DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

IVF provider Genea notifies patients about the cyberattack earlier this year.

Posted on July 23, 2025July 24, 2025 by Dissent

In February, DataBreaches reported that an incident involving Australia IVF giant Genea was the work of the Termite gang, who had posted proof of claims and also claimed to have 700 GB of files. Apparently, Genea still hasn’t revealed that to those affected, who only now are receiving notifications that their data was involved and has been leaked on the darkweb. 

ABC News in Australia reports:

Patients of Australia’s third-largest IVF provider, Genea, have been informed that their sensitive information — including medical history — has been posted on the dark web. The update comes more than five months after the ABC revealed cyber criminals had targeted the fertility clinic, which is used by tens of thousands of people across the country. In emails sent to affected patients over the past few days, Genea CEO Tim Yeoh confirmed the company had wrapped up its probe into the February cyber attack: “We are not notifying you about a new incident”. Emails obtained by the ABC state the data includes patients’ full names, addresses, phone numbers, dates of birth, Medicare card numbers, medical diagnosis, and “clinical information related to the services that you received from Genea or other health service providers and/or medical treatment”.

Read more at ABC.

Termite’s listing for Genea on its darkweb leak site included screenshots of patients files and a link to where 700 GB of files was available for download. Redacted by DataBreaches.net.

Genea is being criticized by patients and others for the 5-month delay in notifying patients about the scope of the breach and that their data has been leaked. Nor has Genea revealed the number of patients affected and whether any ransom was paid.

The fact that Termite leaked all of the data in a 50-part archive that anyone can freely download is a strong indicator that Genea did not pay any ransom or extortion demands. 

Although downloading from the darkweb is generally slow, Termite also leaked a file tree, which means that anyone can download a list of all of the files that are in the data dump to scan for particular names or keywords. Inspection of the file tree reveals many files that appear to contain patient names and records, all in plain text and unencrypted. 

In its notification, Genea reportedly writes, in part, that the patient data was found on “a part of the dark web, which is a hidden part of the Internet” and “not readily searchable or accessible on the Internet”.  Is that supposed to be reassuring to patients?  Anyone with a smidgeon of knowledge about ransomware attacks and dark web leak sites knows exactly where to look on the clear net to find out (1) what gang claimed responsibility for the Genea breach, and (2) what their .onion address is on the dark web. Downloading the Tor browser is free, and then simply pasting the onion address into the browser, just as you would with Chrome or your favorite browser, will take you to the dark web leak site and the data that can be freely download.

[DataBreaches would warn readers that such sites may contain malware embedded in files, but then, that is also true these days on the clear net.]


Related:

  • Major IVF provider Genea suffers 'cyber incident' (1)
  • Kept in the Dark -- Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden
  • Watsonville Community Hospital had a data breach -- or two. It would be helpful to know which.
  • Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists
Category: Breach IncidentsHackNon-U.S.Of Note

Post navigation

← Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 45,000 malicious IP addresses taken down in international cyber operation
  • The Broken Records: tracing the human cost of the 2022 British MoD leak
  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • New data shows increase in FBI searches of Americans’ data last year
  • CalPrivacy Fines PlayOn Sports $1.1 Million for CCPA Violations Involving Student Privacy
  • 17 States Sues Trump Administration Over Unlawful Data Demands Targeting Colleges
  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.