Company Details
change-healthcare
4,876
146,856
5415
optum.com
14082
CHA_9081577
Completed

Change Healthcare Company CyberSecurity Posture
optum.comChange Healthcare is now a part of Optum. To stay up-to-date with news please connect with us at Optum.com. At both Optum and Change Healthcare, our teams strive to help people live healthier lives and help the health system work better for everyone.
Company Details
change-healthcare
4,876
146,856
5415
optum.com
14082
CHA_9081577
Completed
Between 0 and 549

Change Healthcare Global Score (TPRM)XXXX

Description: On August 3, 2024, the California Attorney General reported a data breach involving Change Healthcare Inc. The breach occurred between February 12, 2024, and February 22, 2024, potentially affecting personal information including names, addresses, dates of birth, health insurance data, and Social Security numbers. The number of individuals affected is currently unknown.
Description: The Washington Attorney General's Office reported a data breach involving Change Healthcare Inc. on April 18, 2025. The breach, which occurred between February 17 and February 20, 2024, potentially affected approximately 3,175,442 individuals, with compromised data including personal and health information. This incident highlights the significant impact of data breaches on healthcare organizations, where the loss of sensitive information can have severe consequences for both the organization and the affected individuals.
Description: The Change Healthcare data breach due to a ransomware attack has introduced significant disruptions across the healthcare sector, with UnitedHealth, the parent company, estimating potential costs to be around $1.6 billion. The breach prompted concerns about reporting responsibilities under HIPAA, with provider organizations urging the Office for Civil Rights for clarity and a declaration of sole responsibility resting with Change Healthcare for breach notifications. UnitedHealth has offered support and to undertake notification responsibilities, yet provider organizations seek OCR validation to ensure legal compliance falls on UnitedHealth Group/Change Healthcare as the affected covered entity.
Description: The Change Healthcare data breach in February 2024 significantly impacted over 100 million individuals, marking the largest-ever healthcare data breach in the US. An extensive cyber attack disrupted IT operations, affecting numerous applications, pharmacies, and healthcare providers. Sensitive personal and medical information such as names, Social Security numbers, and treatment details were compromised. The incident led to substantial costs, with UnitedHealth Group reporting $1.1 billion in related expenses. Despite ransom payments, issues with the hacker group BlackCat/ALPHV and subsequent attempts by RansomHub to extort the company exacerbated the situation.
Description: Change Healthcare, part of Optum and a subsidiary of UnitedHealth Group, experienced a significant cyber-attack that led to disruptions in prescription issuance. The attack began to surface on February 21, when certain applications became unavailable due to what was later identified as a network interruption caused by a cybersecurity issue. The company took measures to mitigate the impact by disconnecting its systems upon recognizing an external threat. The disruptions have affected the healthcare transactions of approximately one-third of US patients, given the company's substantial role in handling 15 billion transactions annually. This situation underscores the vulnerability of healthcare providers to cyber threats and the potential for such attacks to significantly delay medical treatments and prescriptions, affecting both the company's operations and patient care.
Description: The Change Healthcare cyberattack has led to a significant disruption in the claims processing system affecting over 1,850 hospitals and 250,000 physicians. The direct impact has been a staggering $6.3 billion cash flow deficit since the breach, as reported through March 9. The inability to process claims digitally has caused a decline in cash and potential long-term consequences such as medical necessity denials and prior authorization denials due to delayed claims. Healthcare providers are struggling to cope with the manpower required for paper claims and the unsustainable financial pressure during the interim of restoring the compromised system. The lack of adequate action from payers exacerbates the situation, making it critical to reassess cybersecurity measures in the healthcare industry.
Description: Change Healthcare experienced a cyberattack, causing significant service disruption. Health systems relying on its services for medical billing and pre-authorizations were forced to delay procedures and prescriptions, resulting in financial strain, including doctor and nurse salary payment issues, with some pushed towards receivership. The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.
Description: In February 2024, **Change Healthcare**, a subsidiary of **UnitedHealth Group**, fell victim to a **devastating ransomware attack** orchestrated by the **ALPHV/BlackCat** cybercriminal group. The breach crippled the company’s **payment and claims processing systems**, disrupting healthcare operations nationwide. Over **15,000 U.S. healthcare providers**—including hospitals, pharmacies, and clinics—experienced **outages in prescription processing, insurance claims, and revenue cycle management**. The attack forced many providers to **revert to manual paperwork**, delaying critical medical services and financial transactions.The incident exposed **sensitive patient data**, including **personal, financial, and medical records**, while the **ransom demand reportedly exceeded $22 million**. UnitedHealth Group confirmed the attack **compromised data across its systems**, though the full scope of the breach remains under investigation. The **prolonged downtime**—lasting weeks—**threatened the financial stability of smaller clinics** and pharmacies, some of which faced **cash flow crises** due to unprocessed claims. The U.S. Department of Health and Human Services (HHS) intervened, urging healthcare entities to **mitigate risks** and adopt emergency protocols. The attack underscored vulnerabilities in **third-party healthcare IT infrastructure**, raising concerns about **future cyber threats to the sector**.
Description: In the **2024 Change Healthcare breach**, attackers exploited a server lacking multifactor authentication (MFA) to infiltrate the company’s **Active Directory (AD)**, the central authentication backbone for over 90% of Fortune 1000 firms. Once inside, they escalated privileges, executed lateral movement, and deployed a **ransomware attack** that crippled operations. The incident forced a **complete halt to patient care services**, exposed **sensitive health records**, and resulted in the company paying **millions in ransom** to restore systems. The attack disrupted billing, claims processing, and pharmacy operations nationwide, causing prolonged financial and reputational damage. The breach highlighted critical vulnerabilities in AD security, including **weak credential management, unpatched systems, and excessive privileged access**, which allowed attackers to maintain persistence and evade detection by mimicking legitimate AD operations. Recovery efforts took weeks, with lingering impacts on healthcare providers and patients reliant on Change Healthcare’s infrastructure.
Description: Change Healthcare experienced a cyberattack leading to widespread disruption of medical billing and pre-authorization services, affecting hundreds of health systems across the United States. The incident resulted in delays in medical procedures, restricted access to prescription medications, financial strains on health systems, and some reportedly facing receivership. The consolidation in healthcare has resulted in fewer alternatives for such services, emphasizing the failures and risks associated with creating single points of failure within critical healthcare infrastructure.
Description: Change Healthcare suffered a significant cyber-attack impacting approximately 190 million individuals, a number revised from an earlier report of 100 million in July. As a major healthcare payment processing firm in the US, the breach's scale and the sensitive nature of the compromised data classify it as one of the most severe healthcare data breaches in 2024. The financial repercussions are substantial, with estimated costs reaching $3.1 billion. ALPHV/Blackcat ransomware group has been implicated in the breach. The incident has led to multiple lawsuits against UnitedHealth Group, Change Healthcare's parent company.
Description: Change Healthcare, a major healthcare payment processing firm, experienced a catastrophic data breach affecting 190 million individuals, as of the latest update by UnitedHealth Group, its parent company. This breach resulted in the loss of sensitive data and financial repercussions amounting to $3.1 billion. Initially reported in February 2024, the breach numbers escalated by 90 million by January 2025. Noted as the worst healthcare data breach of 2024, the incident has led to multiple lawsuits against UnitedHealth Group. ALPHV/Blackcat, a notorious ransomware group, was identified as responsible for the attack.
Description: Change Healthcare experienced a ransomware attack in February that resulted in significant cash flow disruptions for Medicare providers and suppliers, including hospitals, pharmacies, and physicians. The Centers for Medicare and Medicaid Services (CMS) responded by launching the Change Healthcare/Optum Payment Disruption (CHOPD) program to provide accelerated and advance payments to affected parties. More than $3.26 billion was disbursed to ensure continued patient care. CMS has recovered the majority of these payments as providers resumed normal Medicare billing. This incident highlights the potential financial and operational impacts of ransomware on the healthcare sector.
Description: In February 2024, Change Healthcare, a major medical billing processor in the US owned by UnitedHealth, suffered a ransomware attack by ALPHV/BlackCat gang, impacting over 100 million people. The breach involved personal data including phone numbers, addresses, financial information, health records, diagnoses, prescriptions, and treatment details. The company paid a $22 million ransom, but the aftermath saw an increased rate of healthcare-focused cyberattacks, along with lawsuits and significant blowback for compromised security measures.
Description: In February, Change Healthcare suffered a ransomware attack that disrupted its services, impacting cash flow for Medicare providers, including hospitals and pharmacies. The CMS initiated the CHOPD program to alleviate the financial strain on affected parties by distributing over $2.55 billion to Part A providers and more than $717.18 million to Part B suppliers. The swift mitigation efforts by CMS ensured the continued delivery of essential patient care amidst one of the largest cyberattacks targeting the U.S. healthcare sector. Notably, CMS has recouped most of the advance payments, and normal billing processes are now reinstated for providers.
Description: In February 2024, **Change Healthcare** suffered a **massive ransomware attack** after hackers exploited a server lacking multi-factor authentication. The breach compromised **personal health information of over 100 million individuals**, making it one of the largest healthcare data breaches in U.S. history. Operations were severely disrupted, leading to financial losses estimated between **$2.3 billion and $2.45 billion**. The incident triggered investigations by the **U.S. Department of Health and Human Services (HHS)**, intensifying regulatory scrutiny on healthcare cybersecurity. The attack highlighted systemic vulnerabilities in third-party vendors handling sensitive patient data, prompting broader industry-wide concerns about ransomware resilience and proactive threat detection. The fallout included operational chaos, reputational damage, and long-term financial repercussions, reinforcing the need for stricter access controls and advanced threat-monitoring systems.
Description: In February, Change Healthcare/Optum experienced a ransomware attack leading to significant financial and operational disruptions across the U.S. healthcare industry. The Centers for Medicare and Medicaid Services (CMS) initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems for affected Medicare providers and suppliers. Over $2.55 billion in accelerated payments were distributed to Part A providers, and more than $717.18 million in advance payments went to Part B suppliers. Recovery efforts by CMS have been effective, with over 96 percent of CHOPD payments recouped and normal Medicare billing resumed.
Description: Change Healthcare experienced a cybersecurity incident involving AI technologies that potentially exceeded anticipated risks. The event showcased the vulnerability of innovative systems to unforeseen threats, highlighting the lack of preparedness in evolving and securing these technologies. The incident served as a stark reminder that without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.
Description: In February 2024, **Change Healthcare**, a subsidiary of UnitedHealth Group (annual revenue: $370B), fell victim to a **ransomware attack** orchestrated by the BlackCat/AlphV cybercrime syndicate. The breach disrupted **15 billion annual healthcare transactions**, crippling prescription processing, insurance claims, and payment systems across the U.S., including for military personnel. The attack forced hospitals and pharmacies to revert to manual operations, delaying critical care and financial workflows.Change Healthcare confirmed the incident was linked to a **nation-state-associated threat actor** and ultimately paid a **$22 million ransom** to restore systems. The breach exposed sensitive patient data, though the full scope of stolen records remains undisclosed. The fallout triggered federal investigations, class-action lawsuits, and regulatory scrutiny, with the U.S. Department of Health and Human Services (HHS) launching a probe into potential **HIPAA violations**. The attack’s ripple effects persisted for months, straining healthcare providers and eroding trust in digital health infrastructure.
Description: Change Healthcare, a critical healthcare technology provider, fell victim to a devastating ransomware attack in early 2024, orchestrated by an affiliate of the **AlphV/BlackCat** gang. The breach disrupted pharmacy operations, billing systems, and claims processing nationwide, crippling healthcare providers' ability to process payments, verify insurance, or access patient records. The attack forced hospitals and pharmacies to revert to manual processes, delaying treatments, prescriptions, and financial transactions for weeks. The threat actor later pivoted to **RansomHub** after AlphV’s takedown by law enforcement, attempting to monetize the stolen data through multiple leak sites. The incident exposed deep vulnerabilities in healthcare cybersecurity, with reports suggesting the attacker exploited unpatched systems or compromised credentials. The financial and operational fallout was severe: Change Healthcare’s parent company, **UnitedHealth Group**, faced billions in recovery costs, lawsuits, and regulatory scrutiny. The attack also triggered a broader crisis, with smaller clinics and pharmacies facing cash flow shortages, underscoring how ransomware can paralyze critical infrastructure and endanger patient care.
Description: Change Healthcare, a subsidiary of UnitedHealth, faced a massive cyberattack which disrupted billions of medical claims processing and cost the company $3.1 billion. Dubbed the most significant attack in U.S. healthcare history, it led to extensive disruptions in the healthcare sector. The attack's magnitude and repercussions across interconnected systems underscore its potential to ripple through and impact an entire industry.
Description: Change Healthcare, a subsidiary of UnitedHealth, suffered a devastating cyberattack in 2024 carried out by affiliates of the ALPHV ransomware group. The attack resulted in the theft of sensitive data belonging to approximately **100 million Americans**, including personal, medical, and financial records. Beyond data exfiltration, the incident caused massive operational disruptions, crippling healthcare services nationwide. UnitedHealth reported cleanup costs exceeding **$2 billion** within a year, with severe financial strain on suppliers and providers. The breach exposed systemic cybersecurity negligence, leading to lawsuits and regulatory scrutiny. The attack’s ripple effects extended to delayed treatments, financial losses for healthcare entities, and long-term reputational damage to UnitedHealth. The incident underscored the vulnerability of critical healthcare infrastructure to ransomware, with attackers showing no remorse despite life-threatening consequences for patients, including disrupted cancer surgeries and at least one confirmed death linked to the attack’s fallout in London hospitals (via Qilin’s later ransomware strike).
Description: Change Healthcare, a critical vendor in the U.S. healthcare system, suffered a devastating **ransomware attack** in early 2025, disrupting operations across pharmacies, hospitals, and insurance providers nationwide. The attack, attributed to **ALPHV/BlackCat**, encrypted systems and exfiltrated sensitive patient data, including medical records, billing information, and personally identifiable information (PII). The outage lasted weeks, crippling prescription processing, claims submissions, and revenue cycles for thousands of healthcare providers. While Change Healthcare reportedly paid a **$22 million ransom** to restore operations, the financial fallout extended far beyond the payment—providers faced **cash flow crises**, delayed patient care, and long-term reputational damage. The incident also triggered **regulatory scrutiny** and class-action lawsuits, with estimates suggesting total losses (including indirect costs) could exceed **$1 billion**. The attack exposed vulnerabilities in third-party supply chains, demonstrating how a single breach in a vendor can paralyze an entire sector.
Description: In February 2024, Change Healthcare's systems were hit by a ransomware attack, disrupting care across the U.S. and exposing 190 million records. The breach highlighted the vulnerabilities in third-party vendor security and the cascading effects on the healthcare system. The attack caused widespread disruption, financial losses, and exposed sensitive patient data, underscoring the critical need for robust cybersecurity measures in healthcare.
Description: Following a ransomware attack on February 21, the extent of the impact on Change Healthcare, providers, and patients is being evaluated. Class action lawsuits filed against UnitedHealth Group, Optum, Inc., and Change Healthcare are converging in Nashville's federal court, as proposed by Change Healthcare to streamline proceedings. Healthcare providers faced difficulties in checking insurance eligibility and processing prior authorization requests, disrupting patient care. Restoration efforts for Change Healthcare's products and services were still ongoing as of March 31.
Description: Change Healthcare, a subsidiary of Optum Inc and part of UnitedHealth Group, faced a substantial ransomware attack that disabled many of its electronic systems. This disruption halted the ability of thousands of healthcare providers to submit claims and receive payments, causing an estimated $100 million in daily deferred patient care revenue over a period exceeding three weeks. The attack affected various operations, including insurance verification, prior authorization processes, clinical information exchange, and e-prescription services. The aftermath of the attack persisted, with reported continuing challenges and disruptions despite a hefty ransom payment allegedly made.
Description: The ransomware attack on Change Healthcare has caused significant disruption within the healthcare sector, with UnitedHealth estimating breach-related costs around $1.6 billion. The breach has hindered financial recovery and operational functionality for providers relying on Change Healthcare's services, leading to a call for transparent reporting obligations and a plea for guidance from the OCR regarding HIPAA breach reporting requirements. This incident has underscored the need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.
Description: The ransomware attack on Change Healthcare reported on February 21st has caused substantial disruption across the healthcare sector, with the breach costs estimated by UnitedHealth, Change's parent company, to potentially reach $1.6 billion. The breach has drastically affected providers relying on Change Healthcare's services, leading to financial distress, with a clear recovery path not yet in sight. The repercussions of the breach have been amplified by the lack of definitive information and guidance on reporting responsibilities, causing unease among affected healthcare providers.
Description: UnitedHealth Group experienced a ransomware attack by the hacking group BlackCat on Feb. 21, leading to severe delays in processing claims and revenue cycle services, which pushed many healthcare providers towards financial distress and potential bankruptcy. Providers have filed lawsuits for cybersecurity negligence, with claims that sensitive data is now with cybercriminals. UnitedHealth Group paid over $2 billion to impacted providers while the status of compromised data and cooperation with the cyber threat actor remains unclear.
Description: In February 2024, **Change Healthcare**, a critical division of UnitedHealth Group, fell victim to a devastating **BlackCat/ALPHV ransomware attack**. The assault crippled its systems, disrupting prescription processing, medical claims, and payment operations across the U.S. healthcare sector. Over **100 million individuals** were impacted due to service outages, with hospitals, pharmacies, and insurers facing delays in billing, reimbursements, and patient care. The company paid a **$22 million ransom**, but total financial losses ballooned to an estimated **$2 billion**, factoring in operational downtime, recovery costs, and reputational damage. The attack exposed vulnerabilities in third-party supply chains, as the breach originated from compromised credentials in a connected vendor system. Regulatory scrutiny intensified, with federal investigations probing compliance failures under **HIPAA** and cybersecurity negligence. The incident underscored the escalating threat of **RaaS (Ransomware-as-a-Service)** models, where affiliate hackers leverage sophisticated tools to target high-value sectors like healthcare, exploiting systemic interdependencies for maximum disruption.
Description: In February 2024, **Change Healthcare**, a subsidiary of UnitedHealth Group, fell victim to a **ransomware attack** orchestrated by the **BlackCat (ALPHV) cybercrime group**. The breach compromised the **protected health information (PHI) of approximately 192.7 million individuals**, making it one of the largest healthcare data breaches in U.S. history. The attack disrupted critical operations, including **pharmacy services, claims processing, and electronic prescribing systems**, causing widespread delays in patient care and financial transactions across the healthcare sector. The incident forced Change Healthcare to **shut down multiple systems** to contain the breach, leading to **operational outages** and **financial losses** for healthcare providers, pharmacies, and insurers reliant on its infrastructure. The company reportedly **paid a $22 million ransom** to restore systems, though data exfiltration had already occurred. The breach exposed **sensitive patient data**, including medical records, insurance details, and personally identifiable information (PII), raising concerns over **long-term identity theft and fraud risks**. Regulatory investigations by the **U.S. Department of Health and Human Services (HHS)** and potential **class-action lawsuits** further compounded the fallout, underscoring systemic vulnerabilities in healthcare cybersecurity.
Description: Change Healthcare, a critical healthcare technology provider, fell victim to a **SocGholish (FakeUpdates)**-driven cyberattack in early 2025, facilitated by the **RansomHub ransomware**. The attack originated from malicious Google Ads impersonating **Kaiser Permanente’s HR portal**, exploiting SocGholish’s Malware-as-a-Service (MaaS) infrastructure. The breach led to severe operational disruptions, including compromised patient data, financial records, and healthcare service outages. The incident was part of a broader campaign targeting healthcare entities, with **Evil Corp (a Russian cybercrime group linked to GRU Unit 29155)** involved in distributing payloads like **Raspberry Robin worm**. The attack crippled Change Healthcare’s systems, delaying medical treatments, disrupting payment processing for hospitals and pharmacies (e.g., **Rite Aid**), and exposing sensitive personal and financial information of patients and employees. The fallout included **ransom demands**, regulatory scrutiny, and long-term reputational damage, underscoring the threat’s capacity to weaponize trusted digital infrastructure for large-scale exploitation.


