Recent findings confirm that the notorious threat actor Cl0p exploited a zero-day vulnerability in Oracle EโBusiness Suite (CVE-2025-61882) to breach Barts Health NHS Trust. Attackers exfiltrated years of invoice data including names, addresses, and billing records of patients, staff, and suppliers then posted the haul on the dark web. The breach impacts not only Barts Health, but also several partner institutions that rely on its accounting services. Below is a detailed breakdown of what we know, whoโs affected, and how you can respond if you might be at risk.
๐ช๐ต๐ฎ๐ ๐ช๐ฎ๐ ๐ฆ๐๐ผ๐น๐ฒ๐ป / ๐๐ผ๐บ๐ฝ๐ฟ๐ผ๐บ๐ถ๐๐ฒ๐ฑ
The compromised dataset reportedly includes:
-
Invoices for treatment or services rendered over multiple years covering full names and home addresses of paying patients.
-
Records of former staff who owed overpayments or salary-sacrifice balances to the Trust.
-
Details of suppliers and vendors, especially those with existing contracts or outstanding invoices, some of whose data is already publicly accessible but now compiled in a potentially exploitable dataset.ย
-
Accounting records related to services Barts Health provided to Barking, Havering and Redbridge University Hospitals NHS Trust since April 2024.ย
Authorities emphasize that the leak does not include clinical records or electronic patient-care systems. The breach appears confined to financial/invoicing data only.ย
๐๐ผ๐ ๐ง๐ต๐ฒ ๐๐๐๐ฎ๐ฐ๐ธ ๐๐ฎ๐ฝ๐ฝ๐ฒ๐ป๐ฒ๐ฑ: ๐๐ฉ๐-2025-61882 + ๐ข๐ฟ๐ฎ๐ฐ๐น๐ฒ ๐-๐๐๐๐ถ๐ป๐ฒ๐๐ ๐ฆ๐๐ถ๐๐ฒ
Cl0p took advantage of a critical vulnerability in Oracle E-Business Suite tracked as CVE-2025-61882. This zero-day flaw allowed unauthorized actors to bypass authentication and extract database contents from vulnerable deployments. The initial exploit reportedly occurred in August 2025, though Barts Health only realized the breach when the stolen data surfaced on a darknet leak portal in November 2025. Oracle has since issued a patch to close the vulnerability. Any organizations still running outdated versions of Oracle E-Business Suite remain at high risk for similar data theft.
๐ช๐ต๐ผ ๐๐ ๐ ๐ถ๐๐๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐ช๐ต๐ฎ๐ ๐๐๐๐๐ฟ๐ฎ๐ป๐ฐ๐ฒ ๐๐ฎ๐ ๐ฏ๐ฒ๐ฒ๐ป ๐ด๐ถ๐๐ฒ๐ป
Barts Health publicly confirmed that:
-
Their core clinical systems and electronic patient-record platforms remain unaffected.ย
-
No known patient-care data was exposed; the leak only involves financial records and invoices.ย
-
The Trust is actively seeking a High Court order to prevent misuse, publication, or further sharing of the stolen data.ย
-
Theyโre coordinating with NHS England, National Cyber Security Centre (NCSC), Metropolitan Police Service cyber-units, and the Information Commissioner’s Office (ICO).ย
๐ฃ๐ผ๐๐ฒ๐ป๐๐ถ๐ฎ๐น ๐ฅ๐ถ๐๐ธ๐ ๐ณ๐ผ๐ฟ ๐ฆ๐๐ฎ๐ณ๐ณ, ๐ฃ๐ฎ๐๐ถ๐ฒ๐ป๐๐ & ๐ฆ๐๐ฝ๐ฝ๐น๐ถ๐ฒ๐ฟ๐
Even though the leak excludes medical history or clinical data, the exposed invoice information still poses serious risks:
-
Fraudsters may use addresses and names to craft convincing phishing or social-engineering campaigns, posing as hospital staff or billing departments.
