Anatomy of a Breach

Anatomy of a Breach: Blackbaud — The Charity Software Vendor That Exposed UK Universities, NHS Trusts, and Charities

> series: anatomy_of_a_breach —— part: 138 —— target: blackbaud —— affected: uk_charities_universities_nhs —— action: paid_ransom_trusted_criminals<span class="cursor-blink">_</span>_

Hedgehog Security 30 June 2020 13 min read

The National Trust. NHS trusts. UK universities. All exposed through one vendor.

In July 2020, Blackbaud disclosed that a ransomware attack in May 2020 had resulted in attackers accessing and exfiltrating a copy of a subset of customer data before the company detected and blocked the attack. Blackbaud paid the ransom and stated it had received 'confirmation' that the stolen data had been destroyed. The breach affected hundreds of organisations across the nonprofit, education, and healthcare sectors — including major UK institutions.

Affected UK organisations included the National Trust, the University of Birmingham, De Montfort University, the University of Leeds, the charity Young Minds, and multiple NHS charitable trusts. The ICO received over 100 reports from affected UK organisations and investigated Blackbaud's handling of the breach. Blackbaud subsequently admitted that the breach was more extensive than initially disclosed — bank account details, Social Security numbers, and other sensitive data had been exposed, contrary to the company's initial claims. The SEC later charged Blackbaud with making misleading disclosures about the breach.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

One vendor breach. Hundreds of charities, universities, and NHS trusts affected.

Charities and Nonprofits as Collateral
Blackbaud served nonprofits, charities, and educational institutions — organisations that often have limited cybersecurity budgets and depend heavily on their technology vendors' security. When Blackbaud was breached, its customers — including UK institutions holding donor data, alumni records, and patient information — were exposed through no fault of their own. Our <a href="/blog/sector-under-the-microscope-education">education</a> and <a href="/blog/sector-under-the-microscope-healthcare">healthcare sector analyses</a> examine vendor dependency risk.
Paying the Ransom — and Trusting Criminals
Blackbaud's decision to pay the ransom — and its claim that it received 'confirmation' the data was destroyed — was widely criticised. Ransomware criminals provide no verifiable guarantee of data deletion; paying simply funds further attacks. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides incident response that does not rely on trusting criminals.
Misleading Initial Disclosures
Blackbaud initially stated that sensitive financial data was not affected — a claim the SEC later found to be misleading. Affected organisations relied on Blackbaud's assurances to inform their own breach notifications. When those assurances proved false, the organisations had to re-notify affected individuals. <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides independent breach assessment rather than reliance on vendor claims.
Vendor Security Is Your Security
The Blackbaud breach reinforced the lesson from <a href="/blog/anatomy-of-a-breach-notpetya">NotPetya</a> (M.E.Doc), <a href="/blog/anatomy-of-a-breach-ticketmaster-dixons">Ticketmaster</a> (Inbenta), and <a href="/blog/anatomy-of-a-breach-imperva">Imperva</a>: your vendors' security posture is part of your risk surface. <a href="/cyber-essentials">Cyber Essentials</a> addresses supply chain security.

When your vendor is breached, your data is breached.

The Blackbaud breach affected organisations that had done nothing wrong — their vendor was compromised, and their data was exposed. For UK charities, universities, and NHS trusts that depend on third-party platforms for donor management, alumni relations, and patient communications, vendor security must be evaluated as part of the organisation's own security posture. Cyber Essentials certification of vendors demonstrates their security commitment. Our penetration testing assesses third-party integration security. SOC in a Box monitors for indicators of vendor compromise. And UK Cyber Defence provides incident response when a vendor breach affects your organisation.


Blackbaud exposed hundreds of UK charities and universities. How secure are your vendors?

<a href="/cyber-essentials">Cyber Essentials</a> addresses supply chain security. <a href="/penetration-testing">Penetration testing</a> assesses vendor integrations. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for vendor compromise.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles