This week: a critical VMware ESXi vulnerability being actively exploited by ransomware groups to encrypt virtual machines, an NHS Cyber Alert for a serious flaw in widely used medical imaging software, a supply chain attack targeting popular JavaScript libraries used in thousands of web applications, a new phishing campaign abusing Microsoft Teams to target UK organisations, a data breach at Cornwall Council caused by a failure in its own complaints handling process, a major breach of France's national bank account database resulting in 1.2 million records being stolen, and a PayPal data breach caused by an internal coding error that exposed sensitive customer information for several months.
NHS Cyber Alert: Vulnerability in Medical Imaging Software
NHS England has issued a cyber alert regarding a serious vulnerability found in a widely deployed DICOM medical imaging viewer used across NHS trusts and private healthcare providers. The flaw could allow an attacker to send a specially crafted imaging file that, when opened by a clinician or technician, runs malicious code on their workstation. This could give the attacker access to the local network. The vendor has released an update to fix the problem.
Medical imaging systems such as PACS (Picture Archiving and Communication Systems) are a core part of NHS clinical workflows. They are used every day to view X-rays, CT scans, and MRIs. If an attacker gained access through one of these systems, they could move through the network to reach patient data, clinical systems, or administrative systems. NHS suppliers who provide or support imaging technology should check whether their products are affected. This is directly relevant to DSPT requirements around keeping software up to date and managing clinical system risks.
Recommendations
Security researchers have discovered that several popular JavaScript packages on the npm registry were compromised after an attacker gained access to a maintainer's account. The attacker inserted hidden malicious code into package updates that were downloaded by thousands of developers. The malicious code was designed to steal environment variables, which often contain passwords, API keys, and database connection strings. The affected packages have now been removed, but any application that downloaded the compromised versions may have been exposed.
Many UK businesses and digital health organisations build their web applications and patient-facing portals using JavaScript and npm packages. A supply chain attack like this is dangerous because the malicious code comes through a trusted channel — a routine software update. If your development team pulled in one of these compromised packages, sensitive credentials could have been stolen without anyone noticing. For healthtech companies and NHS suppliers, this could mean exposure of API keys that connect to clinical data, patient information, or backend infrastructure.
Recommendations
A new phishing campaign has been observed targeting UK organisations through Microsoft Teams. Attackers are sending Teams messages from compromised external accounts, posing as IT support staff or senior managers. The messages contain links to fake login pages designed to steal Microsoft 365 credentials. Because Teams messages feel more trusted than emails, staff are more likely to click on links without questioning them. Several UK organisations, including some in the health sector, have reported incidents linked to this campaign.
Microsoft Teams is used extensively across the NHS, NHS suppliers, and UK businesses for daily communication. Staff are generally trained to spot phishing emails, but many are not yet aware that phishing can come through Teams as well. A stolen Microsoft 365 account can give attackers access to emails, SharePoint documents, and cloud-stored files, which may include sensitive patient data or business information. This is particularly concerning for organisations handling health data under the DSPT and UK GDPR.
Recommendations
Cornwall Council in England has suffered a data breach after the personal details of individuals who submitted complaints were passed to the councillor they were complaining about. Four of the ten complainants had specifically requested their names be withheld, but all ten had their names, home addresses, email addresses, and phone numbers shared. The councillor said she was told the details had been redacted in the files sent to her — but they became visible when she opened them.
This incident is a clear example of how data breaches do not always involve hackers. Human error and poor internal processes can expose personal information just as effectively. For organisations handling complaints, HR processes, or sensitive personal data, this is a timely reminder that data protection obligations under UK GDPR apply to internal processes as well as external threats. Organisations subject to the DSPT are required to have appropriate information governance controls in place to prevent exactly this kind of incident.
Recommendations
France's Ministry of Economics revealed that an attacker used stolen credentials to access the country's national bank account database in January 2026, making off with 1.2 million records. The stolen data included account numbers, account holder addresses, and tax identification numbers. The Ministry said access was cut off as soon as the breach was discovered, but the attacker had already exfiltrated a significant volume of data.
This incident demonstrates how stolen credentials can give attackers access to highly sensitive financial infrastructure. It also highlights the scale of damage that can result from a single compromised account with privileged access. For UK organisations handling financial or personal data, the lesson is clear: strong authentication and access controls are not optional. Organisations working towards Cyber Essentials, DSPT compliance, or DCC certification should treat credential security as a priority control.
Recommendations
PayPal has notified around 100 customers that their personal information was exposed due to a coding error in its Working Capital loan application. The error caused sensitive business contact information — including names, Social Security numbers, dates of birth, email addresses, phone numbers, and business addresses — to be inadvertently leaked between July 2025 and December 2025. A small number of affected customers also experienced unauthorised transactions on their accounts. PayPal has since rolled back the code change and issued refunds.
This breach was not caused by an external attacker but by an internal software error that went undetected for several months. It serves as a reminder that data breaches can originate from within an organisation's own development processes. For healthtech companies and digital health organisations that build or maintain software, rigorous testing, code review, and security assurance practices are essential. Under UK GDPR, a breach of this nature that exposes personal data would need to be assessed for reportability to the ICO.
Recommendations
Want help staying ahead of threats like these? Contact Periculo about our Threat Intelligence services.