Bank of Cyprus Oncology Center data breach
Data Breaches

Bank of Cyprus Oncology Center Data Breach Exposes Critical Hospital Systems and Patient Data

The Bank of Cyprus Oncology Center data breach is a reported cybersecurity incident involving the alleged unauthorized access to critical hospital systems operated by the Bank of Cyprus Oncology Center, commonly known as BOCOC. The incident was observed in December 2025, when a threat actor publicly claimed to have gained access to internal hospital infrastructure, including systems used for clinical operations and patient management. According to the claims, an initial batch of sensitive data has already been published, while further data exposure remains possible.

The Bank of Cyprus Oncology Center data breach is particularly concerning due to the nature of the organization and the systems allegedly accessed. BOCOC is a major oncology treatment facility in Cyprus, responsible for treating a significant portion of the country’s cancer patients each year. Hospitals of this type manage extremely sensitive medical, operational, and patient safety data, and any unauthorized access introduces serious risks to patient privacy, continuity of care, and institutional trust.

Although the incident remains pending independent verification, the specificity of the claims, including references to named clinical and administrative systems, suggests that attackers may have achieved deep access into BOCOC’s internal environment. The attackers state that they did not encrypt systems or intentionally disrupt operations, but instead accessed data and published an initial dataset as evidence of compromise.

Background on the Bank of Cyprus Oncology Center

The Bank of Cyprus Oncology Center has operated since the late 1990s and is widely regarded as one of the most critical healthcare institutions in Cyprus. The center provides comprehensive cancer care services, including chemotherapy, radiotherapy, systemic therapy, diagnostics, and palliative care. It serves a majority of newly diagnosed oncology patients in the country each year and plays a central role in Cyprus’s public healthcare infrastructure.

As a specialized oncology facility, BOCOC relies heavily on digital systems to coordinate patient treatment plans, medication dosing, radiotherapy scheduling, imaging, laboratory data, and clinical documentation. These systems must operate with high availability and precision, as errors or disruptions can directly impact patient outcomes.

The Bank of Cyprus Oncology Center data breach therefore carries implications not only for data privacy, but also for patient safety and public confidence in the national healthcare system.

Overview of the Bank of Cyprus Oncology Center Data Breach

According to public statements made by the threat actor, the Bank of Cyprus Oncology Center data breach involved unauthorized access to internal hospital systems, including platforms identified as GESY and Mosaiq. These systems are described as critical to hospital operations and clinical workflows.

The attackers claim that they obtained full control over certain systems but chose not to encrypt data or interfere with hospital operations due to the potential risk to patient health. Instead, they published an initial batch of data to demonstrate the extent of access achieved. The incident was observed on December 9, 2025, and remains under investigation.

Claims involving access to clinical systems, rather than peripheral or administrative platforms, indicate a high severity incident. Even without system disruption, unauthorized access to oncology treatment systems represents a serious breach of trust and security.

Systems Allegedly Accessed

The Bank of Cyprus Oncology Center data breach is distinguished by the specific systems referenced by the attackers. While BOCOC has not publicly confirmed the scope of system access, the named platforms are widely understood to be integral to healthcare delivery.

GESY refers to Cyprus’s General Healthcare System, which integrates patient eligibility, billing, and healthcare service coordination across public and private providers. Unauthorized access to GESY connected systems may expose patient identifiers, treatment eligibility information, and administrative healthcare records.

Mosaiq is a widely used oncology information system designed to manage radiotherapy and chemotherapy workflows. It typically contains detailed patient treatment plans, medication dosing schedules, imaging data, and clinical notes. Access to Mosaiq systems carries direct implications for patient safety if data integrity is compromised.

The attackers claim they refrained from modifying or encrypting data, but the mere ability to access such systems raises concerns about data confidentiality and the potential for undetected manipulation.

Nature of the Allegedly Exposed Data

While the full contents of the data allegedly published as part of the Bank of Cyprus Oncology Center data breach have not been independently verified, the nature of the accessed systems allows for a reasoned assessment of potential data types involved.

  • Patient medical records related to oncology diagnosis and treatment
  • Radiotherapy and chemotherapy treatment plans
  • Medication dosing schedules and clinical protocols
  • Patient identification information such as names and internal IDs
  • Appointment schedules and treatment timelines
  • Internal clinical notes and reports
  • Administrative healthcare records linked to GESY
  • Internal system configuration and operational data

Healthcare and oncology data is among the most sensitive categories of personal information. Exposure of such data can cause psychological harm, discrimination, extortion risk, and long term privacy violations for affected patients.

Risks to Patients

The Bank of Cyprus Oncology Center data breach poses serious risks to patients whose data may have been accessed. Oncology patients are particularly vulnerable due to the sensitive nature of their medical conditions and treatment histories.

