Educational & easy-to consume visual guides to understanding attacks & enhancing resilience
Australian IVF provider, Genea, was attacked by the Termite ransomware group with attackers, allegedly, stealing 700 GB of highly sensitive patient and publishing it on the dark web. This included highly personal and confidential information of Genea's IVF patients, such as medical histories, Medicare numbers, passport data, contact details, and test results.
The attack caused significant disruption to Genea's operations, with phone lines going down and the MyGenea app becoming inaccessible, leading to patient anxiety and frustration. The breach was detected on February 14, 2025, after suspicious activity was observed on the network, but the impact quickly escalated as patients struggled to contact clinics for urgent medical inquiries and treatment plan updates.
We’ve captured everything that took place in this major healthcare data breach in our Genea Cyber Attack Timeline and Visual Summary Image.
Disclaimer: This document has been created with the sole purpose of encouraging discourse on the subject of cybersecurity and good security practices. Our intention is not to defame any company, person or legal entity. Every piece of information mentioned herein is based on reports and data freely available online. Cyber Management Alliance neither takes credit nor any responsibility for the accuracy of any source or information shared herein.
We offer a host of courses including our NCSC Assured Training in Cyber Incident Planning and Response and our NCSC Assured Training in Building and Optimising Incident Response Playbooks.
Hands On, full-support 'Security As a Service', specifically designed for organisations that require access to experienced cybersecurity, governance, risk and compliance professionals.
A unique, affordable, subscription-based, cybersecurity service for small to medium businesses, offering 280+ services in cybersecurity.
Scenario-based, verbally-simulated tabletop attack exercises that test your organisation's ability to effectively respond to a cyber-attack.