Anatomy of a Breach

Anatomy of a Breach: The Red Cross — 515,000 Vulnerable People's Data Stolen from the World's Largest Humanitarian Organisation

> series: anatomy_of_a_breach —— part: 157 —— target: icrc_red_cross —— people: 515,000 —— data: conflict_victims_missing_persons_detainees<span class="cursor-blink">_</span>_

Hedgehog Security 31 January 2022 13 min read

515,000 of the world's most vulnerable people. Conflict victims. Missing persons. Detainees.

In January 2022, the International Committee of the Red Cross (ICRC) disclosed that a cyber attack had compromised the personal data of more than 515,000 people served by its Restoring Family Links programme — a service that reunites families separated by conflict, natural disaster, and migration. The stolen data belonged to some of the most vulnerable people on earth: victims of armed conflict, missing persons and their families, detainees, and people seeking protection.

The attack exploited an unpatched vulnerability in a Zoho ManageEngine server used by a third-party contractor hosting ICRC data. The attackers had been present in the system for approximately 70 days before detection. No group claimed responsibility, and the ICRC made a direct appeal to the attackers not to share, sell, or publish the data — noting that doing so would cause real harm to already vulnerable people. The ICRC Director General described the breach as 'an attack on the people and organisations that the Red Cross and Red Crescent Movement serves.'


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

When cybercrime targets people who have already lost everything.

Data of the Most Vulnerable
The stolen data belonged to people in the most precarious situations imaginable — separated families, conflict victims, detainees. For these individuals, data exposure creates risks far beyond identity theft: it can endanger physical safety, compromise refugee claims, or expose people to persecution. Data sensitivity must be assessed in context — and some data carries life-or-death consequences.
Unpatched Third-Party System
The breach originated from an unpatched Zoho ManageEngine vulnerability on a system managed by a third-party contractor — combining two recurring themes from this series: patching failures and supply chain risk. <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates 14-day patching. Our <a href="/vulnerability-scanning">vulnerability scanning</a> identifies unpatched systems. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> assesses third-party system security.
70 Days Before Detection
The attackers were present in the ICRC's systems for approximately 70 days before being detected. <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides the continuous monitoring that reduces dwell time from months to hours — even on systems managed by third parties.
Humanitarian Organisations Are Targets
The ICRC breach established that humanitarian organisations — which hold extraordinarily sensitive data about vulnerable populations — are cyber targets. For UK charities and NGOs, the lesson is direct: holding sensitive data about vulnerable people creates an obligation to protect it with proportionate security. <a href="/cyber-essentials">Cyber Essentials certification</a> provides the baseline. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> provides incident response.

The most sensitive data demands the most rigorous protection.

The ICRC breach demonstrated that data sensitivity must be assessed in human terms, not just regulatory categories. For UK organisations holding data about vulnerable people — charities, social services, healthcare providers, refugee organisations — the obligation to protect that data is moral as well as legal. Cyber Essentials provides the baseline. Penetration testing validates controls. SOC in a Box monitors continuously. And UK Cyber Defence provides the incident response capability that minimises harm when breaches occur.


The Red Cross held data on 515,000 of the world's most vulnerable people. It was stolen through an unpatched system.

<a href="/vulnerability-scanning">Vulnerability scanning</a> finds unpatched systems. <a href="/cyber-essentials">Cyber Essentials</a> mandates 14-day patching. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects intrusions.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles