Computer security

The Red Cross data breach affects 515,000 vulnerable people

The Red Cross has was hit by a cyberattack and suffered a data breach affecting 515,000 highly vulnerable people. The data was stolen from the Red Cross program called Restoring Family Links, that helps families that were separated by migration, disaster, and conflicts to be reunited.

The Red Cross data breach costs more than money

Robert Mardini, Director General of the International Committee of the Red Cross said that the actors behind the attack is still not claimed their act, however, we would like to appeal to the threat actors not to disclose the data of highly vulnerable individuals. Mardini added that threat actors should reconsider what they are planning to do as their action could further harm those who are already in a miserable condition. Please do the right thing, do not share, leak or user their data.

Cyberattacks on organizations like the Red Cross will jeopardize their routine of reuniting people with their families, and hinder any progress with their productivity. On an average the Red Cross Red Crescent Movement helps 12 missing people reunite with their families, and requests hackers to understand the adverse effects it can have on a suffering individual which is humongous compared to their monetary or political benefits.

Data stolen from the Red Cross data breach

The Red Cross data breach includes names, contact information of the people and their locations. The data belongs to missing people, their families, separated children, detainees and other individuals that are related to the Red Cross and Red Crescent Movement.

However, the organization that reunites the families is yet to get a claim from the hacker about the attack and are awaiting for their ransom note or response. The Family Link website also seems to be under maintenance as of now.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago