Home ยป Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

Cl0p ransomware breach affecting Barts Health NHS Trust with stolen patient, staff, and supplier invoice data exposed on the dark web. Cl0p ransomware attack exposes years of Barts Health invoice data, highlighting serious security gaps in Oracle E-Business Suite systems.

Recent findings confirm that the notorious threat actor Cl0p exploited a zero-day vulnerability in Oracle Eโ€‘Business Suite (CVE-2025-61882) to breach Barts Health NHS Trust. Attackers exfiltrated years of invoice data including names, addresses, and billing records of patients, staff, and suppliers then posted the haul on the dark web. The breach impacts not only Barts Health, but also several partner institutions that rely on its accounting services. Below is a detailed breakdown of what we know, whoโ€™s affected, and how you can respond if you might be at risk.

๐—ช๐—ต๐—ฎ๐˜ ๐—ช๐—ฎ๐˜€ ๐—ฆ๐˜๐—ผ๐—น๐—ฒ๐—ป / ๐—–๐—ผ๐—บ๐—ฝ๐—ฟ๐—ผ๐—บ๐—ถ๐˜€๐—ฒ๐—ฑ

The compromised dataset reportedly includes:

  • Invoices for treatment or services rendered over multiple years covering full names and home addresses of paying patients.

  • Records of former staff who owed overpayments or salary-sacrifice balances to the Trust.

  • Details of suppliers and vendors, especially those with existing contracts or outstanding invoices, some of whose data is already publicly accessible but now compiled in a potentially exploitable dataset.ย 

  • Accounting records related to services Barts Health provided to Barking, Havering and Redbridge University Hospitals NHS Trust since April 2024.ย 

Authorities emphasize that the leak does not include clinical records or electronic patient-care systems. The breach appears confined to financial/invoicing data only.ย 

๐—›๐—ผ๐˜„ ๐—ง๐—ต๐—ฒ ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—›๐—ฎ๐—ฝ๐—ฝ๐—ฒ๐—ป๐—ฒ๐—ฑ: ๐—–๐—ฉ๐—˜-2025-61882 + ๐—ข๐—ฟ๐—ฎ๐—ฐ๐—น๐—ฒ ๐—˜-๐—•๐˜‚๐˜€๐—ถ๐—ป๐—ฒ๐˜€๐˜€ ๐—ฆ๐˜‚๐—ถ๐˜๐—ฒ

Cl0p took advantage of a critical vulnerability in Oracle E-Business Suite tracked as CVE-2025-61882. This zero-day flaw allowed unauthorized actors to bypass authentication and extract database contents from vulnerable deployments. The initial exploit reportedly occurred in August 2025, though Barts Health only realized the breach when the stolen data surfaced on a darknet leak portal in November 2025. Oracle has since issued a patch to close the vulnerability. Any organizations still running outdated versions of Oracle E-Business Suite remain at high risk for similar data theft.

๐—ช๐—ต๐—ผ ๐—œ๐˜€ ๐— ๐—ถ๐˜€๐˜€๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ช๐—ต๐—ฎ๐˜ ๐—”๐˜€๐˜€๐˜‚๐—ฟ๐—ฎ๐—ป๐—ฐ๐—ฒ ๐—›๐—ฎ๐˜€ ๐—ฏ๐—ฒ๐—ฒ๐—ป ๐—ด๐—ถ๐˜ƒ๐—ฒ๐—ป

Barts Health publicly confirmed that:

  • Their core clinical systems and electronic patient-record platforms remain unaffected.ย 

  • No known patient-care data was exposed; the leak only involves financial records and invoices.ย 

  • The Trust is actively seeking a High Court order to prevent misuse, publication, or further sharing of the stolen data.ย 

  • Theyโ€™re coordinating with NHS England, National Cyber Security Centre (NCSC), Metropolitan Police Service cyber-units, and the Information Commissioner’s Office (ICO).ย 

๐—ฃ๐—ผ๐˜๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น ๐—ฅ๐—ถ๐˜€๐—ธ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ฆ๐˜๐—ฎ๐—ณ๐—ณ, ๐—ฃ๐—ฎ๐˜๐—ถ๐—ฒ๐—ป๐˜๐˜€ & ๐—ฆ๐˜‚๐—ฝ๐—ฝ๐—น๐—ถ๐—ฒ๐—ฟ๐˜€

Even though the leak excludes medical history or clinical data, the exposed invoice information still poses serious risks:

  • Fraudsters may use addresses and names to craft convincing phishing or social-engineering campaigns, posing as hospital staff or billing departments.

