monitoring offered; call-in verification for affected patients
Third-Party Assistance: The company involves third-party assistance in incident response through Experian (credit/identity monitoring), .

Data Exfiltration: No confirmation

Type of Data Compromised: Patient names, Health information, Test results, Employee social security numbers, Driver’s licenses, Government id cards, Financial account information, Clinical data from healthcare providers
Number of Records Exposed: 10557
Sensitivity of Data: high (PII, PHI, financial data)
Data Encryption: True

Type of Data Compromised: Names, Social security numbers, State-issued id numbers (e.g., driver’s license), Bank account information (direct deposit participants), Health information, Test results
Number of Records Exposed: 193822
Sensitivity of Data: High (PII, financial, and health data)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Restoration efforts ongoing.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by immediate actions to contain the threat and reduce disruption.

Data Exfiltration: No confirmation

Data Exfiltration: True

Regulatory Notifications: MaineTexasNew HampshireCalifornia

Regulatory Notifications: Oregon Attorney General (193,822 victims reported)

Source: New York Blood Center website notice

Source: Regulatory filings (Maine, Texas, New Hampshire, California)

Source: Comparitech

Source: New York Blood Center Enterprises Public Notice
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: New York Blood Center website notice, and Source: Regulatory filings (Maine, Texas, New Hampshire, California), and Source: Comparitech, and Source: New York Blood Center Enterprises Public Notice.

Investigation Status: Ongoing

Investigation Status: completed (as of 2024-06-30)

Investigation Status: Ongoing (as of publication)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification Letters (Mailed Starting 2024-09-05), Website Notice, Dedicated Call Center and Public notice to victims; free credit/identity monitoring offered; call-in verification for affected patients.

Customer Advisories: notification letterswebsite noticecall center support

Stakeholder Advisories: Victims advised to call NYBCe to confirm data compromise; free credit/identity monitoring offered via Experian
Customer Advisories: Patients whose data was shared with NYBCe urged to verify exposure status via phone
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notification Letters, Website Notice, Call Center Support, , Victims advised to call NYBCe to confirm data compromise; free credit/identity monitoring offered via Experian and Patients whose data was shared with NYBCe urged to verify exposure status via phone.

Reconnaissance Period: 2024-01-20 to 2024-01-26
High Value Targets: Patient Data, Employee Records, Clinical Information,
Data Sold on Dark Web: Patient Data, Employee Records, Clinical Information,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Experian (Credit/Identity Monitoring), .
Most Recent Incident Detected: The most recent incident detected was on 2024-01-26.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-09-05.
Most Recent Incident Resolved: The most recent incident resolved was on 2024-06-30.
Most Significant Data Compromised: The most significant data compromised in an incident were No confirmation, and .
Most Significant System Affected: The most significant system affected in an incident was Internal computer systems.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was experian (credit/identity monitoring), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Immediate actions to contain the threat and reduce disruption.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was No confirmation.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.2K.
Most Recent Source: The most recent source of information about an incident are New York Blood Center Enterprises Public Notice, New York Blood Center website notice, Regulatory filings (Maine, Texas, New Hampshire, California) and Comparitech.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Victims advised to call NYBCe to confirm data compromise; free credit/identity monitoring offered via Experian, .
Most Recent Customer Advisory: The most recent customer advisory issued were an notification letterswebsite noticecall center support and Patients whose data was shared with NYBCe urged to verify exposure status via phone.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was 2024-01-20 to 2024-01-26.
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.