Change Healthcare has 825.93% more incidents than the average of same-industry companies with at least one recorded incident.
Change Healthcare has 681.25% more incidents than the average of all companies with at least one recorded incident.
Change Healthcare reported 5 incidents this year: 0 cyber attacks, 5 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Change Healthcare cyber incidents detection timeline including parent company and subsidiaries

Change Healthcare is now a part of Optum. To stay up-to-date with news please connect with us at Optum.com. At both Optum and Change Healthcare, our teams strive to help people live healthier lives and help the health system work better for everyone.

At Globant, we create the digitally-native products that people love. We bridge the gap between businesses and consumers through technology and creativity, leveraging our experience as an AI powerhouse. We dare to digitally transform organizations and strive to delight their customers. - We have mo

Carelon Global Solutions makes healthcare operations more practical, effective, and efficient. Our global team of more than 25K innovators drives growth, delivers exceptional support, and develops digital tools specifically for health plans, providers, and systems. Each day, our partners and experts

LexisNexis Legal & Professional is a leading global provider of legal, regulatory and business information and analytics that help customers increase productivity, improve decision-making and outcomes, and advance the rule of law around the world. We help lawyers win cases, manage their work more e
FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. The company champions complex business opportunities and challenges with its world-class servic

iSoftStone is a global IT service and consulting company‚ÄØthat creates value and drives success through technology solutions, service excellence, and digital innovation. We specialize in web and application development, software testing and support, data and content management, digital experience,

At Ricoh, we bring people, processes, and technology together to make information work for you. We unlock the power of information so organizations can unlock the full potential of their people. We're a leader in information management and digital services, creating competitive advantage for over 1.

NTT DATA, Inc. is a trusted global innovator of business and technology services. We're committed to helping clients innovate, optimize and transform for long-term success. Our R&D investments help organizations and society move confidently and sustainably into the digital future. As a Global Top Em

LTIMindtree is a global technology consulting and digital solutions company that enables enterprises across industries to reimagine business models, accelerate innovation, and maximize growth by harnessing digital technologies. As a digital transformation partner to more than 700 clients, LTIMindtre

