Information on the Synnovis Cyber Attack

NHS organisations across London continue to work in partnership to manage patient care following the ransomware cyber-attack on Synnovis on 3rd June 2024.

Guy’s and St Thomas’ NHS Foundation Trust and King’s College Hospital NHS Foundation Trust remain in a critical incident, while Oxleas NHS Foundation Trust, South London and Maudsley NHS Foundation Trust, Lewisham and Greenwich NHS Trust, Bromley Healthcare, and primary care services in South East London continue to be impacted.

Chris Streather, Medical Director for NHS England London, said:

“NHS staff are working around the clock to minimise disruption to patient care following the ransomware cyber-attack on Synnovis earlier this week.

Pathology services at the impacted sites are available – albeit at a reduced capacity – with the most urgent cases being prioritised.

Unfortunately, some non-urgent operations and procedures including transplants continue to be postponed, while nearly all non-urgent blood tests have been postponed in primary care services in South East London.

We are sorry to all those who have been impacted and staff will work hard to re-arrange appointments and treatments as quickly as possible.

Urgent and emergency services are available as usual so patients should access services in the normal way by dialling 999 in an emergency and otherwise use NHS 111 through the NHS App, online or on the phone.

If you have not heard from your healthcare provider, please attend appointments as normal as services including outpatients and community services are mostly running as usual, including cervical screening.”

It is important that you attend your blood test appointment unless you have been contacted with a cancellation. All routine blood tests in south east London are currently paused.

If you’re worried a delay will affect your care, please speak with your healthcare team. We apologise for any inconvenience and thank you for your understanding.

Please visit https://www.selondonics.org/synnovis-cyber-attack/ for more information.