The company, which handles 115 million patient encounters annually and conducts 2.5 million patient specimens per week, acknowledges the attack “has temporarily affected some test processing and customer access to test results.”

Beyond that, LabCorp is keeping mum on the details of the attack and its efforts to recover IT systems and resume normal operations.

During the weekend of July 14, the company detected suspicious activity on its network that was determined to be a new variant of ransomware. At that time, the company took all information systems offline as it worked to contain and remove the malware.

“Work has been ongoing to restore full system functionality as quickly as possible, testing operations have been substantially resumed, and we are working to restore additional systems and functions over the next several days,” the company reported on Thursday.


Also See: Ransomware attacks drop as organizations raise defenses

The attack affected only diagnostic systems; LabCorp’s Covance drug development business was not impacted by the malware. The company continues to work with security professionals, and law enforcement and not found evidence of theft or misuse of data, it reports.

Further information from the company likely will be forthcoming soon, as LabCorp has transmitted its initial notice of the breach to the Securities and Exchange Commission. The company also will be sending information to the HHS Office for Civil Rights that will include the number of affected individuals. LabCorp has 60,000 employees working at 1,900 patient centers.

Register or login for access to this item and much more

All Health Data Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access