Luxoft, a DXC Technology Company (NYSE: DXC), is a digital strategy and software engineering firm providing bespoke technology solutions that drive business change for customers the world over. Acquired by U.S. company DXC Technology in 2019, Luxoft is a global operation in 44 cities and 21 countrie
.png)
A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...
The UnitedHealth Group subsidiaries had attempted to have the case dismissed. However, a court rejected the motion.
What US healthcare operations need to know about the incident, its timeline, the pending litigation, and potential claims adjudication and...
In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.
Healthcare exists at the intersection of trust and vulnerability. Every medical record, test result, and insurance claim is more than just...
The shift from reactive security postures to proactive is in direct response to an ever-rising wave of attacks healthcare industry organizations...
In 2024, there were 600 million cybersecurity attacks each day. And the risk of cyberattacks has increased substantially in recent years due...
Two U.S. senators have written to UnitedHealth Group (UHG) CEO Stephen J. Hemsley demanding answers about cybersecurity and the response to...
U.S. Senators Bill Cassidy, R-La., and Maggie Hassan, D-N.H., have sent a letter to UnitedHealth Group CEO Stephen Hemsley expressing...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Change Healthcare is http://www.changehealthcare.com.
According to Rankiteo, Change Healthcare’s AI-generated cybersecurity score is 100, reflecting their Critical security posture.
According to Rankiteo, Change Healthcare currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Change Healthcare is not certified under SOC 2 Type 1.
According to Rankiteo, Change Healthcare does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Change Healthcare is not listed as GDPR compliant.
According to Rankiteo, Change Healthcare does not currently maintain PCI DSS compliance.
According to Rankiteo, Change Healthcare is not compliant with HIPAA regulations.
According to Rankiteo,Change Healthcare is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Change Healthcare operates primarily in the IT Services and IT Consulting industry.
Change Healthcare employs approximately 4,876 people worldwide.
Change Healthcare presently has no subsidiaries across any sectors.
Change Healthcare’s official LinkedIn profile has approximately 146,856 followers.
Change Healthcare is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, Change Healthcare does not have a profile on Crunchbase.
Yes, Change Healthcare maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/change-healthcare.
As of November 30, 2025, Rankiteo reports that Change Healthcare has experienced 32 cybersecurity incidents.
Change Healthcare has an estimated 36,514 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack, Breach and Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $26.49 billion.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with disconnecting its systems, and recovery measures with ongoing restoration efforts, and recovery measures with cms launched chopd program, and recovery measures with cms initiated the accelerated and advance payment (aap) program (chopd) to mitigate cash flow problems, and and and incident response plan activated with law enforcement takedowns (e.g., lockbit, alphv, hive), and third party assistance with malwarebytes, third party assistance with flashpoint, third party assistance with recorded future, third party assistance with trellix, and and containment measures with infrastructure disruption (e.g., lockbit takedown), containment measures with international ransomware task force operations, and communication strategy with public reports by cybersecurity firms, communication strategy with media coverage of gang fragmentation, and incident response plan activated with change healthcare (2024, unitedhealth group), incident response plan activated with cdk global (2024, $25m ransom paid), incident response plan activated with colonial pipeline (2021, $4.4m ransom paid), incident response plan activated with jbs (2021, $11m ransom paid), incident response plan activated with cognizant (2020, $50m–$70m losses), incident response plan activated with baltimore (2019, $18m recovery cost), incident response plan activated with commonspirit health (2022, $160m losses), incident response plan activated with medibank (2022, 9.7m records at risk), and third party assistance with cybersecurity firms (e.g., for colonial pipeline, change healthcare), third party assistance with doj/europol (qakbot takedown, 2025), third party assistance with insurance providers (e.g., syracuse city school district, 2019), and law enforcement notified with colonial pipeline (fbi recovered $2.3m in bitcoin), law enforcement notified with qakbot (doj seized $24m, 2025), law enforcement notified with danabot (16 russian nationals indicted, 2025), law enforcement notified with washington dc police (babuk leak, 2021), and containment measures with network isolation (e.g., change healthcare, cdk global), containment measures with system shutdowns (e.g., baltimore, 2019), containment measures with disabling rdp access (common in smbs), containment measures with patching zero-days (e.g., moveit, 2023), and remediation measures with data recovery from backups (e.g., sky lakes medical center, 7 months), remediation measures with decryption tools (e.g., wannacry kill switch, 2017), remediation measures with rebuilding systems (e.g., garmin, 2020), remediation measures with credential resets (e.g., after stolen credentials used), and recovery measures with immutable backups (4x faster recovery, 50% less likely to pay ransom), recovery measures with cyber insurance claims (58% of large-value claims in h1 2024), recovery measures with manual processes (e.g., university hospital center zagreb, 2024), recovery measures with third-party forensic investigations, and communication strategy with public disclosures (e.g., colonial pipeline, change healthcare), communication strategy with customer notifications (e.g., patelco credit union, healthcorps), communication strategy with regulatory filings (e.g., sensata technologies, sec), communication strategy with press releases (e.g., british library, 2023), and network segmentation with recommended in mitigation strategies, and enhanced monitoring with recommended post-incident, and third party assistance with cybersecurity firms (e.g., integrity security services, health catalyst), third party assistance with regulatory bodies (hhs, fda, eu agencies), and containment measures with deployment of ai-based threat detection (e.g., blueprint protect™), containment measures with network segmentation for iomt devices, containment measures with endpoint security upgrades, and remediation measures with patch management for vulnerable medical devices, remediation measures with enhanced iam and encryption solutions, remediation measures with dark web monitoring for stolen data, and communication strategy with public disclosures (e.g., hhs breach reports), communication strategy with patient notification campaigns (where applicable), and network segmentation with prioritized for iomt ecosystems, and enhanced monitoring with ai-driven real-time threat analysis, and third party assistance with cyber insurance providers (e.g., resilience), third party assistance with threat intelligence sharing, and containment measures with isolation of compromised vendor systems, containment measures with disabling affected accounts (post-phishing), and remediation measures with restoration from backups (ransomware), remediation measures with mfa reinforcement, remediation measures with vendor security audits, and recovery measures with tested recovery plans (reduced ransom payments to 14% in h1 2025), recovery measures with supply chain diversification, and communication strategy with stakeholder advisories on vendor risks, communication strategy with employee training on ai-powered phishing, and adaptive behavioral waf with recommended, and network segmentation with recommended (zero trust for vendors), and enhanced monitoring with behavioral anomaly detection, enhanced monitoring with ai-powered threat detection for social engineering, and and remediation measures with credit monitoring and identity protection services offered to all 855,787 affected individuals, and communication strategy with breach notification letters to affected individuals, communication strategy with public disclosures (e.g., retina group’s report to state ags and hhs), communication strategy with pdf letter posted on mab’s website, and incident response plan activated with change healthcare: sec 8-k filing, ransom payment, incident response plan activated with ascension: emergency care diversions, forensic investigation, incident response plan activated with m&s/co-op/harrods: system shutdowns, customer notifications, incident response plan activated with at&t: dark web monitoring, credit protection offers, and third party assistance with cybersecurity firms (forensics, recovery), third party assistance with legal counsel (regulatory compliance), third party assistance with pr agencies (crisis communications), and law enforcement notified with fbi (blackcat/alphv, scattered spider), law enforcement notified with uk national cyber security centre (m&s/co-op/harrods), law enforcement notified with interpol/europol (cross-border attacks), and containment measures with network isolation (ascension, retailers), containment measures with endpoint detection/response (edr) deployment, containment measures with dark web monitoring (at&t), containment measures with password resets (m&s customers), and remediation measures with patch management (iot, zero-day vulnerabilities), remediation measures with credential rotation (compromised accounts), remediation measures with data encryption enhancements, remediation measures with legacy system upgrades, and recovery measures with backup restoration (ransomware victims), recovery measures with customer compensation (credit monitoring), recovery measures with operational continuity planning, and communication strategy with public disclosures (sec filings, press releases), communication strategy with customer advisories (at&t, m&s), communication strategy with transparency reports (healthcare breaches), and network segmentation with implemented post-breach (ascension, retailers), and enhanced monitoring with siem upgrades (change healthcare), enhanced monitoring with threat intelligence feeds (at&t), and third party assistance with trustwave spiderlabs (research/threat intelligence), and incident response plan activated with likely (given scale of breach), and remediation measures with ransom payment (millions), remediation measures with patch deployment for domain controllers (post-breach), remediation measures with potential review of ad security posture..
Title: Change Healthcare Cyber-Attack
Description: Change Healthcare, part of Optum and a subsidiary of UnitedHealth Group, experienced a significant cyber-attack that led to disruptions in prescription issuance. The attack began to surface on February 21, when certain applications became unavailable due to what was later identified as a network interruption caused by a cybersecurity issue. The company took measures to mitigate the impact by disconnecting its systems upon recognizing an external threat. The disruptions have affected the healthcare transactions of approximately one-third of US patients, given the company's substantial role in handling 15 billion transactions annually. This situation underscores the vulnerability of healthcare providers to cyber threats and the potential for such attacks to significantly delay medical treatments and prescriptions, affecting both the company's operations and patient care.
Date Detected: 2023-02-21
Type: Cyber-Attack
Title: Change Healthcare Ransomware Attack
Description: In February, Change Healthcare suffered a ransomware attack that disrupted its services, impacting cash flow for Medicare providers, including hospitals and pharmacies. The CMS initiated the CHOPD program to alleviate the financial strain on affected parties by distributing over $2.55 billion to Part A providers and more than $717.18 million to Part B suppliers. The swift mitigation efforts by CMS ensured the continued delivery of essential patient care amidst one of the largest cyberattacks targeting the U.S. healthcare sector. Notably, CMS has recouped most of the advance payments, and normal billing processes are now reinstated for providers.
Date Detected: February
Type: Ransomware Attack
Title: Ransomware Attack on UnitedHealth Group
Description: UnitedHealth Group experienced a ransomware attack by the hacking group BlackCat on Feb. 21, leading to severe delays in processing claims and revenue cycle services, which pushed many healthcare providers towards financial distress and potential bankruptcy. Providers have filed lawsuits for cybersecurity negligence, with claims that sensitive data is now with cybercriminals. UnitedHealth Group paid over $2 billion to impacted providers while the status of compromised data and cooperation with the cyber threat actor remains unclear.
Date Detected: 2023-02-21
Type: Ransomware
Threat Actor: BlackCat
Title: Cyber Incident at Change Healthcare Involving AI Technologies
Description: Change Healthcare experienced a cybersecurity incident involving AI technologies that potentially exceeded anticipated risks. The event showcased the vulnerability of innovative systems to unforeseen threats, highlighting the lack of preparedness in evolving and securing these technologies. The incident served as a stark reminder that without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.