  • Suppliers and former staff included in the leak may experience identity theft or blackmail attempts, especially if their financial or employment status shows vulnerability.

  • Individuals with outstanding payments or overpayments could be targeted with fake invoices or impersonation scams.

  • Because the data now exists on darknet leak portals, long-term exposure risk remainsย once data is out, removal is nearly impossible, even with court orders.

๐—ช๐—ต๐—ฎ๐˜ ๐—ฃ๐—ฎ๐˜๐—ถ๐—ฒ๐—ป๐˜๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—”๐—ณ๐—ณ๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐˜€ ๐—–๐—ฎ๐—ป ๐——๐—ผ ๐—ก๐—ผ๐˜„

  • Review any invoices received from Barts Health in the past few years. Ensure name and address match expected; verify no irregular charges.

  • Remain alert for unsolicited calls, mails, or emails claiming to be from the hospital billing department especially if they demand additional payments or sensitive info.

  • If youโ€™re a former employee or supplier double-check payment statements, outstanding balance communications, or overpayment notifications.

  • Consider placing a fraud alert or credit-monitoring alert with your bank or credit bureau (if applicable).

  • Report any suspicious contacts to law-enforcement and/or the hospitalโ€™s data protection officer (as recommended by the Trust).

๐—ช๐—ต๐˜† ๐—ง๐—ต๐—ถ๐˜€ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ฐ๐—ต ๐— ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ๐˜€: ๐—ช๐—ถ๐—ฑ๐—ฒ๐—ฟ ๐—Ÿ๐—ฒ๐˜€๐˜€๐—ผ๐—ป๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—›๐—ฒ๐—ฎ๐—น๐˜๐—ต๐—ฐ๐—ฎ๐—ฟ๐—ฒ ๐—œ๐—ง ๐—ฃ๐—ฟ๐—ผ๐—ณ๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป๐—ฎ๐—น๐˜€

For security experts and IT teams in healthcare, this incident serves as a stark reminder:

  • Legacy enterprise software like Oracle E-Business Suite even inside large NHS Trusts remains a prime target for cybercriminals.

  • Zero-day vulnerabilities in widely used platforms represent a systemic risk to multiple institutions simultaneously.

  • Entire supply-chain and vendor data (suppliers, external contractors, partner hospitals) can get dragged into a breach calling for integrated security across all linked entities.

  • Response must include not only patching, but rapid detection, dark-web monitoring, legal containment strategies (e.g., court orders), and public communication/remediation for affected individuals.

Healthcare orgs must treat financial/administrative systems with the same vigilance as clinical ones.

๐—™๐—”๐—คs

Q: Does this breach affect my medical records or treatment history?
A: No. The leaked data only relates to invoices, payments, and financial records. Clinical systems and electronic patient records remain secure.ย 

Q: Which hospitals are included under Barts Health?
A: Barts Health runs several hospitals including St Bartholomewโ€™s Hospital, The Royal London Hospital, Mile End Hospital, Newham Hospital, and Whipps Cross University Hospital.

Q: Could this leak lead to identity theft or fraud?
A: Yes. Exposed names, addresses, and payment history can be used in phishing, social-engineering, or fake invoice scams particularly targeting patients, former staff, or suppliers.

Q: What should I do if I receive suspicious contact claiming to be from the hospital billing department?
A: Do not respond. Instead, contact Barts Health via official channels and verify any requests through formal billing or data-protection offices.

Q: Has the vulnerability been patched yet?
A: Yes. Oracle released a patch for CVE-2025-61882 after the breach was disclosed. Organizations running Oracle E-Business Suite must apply the update immediately.

One thought on “Cl0p Attack Hits Barts Health: Full Invoice Database Leaked

Leave a Reply

Your email address will not be published. Required fields are marked *