{"id":23914,"date":"2025-08-07T06:16:25","date_gmt":"2025-08-07T06:16:25","guid":{"rendered":"https:\/\/www.insurancejournal.com\/?p=834859"},"modified":"2025-08-07T06:16:25","modified_gmt":"2025-08-07T06:16:25","slug":"hackers-steal-passwords-from-uks-nhs-with-sneaky-malware-tool","status":"publish","type":"post","link":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/2025\/08\/07\/hackers-steal-passwords-from-uks-nhs-with-sneaky-malware-tool\/","title":{"rendered":"Hackers Steal Passwords From UK\u2019s NHS With Sneaky Malware Tool"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.insurancejournal.com\/app\/uploads\/2025\/08\/nhs-logo-on-laboratory-coats-bloomberg-580x387.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.insurancejournal.com\/app\/uploads\/2025\/08\/nhs-logo-on-laboratory-coats-bloomberg-scaled.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<ul class=\"nav nav-tabs tabs tabs-entry\">\n<li class=\"active\"><a href=\"https:\/\/www.insurancejournal.com\/news\/international\/2025\/08\/07\/834859.htm\">Article<\/a><\/li>\n<li><a href=\"https:\/\/www.insurancejournal.com\/news\/international\/2025\/08\/07\/834859.htm?comments\" rel=\"nofollow\">0 Comments<\/a><\/li>\n<\/ul>\n<div class=\"article-content clearfix\">\n<p class=\"bloomberg\">Hackers have stolen login credentials from thousands of people working with the UK\u2019s National Health Service, putting the organization at risk of further cyberattacks, according to researchers.<\/p>\n<p>The data theft is linked to a kind of malicious software known as an infostealer, which infects targeted computers and covertly gathers login credentials that hackers can then use to gain access to an organization\u2019s internal systems.<\/p>\n<div class=\"bzn bzn-sized bzn-intext\">\n<ins data-revive-zoneid=\"79\" data-revive-topics=\"cyber\" data-revive-companies data-revive-block=\"1\" data-revive-id=\"36eb7c2bd3daa932a43cc2a8ffbed3a9\"><\/ins> <\/div>\n<p>About 2,000 computers used by people working with the National Health Service, or NHS, which runs hospitals and clinics across the country, have been compromised by infostealers, according to an analysis by the Tel Aviv-based cybersecurity firm <a href=\"https:\/\/www.hudsonrock.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hudson Rock<\/a>.<\/p>\n<p>A spokesperson for NHS England didn\u2019t directly address Hudson Rock\u2019s allegations. However, the spokesperson said the agency has worked closely with cybersecurity partners, including the National Cyber Security Centre, to manage risks and provide \u201c24\/7\u201d cyber monitoring and incident response across the national health service. That includes using a \u201chigh-severity alert system\u201d that enables trusts to prioritize the most critical vulnerabilities and remediate them as soon as possible, the spokesperson said.<\/p>\n<p>The NHS also used multifactor authentication as an additional security measure to prevent cyber criminals from accessing staff accounts, the spokesperson said.<\/p>\n<p>Many of the stolen credentials are for accounts that have been registered with an NHS.net email address, meaning they belong to an NHS employee or affiliate, such as a pharmacist or an IT consultant, according to Hudson Rock. The credentials were stolen between 2020 and 2025 and include passwords for internal NHS email systems and for other platforms such as Zoom, Zendesk, Salesforce and NHS.uk., according to the analysis.<\/p>\n<p>Crucially, the infostealers don\u2019t just harvest passwords \u2014 they often collect session cookies from the computers they infect, which can enable hackers to spoof legitimate logins and bypass multifactor authentication.<\/p>\n<p>\u201cThese credentials could potentially enable unauthorized access to critical infrastructure,\u201d according to Alon Gal, Hudson Rock\u2019s co-founder and chief technology officer.<\/p>\n<div class=\"bzn bzn-sized bzn-intext-2\">\n<ins data-revive-zoneid=\"162\" data-revive-topics=\"cyber\" data-revive-companies data-revive-block=\"1\" data-revive-id=\"36eb7c2bd3daa932a43cc2a8ffbed3a9\"><\/ins> <\/div>\n<p>Around 200 of the employees have had their computers compromised by infostealers so far in 2025, Gal said in a message to Bloomberg News. Hudson Rock purchased the stolen data from cyber criminals and used it for its analysis. It\u2019s not uncommon for cybersecurity researchers to analyze data stolen by hackers.<\/p>\n<p>The stolen data came directly from computers infected by infostealers, and other evidence supported its veracity, including user\u2019s browsing history and autofill information, Gal said, adding that the credentials also correlated with real people employed at NHS and other companies through LinkedIn and elsewhere.