Type: Cyber Incident
Vulnerability Exploited: AI technologies
Title: Change Healthcare Cyberattack
Description: The Change Healthcare cyberattack has led to a significant disruption in the claims processing system affecting over 1,850 hospitals and 250,000 physicians. The direct impact has been a staggering $6.3 billion cash flow deficit since the breach, as reported through March 9. The inability to process claims digitally has caused a decline in cash and potential long-term consequences such as medical necessity denials and prior authorization denials due to delayed claims. Healthcare providers are struggling to cope with the manpower required for paper claims and the unsustainable financial pressure during the interim of restoring the compromised system. The lack of adequate action from payers exacerbates the situation, making it critical to reassess cybersecurity measures in the healthcare industry.
Type: Cyberattack
Title: Cyberattack on Change Healthcare
Description: Change Healthcare experienced a cyberattack, causing significant service disruption. Health systems relying on its services for medical billing and pre-authorizations were forced to delay procedures and prescriptions, resulting in financial strain, including doctor and nurse salary payment issues, with some pushed towards receivership. The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.
Type: Cyberattack
Title: Ransomware Attack on Change Healthcare
Description: A ransomware attack on Change Healthcare disrupted healthcare services, including insurance eligibility checks and prior authorization requests, impacting providers and patients. Restoration efforts were ongoing as of March 31.
Date Detected: 2023-02-21
Type: Ransomware Attack
Title: Change Healthcare Data Breach
Description: The Change Healthcare data breach in February 2024 significantly impacted over 100 million individuals, marking the largest-ever healthcare data breach in the US. An extensive cyber attack disrupted IT operations, affecting numerous applications, pharmacies, and healthcare providers. Sensitive personal and medical information such as names, Social Security numbers, and treatment details were compromised. The incident led to substantial costs, with UnitedHealth Group reporting $1.1 billion in related expenses. Despite ransom payments, issues with the hacker group BlackCat/ALPHV and subsequent attempts by RansomHub to extort the company exacerbated the situation.
Date Detected: February 2024
Type: Data Breach
Threat Actor: BlackCat/ALPHVRansomHub
Motivation: Financial Gain
Title: Change Healthcare Ransomware Attack
Description: Change Healthcare, a major medical billing processor in the US owned by UnitedHealth, suffered a ransomware attack by ALPHV/BlackCat gang, impacting over 100 million people. The breach involved personal data including phone numbers, addresses, financial information, health records, diagnoses, prescriptions, and treatment details. The company paid a $22 million ransom, but the aftermath saw an increased rate of healthcare-focused cyberattacks, along with lawsuits and significant blowback for compromised security measures.
Date Detected: February 2024
Type: Ransomware Attack
Threat Actor: ALPHV/BlackCat gang
Motivation: Financial Gain
Title: Change Healthcare Data Breach
Description: The Change Healthcare data breach due to a ransomware attack has introduced significant disruptions across the healthcare sector, with UnitedHealth, the parent company, estimating potential costs to be around $1.6 billion. The breach prompted concerns about reporting responsibilities under HIPAA, with provider organizations urging the Office for Civil Rights for clarity and a declaration of sole responsibility resting with Change Healthcare for breach notifications. UnitedHealth has offered support and to undertake notification responsibilities, yet provider organizations seek OCR validation to ensure legal compliance falls on UnitedHealth Group/Change Healthcare as the affected covered entity.
Type: Data Breach, Ransomware
Title: Massive Cyberattack on Change Healthcare
Description: Change Healthcare, a subsidiary of UnitedHealth, faced a massive cyberattack which disrupted billions of medical claims processing and cost the company $3.1 billion. Dubbed the most significant attack in U.S. healthcare history, it led to extensive disruptions in the healthcare sector. The attack's magnitude and repercussions across interconnected systems underscore its potential to ripple through and impact an entire industry.
Type: Cyberattack
Title: Change Healthcare Data Breach
Description: Change Healthcare, a major healthcare payment processing firm, experienced a catastrophic data breach affecting 190 million individuals, as of the latest update by UnitedHealth Group, its parent company. This breach resulted in the loss of sensitive data and financial repercussions amounting to $3.1 billion. Initially reported in February 2024, the breach numbers escalated by 90 million by January 2025. Noted as the worst healthcare data breach of 2024, the incident has led to multiple lawsuits against UnitedHealth Group. ALPHV/Blackcat, a notorious ransomware group, was identified as responsible for the attack.
Date Detected: February 2024
Type: Data Breach, Ransomware
Threat Actor: ALPHV/Blackcat
Title: Ransomware Attack on Change Healthcare
Description: The ransomware attack on Change Healthcare has caused significant disruption within the healthcare sector, with UnitedHealth estimating breach-related costs around $1.6 billion. The breach has hindered financial recovery and operational functionality for providers relying on Change Healthcare's services, leading to a call for transparent reporting obligations and a plea for guidance from the OCR regarding HIPAA breach reporting requirements. This incident has underscored the need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.
Type: Ransomware
Title: Ransomware Attack on Change Healthcare
Description: Change Healthcare, a subsidiary of Optum Inc and part of UnitedHealth Group, faced a substantial ransomware attack that disabled many of its electronic systems. This disruption halted the ability of thousands of healthcare providers to submit claims and receive payments, causing an estimated $100 million in daily deferred patient care revenue over a period exceeding three weeks. The attack affected various operations, including insurance verification, prior authorization processes, clinical information exchange, and e-prescription services. The aftermath of the attack persisted, with reported continuing challenges and disruptions despite a hefty ransom payment allegedly made.
Type: Ransomware
Motivation: Financial
Title: Change Healthcare Cyberattack
Description: Change Healthcare experienced a cyberattack leading to widespread disruption of medical billing and pre-authorization services, affecting hundreds of health systems across the United States. The incident resulted in delays in medical procedures, restricted access to prescription medications, financial strains on health systems, and some reportedly facing receivership. The consolidation in healthcare has resulted in fewer alternatives for such services, emphasizing the failures and risks associated with creating single points of failure within critical healthcare infrastructure.
Type: Cyberattack
Title: Change Healthcare Ransomware Attack
Description: Change Healthcare experienced a ransomware attack in February that resulted in significant cash flow disruptions for Medicare providers and suppliers, including hospitals, pharmacies, and physicians. The Centers for Medicare and Medicaid Services (CMS) responded by launching the Change Healthcare/Optum Payment Disruption (CHOPD) program to provide accelerated and advance payments to affected parties. More than $3.26 billion was disbursed to ensure continued patient care. CMS has recovered the majority of these payments as providers resumed normal Medicare billing. This incident highlights the potential financial and operational impacts of ransomware on the healthcare sector.
Date Detected: February
Type: Ransomware Attack
Motivation: Financial Disruption
Title: Change Healthcare Data Breach
Description: Change Healthcare suffered a significant cyber-attack impacting approximately 190 million individuals, a number revised from an earlier report of 100 million in July. As a major healthcare payment processing firm in the US, the breach's scale and the sensitive nature of the compromised data classify it as one of the most severe healthcare data breaches in 2024. The financial repercussions are substantial, with estimated costs reaching $3.1 billion. ALPHV/Blackcat ransomware group has been implicated in the breach. The incident has led to multiple lawsuits against UnitedHealth Group, Change Healthcare's parent company.
Type: Data Breach, Ransomware
Threat Actor: ALPHV/Blackcat ransomware group
Title: Ransomware Attack on Change Healthcare
Description: The ransomware attack on Change Healthcare reported on February 21st has caused substantial disruption across the healthcare sector, with the breach costs estimated by UnitedHealth, Change's parent company, to potentially reach $1.6 billion. The breach has drastically affected providers relying on Change Healthcare's services, leading to financial distress, with a clear recovery path not yet in sight. The repercussions of the breach have been amplified by the lack of definitive information and guidance on reporting responsibilities, causing unease among affected healthcare providers.
Date Publicly Disclosed: 2024-02-21
Type: Ransomware Attack
Title: Change Healthcare/Optum Ransomware Attack
Description: In February, Change Healthcare/Optum experienced a ransomware attack leading to significant financial and operational disruptions across the U.S. healthcare industry. The Centers for Medicare and Medicaid Services (CMS) initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems for affected Medicare providers and suppliers. Over $2.55 billion in accelerated payments were distributed to Part A providers, and more than $717.18 million in advance payments went to Part B suppliers. Recovery efforts by CMS have been effective, with over 96 percent of CHOPD payments recouped and normal Medicare billing resumed.
Date Detected: February
Type: Ransomware Attack
Title: Change Healthcare Inc. Data Breach
Description: The Washington Attorney General's Office reported a data breach involving Change Healthcare Inc. on April 18, 2025. The breach, which occurred between February 17 and February 20, 2024, potentially affected approximately 3,175,442 individuals, with compromised data including personal and health information.
Date Detected: 2024-02-17
Date Publicly Disclosed: 2025-04-18
Type: Data Breach
Title: Change Healthcare Inc. Data Breach
Description: A data breach involving Change Healthcare Inc. was reported by the California Attorney General on August 3, 2024. The breach occurred between February 12, 2024, and February 22, 2024, potentially affecting personal information including names, addresses, dates of birth, health insurance data, and Social Security numbers.
Date Detected: 2024-02-12
Date Publicly Disclosed: 2024-08-03
Type: Data Breach
Title: Ransomware Attack on Change Healthcare
Description: A major ransomware attack on Change Healthcare in February 2024 disrupted healthcare services across the U.S. and exposed 190 million records. The incident highlights the vulnerabilities in the healthcare sector, particularly due to third-party risks and human error.
Date Detected: February 2024
Type: Ransomware
Threat Actor: BlackCatCl0pLockbitMedusaInterlock
Motivation: Financial gain
Title: Change Healthcare Ransomware Attack (2024)
Description: Change Healthcare suffered a significant ransomware attack in February 2024. The breach exploited a server lacking multi-factor authentication (MFA), allowing hackers to access sensitive data and disrupt operations. The attack compromised personal health information (PHI) of over 100 million individuals, marking it as one of the largest healthcare data breaches in U.S. history. The total cost of the response is estimated between $2.3 billion and $2.45 billion. The incident prompted investigations by the U.S. Department of Health and Human Services (HHS) and increased scrutiny of cybersecurity practices in the healthcare sector.
Date Detected: 2024-02
Date Publicly Disclosed: 2024-02
Type: ransomware
Attack Vector: Exploited server lacking multi-factor authentication (MFA)
Vulnerability Exploited: Lack of multi-factor authentication (MFA) on a critical server
Motivation: financial gaindata exfiltration
Title: Fragmentation and Proliferation of Ransomware Gangs (2024–2025)
Description: The ransomware ecosystem has seen a significant splintering, with a surge in new gangs emerging following law enforcement takedowns of major operations like LockBit, BlackCat/AlphV, and Hive. Between July 2024 and June 2025, MalwareBytes tracked 41 new ransomware groups, bringing the total to over 60 active gangs—the highest number recorded. The fragmentation is driven by factors such as leaked ransomware source code (e.g., SafePay sharing code with LockBit), distrust among affiliates, and the commoditization of malware tools. Law enforcement successes have disrupted large RaaS (Ransomware-as-a-Service) operations but failed to secure arrests, allowing threat actors to rebrand or form new groups. The top-10 most active groups now account for only 50% of attacks (down from 69% in 2022), reflecting decentralization. Infighting, exit scams, and cross-group data leaks (e.g., Change Healthcare attack data offered via RansomHub after AlphV's takedown) highlight the volatile and distrustful state of the ecosystem. Experts note that the barrier to entry has lowered due to AI, leaked tools, and initial access brokers, enabling smaller, entrepreneurial groups to operate independently.
