Lab test provider LifeLabs said Tuesday that it paid a ransom to secure data for Canadians that was stolen in a data breach in late October.
Hackers also obtained personal information of an unknown number of the company’s 15 million Canadian customers, who are primarily in Ontario and British Columbia. The information included health card numbers, names, email addresses, logins, passwords and dates of birth.
The Toronto-based company declined to say how much money was paid to secure the data.
The compromised test results were from 2016 and earlier. LifeLabs said there was no evidence that results were accessed in other provinces aside from Ontario.
LifeLabs said it has been advised by cyber security firms that the risk to customers is low and it has not seen any public disclosure of customer data as part of its investigations.
The company said it has notified the privacy commissioner of the attack and has taken steps to strengthen its cyber defenses. It is offering customers one free year of protection that includes dark web monitoring and identity theft insurance.

More from Associated Press
- Russian Millionaire on Trial in Hack, Insider Trade Scheme
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
- South Dakota’s Noem Says Cell Phone Number Hacked
- Learning to Lie: AI Tools Adept at Creating Disinformation
- Microsoft Invests Billions in ChatGPT-Maker OpenAI
- Mississippi Creates New Cyber Unit, Names 1st Director
- FBI Chief Says He’s ‘Deeply concerned’ by China’s AI Program
- Ransomware Shuts Hundreds of Yum Brands Restaurants in UK
Latest News
- Russian Millionaire on Trial in Hack, Insider Trade Scheme
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