<\/p>\n<p>It isn\u2019t known if the stolen credentials have been used for more intrusive attacks at NHS.<\/p>\n<p>Saif Abed, a cybersecurity expert and former NHS doctor, said he had reviewed Hudson Rock\u2019s data and was alarmed by what he\u2019d seen. The stolen credentials included logins for electronic health record suppliers and credentials for administrator accounts, which could potentially be abused to access sensitive internal systems, he said.<\/p>\n<p>The NHS and its supply chain, Abed said, was \u201ccompromised at levels that are a threat to patient safety.\u201d He called for a national investigation into the health service\u2019s cybersecurity.<\/p>\n<p>The NHS has been the victim of several highly disruptive cyberattacks in recent years. In 2022, a hack on a NHS contractor disrupted doctors\u2019 access to patient records and caused widespread disruption. An attack on another contractor last year resulted in thousands of canceled appointments at hospitals in London, causing the death of one patient and serious harm to others, Bloomberg previously reported.<\/p>\n<p>The concern is that the scourge of infostealers could lead to yet another NHS breach. Similar types of attacks have caused damage to the health sector in other countries. A crippling ransomware attack on the UnitedHealth Group Inc. subsidiary Change Healthcare last year, for instance, disrupted payment systems used by thousands of hospitals, insurers and pharmacies.<\/p>\n<p>According to the Change Healthcare, the breach occurred after hackers obtained a compromised credential from one of its employees. Hudson Rock linked that credential theft to an infostealer breach just days prior to the attack.<\/p>\n<p><em>Photograph: National Health Service branding on laboratory coats at Guy\u2019s and St Thomas\u2019s Hospital in London, UK, on Thursday, May 25, 2023. Photo credit: Jose Sarmento Matos\/Bloomberg.<\/em><\/p>\n<p><strong>Related:<\/strong><\/p>\n<div class=\"copyright-notice quiet\">Copyright 2025 Bloomberg.<\/div>\n<p class=\"tagtag\"> <span class=\"tagtag\">Topics<\/span> <a href=\"https:\/\/www.insurancejournal.com\/cyber\/\" class=\"btn btn-sm btn-primary tagtag\">Cyber<\/a> <\/p>\n<\/p><\/div>\n<div class=\"article-poll\" data-post=\"834859\">\n<div class=\"article-poll-vote\">\n<p>Was this article valuable?<\/p>\n<\/p><\/div>\n<div class=\"article-poll-feedback voted-no\">\n<form class=\"feedback-form\">\n<p>Thank you! Please tell us what we can do to improve this article.<\/p>\n<p> <textarea placeholder=\"Enter your feedback...\"><\/textarea> <button type=\"submit\" class=\"submit\" disabled>Submit<\/button> <button class=\"cancel\">No Thanks<\/button> <\/form>\n<\/p><\/div>\n<div class=\"article-poll-feedback voted-yes\">\n<form class=\"feedback-form\">\n<p>Thank you! <span class=\"percent\"><\/span>% of people found this article valuable. Please tell us what you liked about it.<\/p>\n<p> <textarea placeholder=\"Enter your feedback...\"><\/textarea> <button type=\"submit\" class=\"submit\" disabled>Submit<\/button> <button class=\"cancel\">No Thanks<\/button> <\/form>\n<\/p><\/div>\n<div class=\"article-poll-more-articles\">\n<p class=\"thank-you-text\">Here are more articles you may enjoy.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"subscribe-banner subscribe-banner-in-content-2\">\n<div class=\"content\">\n<h4>Interested in <em>Cyber<\/em>?<\/h4>\n<p>Get automatic alerts for this topic.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Article 0 Comments Hackers have stolen login credentials from thousands of people working with the UK\u2019s National Health Service, putting the organization at risk of further cyberattacks, according to researchers. The data theft is&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":23915,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[33,746,1568,24,1569,1570,1,1436,1437,1571],"jetpack_featured_media_url":"https:\/\/blog.lifeinsurance-orleans.ca\/wp-content\/uploads\/2025\/08\/hackers-steal-passwords-from-uks-nhs-with-sneaky-malware-tool.jpg","_links":{"self":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts\/23914"}],"collection":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/comments?post=23914"}],"version-history":[{"count":0,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts\/23914\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/media\/23915"}],"wp:attachment":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/media?parent=23914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/categories?post=23914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/tags?post=23914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}