Date Publicly Disclosed: 2025-06-30
Type: Ransomware Proliferation
Threat Actor: Splintered LockBit affiliatesRebranded AlphV/BlackCat membersNew entrepreneurial ransomware groups (e.g., SafePay, Qilin, Akira, RansomHub)Initial Access Brokers (IABs)Former Conti/REvil affiliates
Motivation: Financial gainAvoidance of law enforcement scrutinyDistrust in centralized RaaS operationsExploitation of leaked ransomware codeEntrepreneurial independence
Title: Ransomware Attacks Overview (2011–2025)
Description: The last decade has seen a steep increase in ransomware attacks across healthcare, medicine, and supply chains. Threat actors now use RaaS, triple extortion, supply chain attacks, and phishing to coerce companies into paying ransoms. Notable incidents include WannaCry (2017), Colonial Pipeline (2021), MOVEit (2023), Change Healthcare (2024), and CDK Global (2024). Ransom payments and financial losses have surged, with the average ransom payment reaching $2.73M in 2024. Industries like healthcare, education, and financial services remain top targets, while AI-driven phishing and zero-day exploits are rising trends.
Type: ransomware
Attack Vector: phishing emails (67% of attacks in North America)software vulnerabilities (32% of attacks)RDP compromise (30% in SMBs)stolen credentials (29%)unmanaged third-party integrations (25%)zero-day exploits (e.g., MOVEit)RaaS (Ransomware-as-a-Service)botnet malware (e.g., Qakbot, DanaBot)AI-generated phishing luresunpatched systems
Vulnerability Exploited: EternalBlue (WannaCry, 2017)unpatched Windows SMB flaw (WannaCry)MOVEit Transfer zero-day (Clop gang, 2023)third-party compromises (35.5% of breaches in 2024)200+ vulnerabilities in CISA’s KEV catalog (2024–2025)
Threat Actor: LockBit (most prolific in 2025, $91M in payments)RansomHub (most active in 2024–2025)Clop (MOVEit breach, 2023)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, Okta, 2022)Babuk (Washington DC Police, 2021)Scattered Spider (Marks & Spencer, 2025)Russian-linked groups (e.g., DanaBot, Qakbot)State-sponsored actors (e.g., 16 Russian nationals indicted for DanaBot)
Motivation: financial gain (ransom payments, data extortion)disruption of critical infrastructure (e.g., healthcare, supply chains)data theft for dark web sales (e.g., PII, medical records)espionage (e.g., state-linked DanaBot attacks)reputation damage (e.g., leaking sensitive data)
Title: Rising Cyberattacks on IoT-Enabled Medical Devices Fueling Growth in Medical Device Security Market
Description: The global medical device security market is experiencing rapid growth (CAGR 8.8%, 2025–2032) due to increasing cyberattacks on healthcare systems and IoT-enabled medical devices. Key incidents include the Change Healthcare ransomware attack (Feb 2024, 192.7M records compromised) and 307 HHS-investigated breaches in H1 2025. High implementation costs and AI-driven threats (e.g., automated phishing, ransomware) are major challenges, while AI-based security solutions (e.g., Health Catalyst’s BluePrint Protect™) and cloud-based protections are emerging trends. Regulatory compliance and IoMT expansion are driving demand for encryption, IAM, and endpoint security solutions.
Date Publicly Disclosed: 2025-09-04
Type: Cyberattack Trend Analysis
Attack Vector: Ransomware (e.g., Change Healthcare, Feb 2024)AI-driven automated attacks (phishing, vulnerability scanning)IoMT/Connected Device ExploitationData Breaches (23M+ records in first 5 months of 2025)
Vulnerability Exploited: Unsecured IoT/wearable medical devices (34.5% market share in 2025)Legacy system vulnerabilities in healthcare ITLack of network segmentation in medical device ecosystemsWeak identity and access management (IAM) protocols
Threat Actor: Cybercriminal groups leveraging AI tools (e.g., Claude Code)Ransomware operators targeting healthcare (e.g., Change Healthcare attackers)Initial Access Brokers (IABs) selling medical device access on dark web
Motivation: Financial gain (ransomware, data theft for dark web sales)Espionage (theft of sensitive health data)Disruption of critical healthcare services
Title: Midyear 2025 Cyber Risk Landscape Analysis: Ransomware, Vendor Disruptions, and AI-Powered Attacks
Description: A midyear analysis from Resilience highlights how ransomware, third-party disruptions, and AI-powered attacks are reshaping the cyber risk landscape in 2025. The report, based on cyber insurance claims, details the financial impact of attacks, emerging vulnerabilities, and trends affecting organizations across sectors. Key findings include the persistence of vendor-related risks (15% of claims in H1 2025), the dominance of AI-enhanced social engineering (57% of incurred claims, 60% of total losses), and the increasing severity of ransomware attacks (average claim of $1.18M, up 17% from 2024). High-profile incidents like those affecting CDK Global and Change Healthcare demonstrate the cascading impact of single points of failure in supply chains. The report emphasizes the need for dynamic vendor monitoring, advanced threat detection, and reinforced fundamentals to mitigate AI-amplified social engineering risks.
Date Publicly Disclosed: 2025-06-30
Type: Ransomware
Attack Vector: Phishing (AI-enhanced)Impersonation (voice synthesis, browser-based)Vendor Supply Chain CompromiseDouble Extortion (ransomware + data theft)
Vulnerability Exploited: Human error (social engineering susceptibility)Weak vendor security controlsInsufficient multi-factor authentication (MFA) protectionsLack of continuous vendor monitoringGaps in anomaly detection for behavioral baselines
Motivation: Financial gain (ransomware, extortion)Data theft for resale/exploitationDisruption of operations (supply chain impact)
Title: Massive Healthcare Data Breaches Affecting Nearly a Million Americans in Three Separate Incidents
Description: Cybercriminals executed three major digital burglaries at US healthcare providers—Goshen Medical Center (North Carolina), Retina Group of Florida, and Medical Associates of Brevard (Florida)—compromising the personal and medical data of nearly 855,787 Americans within a week. The breaches exposed sensitive information including SSNs, driver’s license numbers, medical records, and financial data. While healthcare delivery was reportedly unaffected, the incidents underscore the persistent targeting of the sector by threat actors, with historical parallels to high-impact attacks like the 2024 Change Healthcare breach (100M records, $2B+ costs) and Qilin’s ransomware assault on London hospitals (resulting in delayed surgeries and a confirmed death).
Date Detected: 2024-03-04 (Goshen Medical Center)2024-11-09 (Retina Group of Florida)
Date Publicly Disclosed: 2024-09-16 (Retina Group of Florida)
Type: Data Breach
Motivation: Data TheftFinancial Gain (potential sale on dark web)
Title: Cybersecurity Threats and Incident Trends (2024-2025)
Description: A comprehensive report on the latest cybersecurity threats, attack statistics, and notable incidents in 2024-2025. Highlights include the rise in ransomware, phishing, malware, and IoT attacks, with significant financial and operational impacts across industries. Key incidents include breaches at Change Healthcare, AT&T, Ascension, M&S, Co-op, and Harrods, alongside broader trends in attack vectors, costs, and regulatory compliance.
Date Publicly Disclosed: 2024-2025
Type: Data Breach
Attack Vector: Phishing (Email, Vishing, Smishing)Malware (Ransomware, Spyware, Trojans)Exploiting Vulnerabilities (Zero-Day, IoT)Credential StuffingSupply Chain AttacksInsider Threats (Malicious/Accidental)DDoS (Zombie IoT Devices)Cryptojacking (Malicious Scripts, Cloud Exploitation)Physical AttacksSystem/Human Error
Vulnerability Exploited: Legacy Firewall Gaps (Encrypted Threats)Unpatched Software (IoT, Zero-Day)Weak Credentials (Reused/Predictable Passwords)Lack of Multi-Factor Authentication (MFA)Misconfigured Cloud StorageThird-Party Vendor RisksSocial Engineering (Trust Exploitation)
Threat Actor: BlackCat/AlphV (Ransomware Group, Nation-State Linked)Scattered Spider (Cybercrime Group)Unspecified APT Groups (Advanced Persistent Threats)Insider Threats (Malicious/Compromised)Opportunistic Cybercriminals (Phishing, BEC)Hacktivists (Data Leaks for Ideological Reasons)
Motivation: Financial Gain (Ransomware, BEC, Cryptojacking)Espionage (Data Theft, Corporate/State Secrets)Disruption (DDoS, Operational Sabotage)Data Exfiltration (Dark Web Sales)Reputation Damage (Brand Targeting)Geopolitical (Nation-State Attacks)
Title: SocGholish (FakeUpdates) Malware-as-a-Service Campaign Exploiting Software Updates
Description: A sophisticated Malware-as-a-Service (MaaS) platform, SocGholish (also known as FakeUpdates), is turning legitimate software updates into a global trap for victims. Operated by threat group TA569 since 2017, the campaign compromises legitimate websites (often WordPress) to inject malicious scripts, using techniques like Domain Shadowing. The platform distributes ransomware (e.g., LockBit, RansomHub), RATs (e.g., AsyncRAT), and data-stealing malware. It acts as an Initial Access Broker (IAB) for criminal groups like Evil Corp and has ties to Russian state-sponsored actors (GRU Unit 29155). Recent attacks include healthcare targets via malicious Google Ads impersonating Kaiser Permanente’s HR portal, leading to breaches at Change Healthcare and Rite Aid.
Date Publicly Disclosed: 2025
Type: Malware-as-a-Service (MaaS)
Attack Vector: Compromised Legitimate Websites (e.g., WordPress via wp-admin exploits)Domain Shadowing (malicious subdomains on trusted sites)Malicious Software Updates (e.g., browser/Flash Player impersonation)Traffic Distribution Systems (TDS) like Keitaro and Parrot TDSMalvertising (e.g., Google Ads impersonating Kaiser Permanente HR portal)
Vulnerability Exploited: Compromised WordPress admin accountsLegitimate website vulnerabilities enabling script injectionUser trust in software update promptsLack of subdomain monitoring (Domain Shadowing)
Threat Actor: Name: TA569, Type: Cybercriminal Group, Motivation: Financial (Malware-as-a-Service revenue), Affiliations: ['Evil Corp', 'Russian GRU Unit 29155 (state-sponsored link)'], Name: Evil Corp, Type: Russian Cybercrime Syndicate, Motivation: Financial (ransomware, data theft), Affiliations: ['Russian intelligence services'], Name: GRU Unit 29155, Type: Russian Military Intelligence, Motivation: Espionage/State-Sponsored Operations, Payloads: ['Raspberry Robin worm'].
Motivation: Financial Gain (MaaS subscriptions, ransomware profits)Cybercrime Enablement (selling access to affiliates)State-Sponsored Activities (via GRU Unit 29155)
Title: Active Directory Compromise and Ransomware Attack on Change Healthcare (2024)
Description: In the 2024 Change Healthcare breach, attackers exploited a server lacking multifactor authentication (MFA), pivoted to Active Directory (AD), escalated privileges, and executed a highly costly ransomware attack. The incident disrupted patient care, exposed health records, and resulted in millions paid in ransom. The attack demonstrated the criticality of AD as the 'holy grail' for adversaries, enabling full network control through techniques like Golden Ticket, DCSync, and Kerberoasting. Hybrid environments (on-premises + cloud) expanded the attack surface, with attackers exploiting synchronization gaps, legacy protocols (e.g., NTLM), and fragmented security postures. Common vulnerabilities included weak passwords, stale service accounts, cached credentials, and poor visibility into privileged access. The breach underscored the need for layered defenses: strong password policies, privileged access management (PAM), zero-trust principles, continuous monitoring, and rapid patching of domain controllers.
Date Publicly Disclosed: 2024-02-00
Type: Data Breach
Attack Vector: Compromised Credentials (Phishing/Malware/Breach Databases)Server Without MFAActive Directory Exploitation (Golden Ticket, DCSync, Kerberoasting)Hybrid Environment Abuse (Azure AD Connect, OAuth Tokens, NTLM Relay)
Vulnerability Exploited: Weak/Reused Passwords (88% of breaches per Verizon DBIR)Service Accounts with Non-Expiring Passwords & Excessive PermissionsCached Administrative Credentials in Workstation MemoryLack of Visibility into Privileged Account UsageStale Accounts (Former Employees with Retained Access)Unpatched Domain Controllers (Privilege Escalation Flaw, April 2025)Legacy Protocols (NTLM Enabled for Backward Compatibility)Fragmented Security Posture (On-Premises vs. Cloud Visibility Gaps)
Motivation: Financial Gain (Ransom Payment)Data Theft (Health Records)Disruption (Patient Care Halt)
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Server lacking multi-factor authentication (MFA), VPN exploitsPhishingStolen credentialsUnpatched vulnerabilities, phishing emails (67% of attacks)unpatched vulnerabilities (32%)RDP compromise (30% in SMBs)stolen credentials (29%)third-party software (25%)malicious ads/websites (e.g., Fake Chrome updates for Spora)botnets (e.g., Necurs for Locky, Qakbot for ransomware delivery), Exploited vulnerabilities in unpatched medical devicesPhishing emails targeting healthcare employeesCompromised third-party vendors (e.g., IT service providers), Compromised vendor systems (e.g., CDK Global, Change Healthcare)Phishing/impersonation (AI-enhanced), Phishing emails (Ascension malware download)Exploited vulnerabilities (Change Healthcare)Compromised credentials (AT&T 2019 breach)Third-party vendors (supply chain attacks)Unpatched IoT devices (lateral movement), Compromised WordPress sites (wp-admin exploits)Domain Shadowing (malicious subdomains)Malvertising (e.g., Google Ads impersonating HR portals) and Server Without MFA.