-
Suppliers and former staff included in the leak may experience identity theft or blackmail attempts, especially if their financial or employment status shows vulnerability.
-
Individuals with outstanding payments or overpayments could be targeted with fake invoices or impersonation scams.
-
Because the data now exists on darknet leak portals, long-term exposure risk remainsย once data is out, removal is nearly impossible, even with court orders.
๐ช๐ต๐ฎ๐ ๐ฃ๐ฎ๐๐ถ๐ฒ๐ป๐๐ ๐ฎ๐ป๐ฑ ๐๐ณ๐ณ๐ฒ๐ฐ๐๐ฒ๐ฑ ๐ฃ๐ฒ๐ฟ๐๐ผ๐ป๐ ๐๐ฎ๐ป ๐๐ผ ๐ก๐ผ๐
-
Review any invoices received from Barts Health in the past few years. Ensure name and address match expected; verify no irregular charges.
-
Remain alert for unsolicited calls, mails, or emails claiming to be from the hospital billing department especially if they demand additional payments or sensitive info.
-
If youโre a former employee or supplier double-check payment statements, outstanding balance communications, or overpayment notifications.
-
Consider placing a fraud alert or credit-monitoring alert with your bank or credit bureau (if applicable).
-
Report any suspicious contacts to law-enforcement and/or the hospitalโs data protection officer (as recommended by the Trust).
๐ช๐ต๐ ๐ง๐ต๐ถ๐ ๐๐ฟ๐ฒ๐ฎ๐ฐ๐ต ๐ ๐ฎ๐๐๐ฒ๐ฟ๐: ๐ช๐ถ๐ฑ๐ฒ๐ฟ ๐๐ฒ๐๐๐ผ๐ป๐ ๐ณ๐ผ๐ฟ ๐๐ฒ๐ฎ๐น๐๐ต๐ฐ๐ฎ๐ฟ๐ฒ ๐๐ง ๐ฃ๐ฟ๐ผ๐ณ๐ฒ๐๐๐ถ๐ผ๐ป๐ฎ๐น๐
For security experts and IT teams in healthcare, this incident serves as a stark reminder:
-
Legacy enterprise software like Oracle E-Business Suite even inside large NHS Trusts remains a prime target for cybercriminals.
-
Zero-day vulnerabilities in widely used platforms represent a systemic risk to multiple institutions simultaneously.
-
Entire supply-chain and vendor data (suppliers, external contractors, partner hospitals) can get dragged into a breach calling for integrated security across all linked entities.
-
Response must include not only patching, but rapid detection, dark-web monitoring, legal containment strategies (e.g., court orders), and public communication/remediation for affected individuals.
Healthcare orgs must treat financial/administrative systems with the same vigilance as clinical ones.
๐๐๐คs
Q: Does this breach affect my medical records or treatment history?
A: No. The leaked data only relates to invoices, payments, and financial records. Clinical systems and electronic patient records remain secure.ย
Q: Which hospitals are included under Barts Health?
A: Barts Health runs several hospitals including St Bartholomewโs Hospital, The Royal London Hospital, Mile End Hospital, Newham Hospital, and Whipps Cross University Hospital.
Q: Could this leak lead to identity theft or fraud?
A: Yes. Exposed names, addresses, and payment history can be used in phishing, social-engineering, or fake invoice scams particularly targeting patients, former staff, or suppliers.
Q: What should I do if I receive suspicious contact claiming to be from the hospital billing department?
A: Do not respond. Instead, contact Barts Health via official channels and verify any requests through formal billing or data-protection offices.
Q: Has the vulnerability been patched yet?
A: Yes. Oracle released a patch for CVE-2025-61882 after the breach was disclosed. Organizations running Oracle E-Business Suite must apply the update immediately.
One thought on “Cl0p Attack Hits Barts Health: Full Invoice Database Leaked”