Biotechnology company Enzo Biochem has revealed that the clinical test information of roughly 2.47 million individuals was exposed in a recent ransomware attack.
The incident, the company notes in a Form 8-K filing with the US Securities and Exchange Commission (SEC), occurred on April 6, resulting in certain systems being disconnected from the internet.
On April 11, Enzo Biochem’s investigation revealed that the attackers accessed and exfiltrated certain information from its systems, including names, clinical test information, and, in some cases, Social Security numbers.
“The company identified unauthorized access to or acquisition of clinical test information of approximately 2,470,000 individuals. The Social Security numbers of approximately 600,000 of these individuals may also have been involved,” Enzo Biochem notes in the SEC filing.
The company says it is investigating whether employee information may have been exposed as well and that it will notify all impacted individuals and regulatory authorities.
Enzo Biochem says that it expects the ransomware attack to continue to incur certain expenses related to response, remediation, and investigation.
“Further, the company remains subject to risks and uncertainties as a result of the incident, including as a result of the data that was accessed or exfiltrated from the company’s network,” the SEC filing reads.
The company expects increased regulatory scrutiny to follow and notes that the full cost and impact of the incident are still under evaluation.
The company says that it remained operational following the ransomware attack and that its facilities are open.
Based in Farmingdale, New York, Enzo Biochem develops and provides molecular diagnostics technologies, including DNA-based tests.
Related: Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches
Related: 1 Million Impacted by Data Breach at NextGen Healthcare
Related: 3.3 Million Impacted by Ransomware Attack at California Healthcare Provider

More from Ionut Arghire
- Air Canada Says Employee Information Accessed in Cyberattack
- BIND Updates Patch Two High-Severity DoS Vulnerabilities
- Faster Patching Pace Validates CISA’s KEV Catalog Initiative
- TransUnion Denies Breach After Hacker Publishes Allegedly Stolen Data
- Legit Security Raises $40 Million in Series B Financing
- Atlassian Security Updates Patch High-Severity Vulnerabilities
- Critical Infrastructure Organizations Warned of Snatch Ransomware Attacks
- Tor-Based Drug Marketplace Piilopuoti Shut Down by Law Enforcement
Latest News
- Researchers Discover Attempt to Infect Leading Egyptian Opposition Politician With Predator Spyware
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
- China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
- Air Canada Says Employee Information Accessed in Cyberattack
- BIND Updates Patch Two High-Severity DoS Vulnerabilities
- Faster Patching Pace Validates CISA’s KEV Catalog Initiative
- SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
- Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