Systems Affected: Prescription issuance applications
Operational Impact: Disruptions in prescription issuance

Operational Impact: Disruption of services, impacting cash flow for Medicare providers

Financial Loss: $2 billion
Systems Affected: Claims processingRevenue cycle services
Operational Impact: Severe delays in processing claims and revenue cycle services
Legal Liabilities: Lawsuits for cybersecurity negligence

Systems Affected: AI technologies

Financial Loss: $6.3 billion
Systems Affected: Claims processing system
Operational Impact: Inability to process claims digitallyDecline in cashMedical necessity denialsPrior authorization denialsDelayed claims

Systems Affected: Medical billingPre-authorizations
Operational Impact: Delay in proceduresDelay in prescriptionsDoctor and nurse salary payment issues

Systems Affected: Insurance eligibility checksPrior authorization requests
Operational Impact: Disruption in patient care
Legal Liabilities: Class action lawsuits

Financial Loss: $1.1 billion
Data Compromised: Names, Social security numbers, Treatment details
Systems Affected: ApplicationsPharmaciesHealthcare providers

Data Compromised: Phone numbers, Addresses, Financial information, Health records, Diagnoses, Prescriptions, Treatment details
Brand Reputation Impact: Significant blowback for compromised security measures
Legal Liabilities: Lawsuits

Financial Loss: $1.6 billion

Financial Loss: $3.1 billion
Systems Affected: Medical claims processing systems
Operational Impact: Extensive disruptions in the healthcare sector

Financial Loss: $3.1 billion
Data Compromised: Sensitive data
Legal Liabilities: Multiple lawsuits

Financial Loss: $1.6 billion

Financial Loss: $100 million in daily deferred patient care revenue
Systems Affected: electronic systemsinsurance verificationprior authorization processesclinical information exchangee-prescription services
Downtime: over three weeks
Operational Impact: halted the ability of thousands of healthcare providers to submit claims and receive payments
Revenue Loss: $100 million in daily deferred patient care revenue

Financial Loss: Delays in medical proceduresRestricted access to prescription medicationsFinancial strains on health systemsSome health systems facing receivership
Systems Affected: Medical billing servicesPre-authorization services
Operational Impact: Widespread disruption of medical billing and pre-authorization services

Operational Impact: Cash Flow Disruptions

Financial Loss: $3.1 billion
Data Compromised: Sensitive healthcare data
Legal Liabilities: Multiple lawsuits

Financial Loss: $1.6 billion
Operational Impact: Substantial disruption across the healthcare sector

Operational Impact: Significant financial and operational disruptions

Data Compromised: Personal information, Health information

Data Compromised: Names, Addresses, Dates of birth, Health insurance data, Social security numbers

Data Compromised: 190 million records
Operational Impact: Disruption of healthcare services across the U.S.
Identity Theft Risk: High

Financial Loss: $2.3 billion to $2.45 billion (estimated response cost)
Data Compromised: Personal health information (PHI) of over 100 million individuals
Systems Affected: network serversoperational systems
Operational Impact: Significant disruption to healthcare operations and payment processing
Brand Reputation Impact: Severe damage due to scale of breach and regulatory scrutiny
Legal Liabilities: Investigations by U.S. Department of Health and Human Services (HHS)
Identity Theft Risk: High (due to exposure of PHI for 100M+ individuals)

Data Compromised: Widespread (varies by group; e.g., Change Healthcare data leaked via multiple gangs)
Operational Impact: Increased volatility in ransomware operations; decentralization of attack sources
Brand Reputation Impact: Erosion of trust in cybercriminal underground; infighting among gangs
Identity Theft Risk: High (due to leaked PII from attacks like Change Healthcare)
Payment Information Risk: High (ransomware groups target financial and healthcare sectors)

Financial Loss: $4B (WannaCry, 2017)$18M (Baltimore, 2019)$50M–$70M (Cognizant, 2020)$4.4M (Colonial Pipeline) + $11M (JBS, 2021)$1.1B (MOVEit breaches, 2023)$22M ransom + $2B losses (Change Healthcare, 2024)$25M (CDK Global, 2024)$160M (CommonSpirit Health, 2022)$300M (Marks & Spencer, 2024–2025)$4B (Sensata Technologies, 2025)Average ransom payment: $2.73M (2024, up from $1.5M in 2023)Average cost per attack: $5.13M (2025, +574% since 2019)
Data Compromised: 93.3m individuals (moveit, 2023), 9.7m medical records (medibank, 2022), 5.6m patient records (healthcorps, 2024), 726k customers (patelco credit union, 2024), 254k users (kadokawa/niconico, 2024), 500gb (spanish tax agency, 2024), 1tb (nvidia, 2022), 190gb (samsung, 2022), 65gb (british library, university of hawaii, 2023), Pii, payment info, medical records, corporate secrets (e.g., apple blueprints via quanta, 2021)
Systems Affected: 300K+ computers (WannaCry, 150+ countries, 2017)650 servers + 150 apps (Sky Lakes Medical Center, 2021)800 servers (Costa Rica government, 2022)10TB data (Canon, 2020)740GB (Toshiba, 2021)1.4M patient records (Lubbock County, 2019)Port of Nagoya (10% of Japan’s trade disrupted, 2023)thousands of dealerships (CDK Global, 2024)US fuel supply (Colonial Pipeline, 2021)US meat supply (JBS, 2021)
Downtime: ['1 month (Baltimore, 2019)', '7 months (Sky Lakes Medical Center, 2021)', 'prolonged disruptions (Change Healthcare, CDK Global, 2024)', 'manual processes (University Hospital Center Zagreb, 2024)']
Operational Impact: fuel shortages (Colonial Pipeline, 2021)meat supply disruption (JBS, 2021)healthcare service outages (CommonSpirit, Change Healthcare)auto sales halted (CDK Global, 2024)container operations destroyed (Port of Nagoya, 2023)online retail disruptions (Marks & Spencer, 2024–2025)government crises (Costa Rica, 2022)
Revenue Loss: ['$2B (Change Healthcare, 2024)', '$300M (Marks & Spencer, 2024–2025)', '$160M (CommonSpirit Health, 2022)', 'stock price drops (e.g., Carnival Corp, 2020)', 'market cap drop of £1B (Marks & Spencer, 2025)']
Brand Reputation Impact: leaked sensitive data (e.g., Washington DC Police, British Library)loss of trust in healthcare (e.g., Medibank, Healthcorps)publicized breaches (e.g., Christie’s, 2025)
Legal Liabilities: fines for regulatory violations (e.g., GDPR, HIPAA)lawsuits from affected customers (e.g., patients, credit union members)SEC disclosures (e.g., Sensata Technologies, 2025)
Identity Theft Risk: ['9.7M medical records (Medibank, 2022)', '5.6M patient records (Healthcorps, 2024)', '726K customers (Patelco Credit Union, 2024)', '500K clients (Christie’s, 2025)']
Payment Information Risk: ['credit card data (e.g., Patelco Credit Union, 2024)', 'financial records (e.g., Spanish Tax Agency, 2024)', 'cryptocurrency theft (e.g., CoinDash, 2017)']

Data Compromised: 215.7M+ records (Change Healthcare: 192.7M; H1 2025 breaches: 23M+)
Systems Affected: IoT-enabled medical devices (wearables, implantables, diagnostic tools)Hospital networks and EHR systemsCloud-based healthcare platforms
Operational Impact: Disruption of patient care services (e.g., delayed diagnoses/treatments)Increased IT security overhead for healthcare providersRegulatory scrutiny and compliance burdens
Brand Reputation Impact: Erosion of patient trust in digital health technologiesReputational damage to affected healthcare providers (e.g., Change Healthcare)
Legal Liabilities: Potential HIPAA violations (U.S.) and GDPR (EU) finesClass-action lawsuits from affected patients
Identity Theft Risk: High (PII/PHI exposure in 200M+ records)

