Security Experts:

Connect with us

Hi, what are you looking for?


Incident Response

Ransomware Attack Hits Health Firm LabCorp

Burlington, North Carolina-based LabCorp took some of its systems offline last weekend after discovering that some had been infected by ransomware.

Burlington, North Carolina-based LabCorp took some of its systems offline last weekend after discovering that some had been infected by ransomware.

LabCorp, a company that provides “diagnostic, drug development and technology-enabled solutions for more than 115 million patient encounters per year,” serves hundreds of thousands of customers nationwide and processes tests on more than 2.5 million patient specimens per week. 

With revenues that topped $10 billion last year, the health company operates a network of more than 1,900 patient service centers (PSCs) nationally and employs about 60,000 people. 

In an 8-K filing with the U.S. Securities and Exchange Commission on Monday, the company revealed that, over the weekend of July 14, it detected suspicious activity on its network and decided to take some systems offline to contain the activity. 

“The activity was subsequently determined to be a new variant of ransomware,” the health firm said, responding to a SecurityWeek inquiry on the attack. 

“LabCorp promptly took certain systems offline as part of its comprehensive response to contain and remove the ransomware from its system. This has temporarily affected some test processing and customer access to test results,” the company said. 

As of Monday, testing operations had been already resumed and the firm was working on bringing additional systems and functions online.

“Work has been ongoing to restore full system functionality as quickly as possible, testing operations have substantially resumed, and we are working to restore additional systems and functions over the next several days,” the company told SecurityWeek.

The ransomware, LabCorp says, only impacted its Diagnostics systems but did not affect Covance Drug Development systems. The health firm also revealed it has “engaged outside security experts and is working with authorities, including law enforcement.”

For the time being, the “investigation has found no evidence of theft or misuse of data,” the company said. 

Related: SamSam Ransomware Attacks Hit Healthcare Firms

RelatedAtlanta Says Further $9.5 Million Needed for Ransomware Recovery

Related: ‘Orangeworm’ Cyberspies Target Healthcare Sector in US, Europe, Asia

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.