Exposure of treatment plans or diagnoses can be exploited for blackmail or coercion. Patients may also be targeted with highly convincing scams referencing real medical procedures, appointments, or medications. Such scams can cause emotional distress and financial harm.

Even if data integrity was not intentionally altered, unauthorized access introduces uncertainty. Patients must trust that their medical records remain accurate and confidential, and breaches undermine that trust.

Risks to Clinical Operations

Beyond data exposure, the Bank of Cyprus Oncology Center data breach raises concerns about operational resilience. Clinical systems such as Mosaiq are central to treatment accuracy. Any compromise, even without disruption, necessitates careful validation to ensure no data was altered.

Hospitals responding to cyber incidents must often divert staff and resources to incident response, forensic analysis, and system audits. In an oncology setting, such diversion can place strain on already demanding clinical environments.

The incident also highlights the potential for future attacks. Once attackers demonstrate access, there is a risk that vulnerabilities remain exploitable unless fully remediated.

Threat Actor Behavior and Claims

The threat actor involved in the Bank of Cyprus Oncology Center data breach has framed the incident as a demonstration of security failures rather than a destructive attack. They claim to have acted as penetration testers and emphasize that they avoided operational disruption.

Regardless of intent, unauthorized access and data publication constitute a cybercrime. Claims of restraint do not mitigate the seriousness of the breach or the risks introduced by exposing vulnerabilities in critical healthcare infrastructure.

Threat actors sometimes adopt such narratives to reduce backlash or justify publication of data. In practice, the publication of sensitive healthcare data can cause harm regardless of stated motivations.

Likely Attack Vectors

The specific method used to compromise the Bank of Cyprus Oncology Center has not been publicly disclosed. However, healthcare institutions are frequently targeted through known attack vectors.

These include phishing emails targeting administrative or clinical staff, weak or reused credentials, lack of multi factor authentication, unpatched systems, and exposed remote access services. Healthcare environments often include legacy systems that are difficult to update without disrupting care.

Once attackers gain initial access, they may escalate privileges and move laterally to reach clinical systems, databases, or integrated platforms such as GESY.

If confirmed, the Bank of Cyprus Oncology Center data breach would fall under Cyprus data protection laws and the General Data Protection Regulation. GDPR imposes strict obligations regarding the protection of personal and health data.

Healthcare organizations are required to implement appropriate technical and organizational measures to safeguard patient information. Unauthorized access to medical data may trigger mandatory notifications to regulators and affected individuals.

Public healthcare institutions may also be subject to government oversight, audits, and mandated security improvements following incidents of this nature.

In response to the Bank of Cyprus Oncology Center data breach, the organization should undertake comprehensive and transparent remediation efforts.

  • Conduct a full forensic investigation to confirm the scope of access
  • Audit all clinical and administrative systems for integrity and compromise
  • Review access controls and authentication mechanisms
  • Implement or enforce multi factor authentication where possible
  • Engage independent cybersecurity specialists for assessment and validation
  • Communicate clearly with regulators, staff, and patients as findings are confirmed

Ensuring the integrity of clinical systems is essential to restoring confidence and maintaining patient safety.

Patients who have received treatment at the Bank of Cyprus Oncology Center should remain vigilant while the investigation continues.

  • Be cautious of unsolicited communications referencing medical care or treatments
  • Verify the identity of anyone requesting personal or medical information
  • Monitor for signs of identity misuse or fraud
  • Protect personal devices by scanning for malware using trusted tools such as Malwarebytes

Healthcare related scams often exploit fear and urgency, making verification essential.

Guidance for Healthcare IT and Security Teams

The Bank of Cyprus Oncology Center data breach underscores the need for robust cybersecurity practices within healthcare environments.

  • Segment clinical systems from administrative networks
  • Monitor access to critical systems such as oncology platforms
  • Conduct regular penetration testing and vulnerability assessments
  • Ensure timely patching and credential management
  • Develop and rehearse incident response plans specific to healthcare operations

Protecting healthcare systems is not only a data security issue but a patient safety imperative.

Broader Implications for Healthcare Cybersecurity

The Bank of Cyprus Oncology Center data breach highlights the ongoing targeting of healthcare institutions by cybercrime actors. Hospitals and specialized treatment centers manage data and systems that are both highly valuable and highly sensitive.

As healthcare becomes increasingly digitized, the consequences of cybersecurity failures grow more severe. Incidents involving oncology centers underscore the ethical and operational stakes involved.

Ensuring the security of healthcare infrastructure requires sustained investment, staff training, and collaboration between healthcare providers, regulators, and security professionals.

Sean Doyle

Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.

View all posts →

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.