Executive Summary
In June 2024, Synnovis, a leading UK pathology services provider, suffered a significant ransomware attack that led to operational disruption and the exposure of sensitive patient data. The attack, attributed to Russian-speaking threat actor group Qilin, resulted in widespread IT outages across London hospitals, delaying critical healthcare procedures and temporarily halting diagnostic services. Investigations revealed that attackers were able to steal files containing patient information before encrypting core systems, underscoring the vulnerability of healthcare organizations to ransomware campaigns targeting their critical infrastructure.
This incident is emblematic of a surge in highly targeted ransomware attacks against the healthcare sector globally. With a marked increase in double-extortion tactics and operationally disruptive attacks, this event highlights escalating cyber risk, increasing regulatory oversight, and the urgent need for robust cyber-resilience in healthcare.
Why This Matters Now
Healthcare remains a prime target for ransomware actors due to valuable data and time-sensitive operations. The Synnovis breach underscores rising cyber threats to healthcare delivery, patient safety, and compliance posture, creating regulatory urgency and making improved east-west security, visibility, and segmentation critical right now.
Attack Path Analysis
The attack began with initial compromise of Synnovis systems, likely via a phishing attempt or exploitation of an external-facing vulnerability. The adversary escalated privileges to gain broader access, potentially by exploiting credential weaknesses or privilege misconfigurations. Once inside, they moved laterally within the cloud and hybrid network to reach sensitive pathology data stores. Command and control channels were established to maintain persistence and coordinate tooling, possibly using covert outbound connections. Sensitive patient data was exfiltrated via encrypted or covert egress routes before ransomware was deployed to encrypt critical systems, resulting in business disruption and a public data breach.
Kill Chain Progression
Initial Compromise
Description
The attacker gained initial access, plausibly via phishing emails or exploiting a vulnerable Internet-exposed service to enter Synnovis’ environment.
Related CVEs
CVE-2024-21762
CVSS 9.8An out-of-bounds write vulnerability in Fortinet's FortiOS and FortiProxy SSL-VPN devices allows unauthenticated remote attackers to execute arbitrary code via specially crafted requests.
Affected Products:
Fortinet FortiOS – < 7.0.12, < 7.2.5
Fortinet FortiProxy – < 7.0.12, < 7.2.5
Exploit Status:
exploited in the wildCVE-2024-55591
CVSS 9.8An authentication bypass vulnerability in Fortinet's FortiOS and FortiProxy SSL-VPN devices allows unauthenticated remote attackers to gain administrative access via crafted HTTP requests.
Affected Products:
Fortinet FortiOS – < 7.0.12, < 7.2.5
Fortinet FortiProxy – < 7.0.12, < 7.2.5
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Phishing
Valid Accounts
Data Encrypted for Impact
Service Stop
Exfiltration Over C2 Channel
Impair Defenses
Obfuscated Files or Information
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIS2 Directive – Risk Management Measures – Security of Network and Information Systems
Control ID: Article 21(2)(a)
GDPR – Security of Processing
Control ID: Article 32
UK Data Protection Act 2018 – Security of Personal Data
Control ID: Section 66
PCI DSS 4.0 – Incident Response Plan
Control ID: 12.10.1
CISA Zero Trust Maturity Model 2.0 – Data Protection and Governance
Control ID: 2.3 – Data Pillar
HIPAA – Security Management Process
Control ID: 45 CFR §164.308(a)(1)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Health Care / Life Sciences
Synnovis ransomware attack directly impacted pathology services, exposing patient data and disrupting healthcare operations requiring encrypted traffic and segmentation controls.
Information Technology/IT
Ransomware attacks targeting healthcare providers highlight critical need for zero trust segmentation, threat detection, and multicloud visibility capabilities across IT infrastructure.
Computer/Network Security
Security providers must enhance egress filtering, anomaly detection, and inline IPS capabilities to prevent lateral movement and data exfiltration in ransomware incidents.
Government Administration
Healthcare data breaches require regulatory response and compliance enforcement, emphasizing HIPAA requirements for encryption, access controls, and incident response protocols.
Sources
- Synnovis notifies of data breach after 2024 ransomware attackhttps://www.bleepingcomputer.com/news/security/synnovis-notifies-of-data-breach-after-2024-ransomware-attack/Verified
- Synnovis completes forensic review following 2024 cyberattack — notifications under wayhttps://www.synnovis.co.uk/news-and-press/synnovis-completes-forensic-review-following-2024-cyberattackVerified
- NHS England » Synnovis cyber incidenthttps://www.england.nhs.uk/synnovis-cyber-incident/Verified
- London hospitals cancel operations and appointments after being hit in ransomware attackhttps://apnews.com/article/23b324fd31cdebbdd57f46a0e0333a77Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Applying Zero Trust segmentation, network and egress policy enforcement, as well as threat detection and encrypted traffic visibility, would have constrained or detected every key stage of this attack. CNSF controls can limit attacker mobility, detect anomalous behaviors, and block data exfiltration—even against advanced ransomware threats.
Control: Cloud Firewall (ACF)
Mitigation: Prevents unauthorized inbound connections and attack surface exposure.
Control: Zero Trust Segmentation
Mitigation: Limits movement beyond compromised workload with least-privilege controls.
Control: East-West Traffic Security
Mitigation: Detects and blocks unauthorized inter-workload communications.
Control: Threat Detection & Anomaly Response
Mitigation: Alerts on and blocks anomalous remote access or C2 behaviors.
Control: Egress Security & Policy Enforcement
Mitigation: Blocks unauthorized data transfers to external destinations.
Enables rapid detection and isolation of impacted assets.
Impact at a Glance
Affected Business Functions
- Pathology Services
- Blood Transfusion Services
- Surgical Operations
- Outpatient Appointments
Estimated downtime: 150 days
Estimated loss: $40,000,000
Personal information of approximately 900,000 individuals, including patient names, dates of birth, NHS numbers, and pathology test results, was exfiltrated and published online.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust Segmentation to restrict workload-to-workload and region-to-region communications, minimizing lateral movement risk.
- • Deploy egress filtering and cloud firewall controls to tightly restrict outbound connections and surface anomalous data exfiltration attempts.
- • Leverage inline threat detection and anomaly response to detect covert remote access tools and ransomware staging activity early.
- • Encrypt all internal and external data-in-transit using high-performance mechanisms (e.g., MACsec, IPsec), reducing the risk of packet sniffing and data theft.
- • Maintain comprehensive multicloud visibility and automate policy enforcement to rapidly detect, isolate, and remediate suspicious behaviors and incidents.