Operational Impact: Industry-wide disruptions (e.g., CDK Global, Change Healthcare)Supply chain ripple effectsIT helpdesk compromises via social engineering
Brand Reputation Impact: Erosion of trust in vendor securityPerceived vulnerability to AI-powered attacks

Operational Impact: None reported (healthcare delivery unaffected)
Customer Complaints: ['Potential lawsuits (e.g., Levi & Korsinsky investigating Retina Group of Florida)']
Brand Reputation Impact: High (massive breaches in healthcare sector)Credit monitoring offered to 855,787 individuals
Legal Liabilities: Potential lawsuitsRegulatory notifications to state attorneys general and HHS
Identity Theft Risk: ['High (SSNs, driver’s license numbers, medical records exposed)']
Payment Information Risk: ['Limited subset of 246,711 individuals (Medical Associates of Brevard)']

Financial Loss: Incident: Change Healthcare Ransomware, Amount: $22 million (ransom) + $330M+ (operational costs), Incident: AT&T Data Breach, Amount: Undisclosed (73M records exposed, 2019 breach), Incident: Ascension Malware Attack, Amount: Undisclosed (emergency care diversions, data theft), Incident: M&S/Co-op/Harrods Hacks, Amount: Undisclosed (payment data risk, operational disruption), Incident: Average Ransomware Cost, Amount: $4.91M (including downtime/recovery), Incident: Average IoT Attack Cost, Amount: $330,000+, Incident: Business Email Compromise (BEC), Amount: $6.3B (2024 total),
Data Compromised: 3b+ records (largest breach, yahoo 2013), 198m americans (healthcare breaches, 2024), 73m at&t customers (ssns, 2019 breach), 57m uber users/drivers (2016), 339m marriott guests (2018), Pii, phi, payment data, credentials, military/civilian records
Systems Affected: Healthcare (Change Healthcare, Ascension)Telecom (AT&T)Retail (M&S, Co-op, Harrods)Government/Military (Pentagon 2015)IoT Devices (124% attack increase)Cloud Infrastructure (Cryptojacking)
Downtime: ['Change Healthcare: Weeks (prescription/insurance disruptions)', 'Ascension: Days (emergency care diversions)', 'M&S/Co-op/Harrods: Hours-Days (system shutdowns)', 'Average Ransomware Downtime: 22 days (2024)']
Operational Impact: Supply chain disruptions (healthcare, retail)Regulatory scrutiny (SEC filings, GDPR violations)Customer churn (trust erosion)Increased insurance premiumsIncident response resource drain
Revenue Loss: ['United Healthcare: $370B revenue (Change Healthcare subsidiary)', 'Retailers: Undisclosed (sales disruption during peak periods)']
Customer Complaints: ['Prescription delays (Change Healthcare)', 'Identity theft fears (AT&T SSN exposure)', 'Login resets (M&S/Co-op/Harrods)']
Brand Reputation Impact: Healthcare: Erosion of patient trustTelecom: Long-term credibility damage (AT&T)Retail: Short-term sales declines (M&S, Harrods)
Legal Liabilities: SEC 8-K filings (Change Healthcare)GDPR/CCPA violations (AT&T, healthcare breaches)Class-action lawsuits (data breach victims)Regulatory fines (e.g., $4.99M for insider threats)
Identity Theft Risk: ['High (AT&T SSNs, healthcare PII)', 'Moderate (retail payment data, masked)']
Payment Information Risk: ['M&S: Masked card data (low risk)', 'AT&T: SSNs (high risk)', 'Healthcare: PHI + insurance data (critical risk)']

Data Compromised: Sensitive business information, Credentials (via data-stealing malware), Potential pii/phi (in healthcare attacks)
Systems Affected: End-user devices (via fake updates)Legitimate websites (compromised for distribution)Healthcare systems (e.g., Change Healthcare, Rite Aid)
Operational Impact: Disruption of healthcare services (e.g., Change Healthcare)Loss of trust in software update mechanismsIncreased incident response costs for affected organizations
Brand Reputation Impact: Erosion of trust in legitimate software vendorsReputational damage to compromised websites (e.g., WordPress hosts)
Identity Theft Risk: High (via stolen credentials and PII)

Financial Loss: Millions (Ransom Paid + Operational Costs)
Data Compromised: Health records, Patient data
Systems Affected: Active DirectoryDomain ControllersHybrid Cloud Infrastructure (Azure AD)Patient Care Systems
Downtime: Extended (Patient Care Disruption)
Operational Impact: Severe (Halt in Patient Services, Administrative Paralysis)
Customer Complaints: High (Patients and Healthcare Providers)
Brand Reputation Impact: Significant (Loss of Trust in Healthcare Data Security)
Identity Theft Risk: High (Exposed Health Records)
Average Financial Loss: The average financial loss per incident is $827.73 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Medical Information, , Phone Numbers, Addresses, Financial Information, Health Records, Diagnoses, Prescriptions, Treatment Details, , Sensitive data, Sensitive healthcare data, Personal Information, Health Information, , Names, Addresses, Dates Of Birth, Health Insurance Data, Social Security Numbers, , Patient information, Personal Health Information (Phi), Patient Records, , Personally Identifiable Information (Pii), Healthcare Records, Financial Data, Corporate Secrets, , Pii (E.G., Medibank, Patelco Credit Union), Medical Records (E.G., Commonspirit, Healthcorps), Payment Information (E.G., Spanish Tax Agency), Corporate Secrets (E.G., Apple Blueprints Via Quanta), Government Data (E.G., Washington Dc Police, Costa Rica), Student/Employee Data (E.G., Munster Technological University), Customer Data (E.G., Christie’S, Marks & Spencer), , Protected Health Information (Phi), Personally Identifiable Information (Pii), Medical Device Operational Data, , Personal Information (Names, Dates Of Birth), Social Security Numbers (Ssns), Driver’S License/State Id Numbers, Medical Record Numbers, Medical Treatment Information, Health Insurance Information, Financial Account Information (Limited Subset At Mab), , Personally Identifiable Information (Pii), Protected Health Information (Phi), Social Security Numbers (Ssns), Payment Card Data (Masked/Unmasked), Credentials (Usernames, Passwords), Military/Civilian Personnel Records (Pentagon 2015), Corporate Espionage Data, , Credentials, Sensitive Business Data, Potentially Pii/Phi (In Healthcare Attacks), , Health Records, Patient Data, Potentially Administrative Credentials and .

Entity Name: Change Healthcare
Entity Type: Healthcare Provider
Industry: Healthcare
Location: United States
Customers Affected: Approximately one-third of US patients

Entity Name: Change Healthcare
Entity Type: Healthcare Service Provider
Industry: Healthcare
Location: United States
Customers Affected: Medicare providers, including hospitals and pharmacies

Entity Name: UnitedHealth Group
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Organization
Industry: Healthcare
Customers Affected: Over 1,850 hospitals, 250,000 physicians

Entity Name: Change Healthcare
Entity Type: Healthcare Service Provider
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare

Entity Name: Healthcare Providers
Entity Type: Organizations
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare
Location: US
Customers Affected: Over 100 million individuals

Entity Name: Change Healthcare
Entity Type: Medical Billing Processor
Industry: Healthcare
Location: US
Customers Affected: Over 100 million people

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Organization
Industry: Healthcare
Location: United States

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare Payment Processing
Customers Affected: 190 million individuals

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Healthcare
Industry: Healthcare
Customers Affected: thousands of healthcare providers

Entity Name: Change Healthcare
Entity Type: Organization
Industry: Healthcare
Location: United States
Customers Affected: Hundreds of health systems

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare payment processing
Location: US
Customers Affected: 190 million individuals

Entity Name: Change Healthcare
Entity Type: Company
Industry: Healthcare
Customers Affected: Providers relying on Change Healthcare's services

Entity Name: Change Healthcare/Optum
Entity Type: Healthcare Industry
Industry: Healthcare
Location: U.S.

Entity Name: Change Healthcare Inc.
Entity Type: Company
Industry: Healthcare
Customers Affected: 3,175,442

Entity Name: Change Healthcare Inc.
Entity Type: Company
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Healthcare
Industry: Healthcare
Location: U.S.

Entity Name: Change Healthcare
Entity Type: Healthcare technology and payment processing company
Industry: Healthcare
Location: United States
Customers Affected: 100 million+ individuals (PHI compromised)

Entity Name: Healthcare payers and providers (indirectly affected)
Entity Type: insurance companies, hospitals, clinics, contractors
Industry: Healthcare
Location: United States (primarily)

Entity Name: Change Healthcare
Entity Type: Healthcare Technology
Industry: Healthcare
Location: United States

Entity Name: Multiple unnamed victims of 60+ active ransomware gangs
Entity Type: Corporations, Government Agencies, Critical Infrastructure
Location: Global

Entity Name: Change Healthcare (UnitedHealth Group)
Entity Type: healthcare
Industry: healthcare IT
Location: USA
Size: large (100M+ people affected)
Customers Affected: 100M+

Entity Name: CDK Global
Entity Type: corporation
Industry: automotive retail
Location: USA, Canada
Size: large
Customers Affected: thousands of dealerships

Entity Name: Colonial Pipeline
Entity Type: corporation
Industry: energy/oil
Location: USA
Size: large
Customers Affected: US East Coast fuel supply

Entity Name: JBS S.A.
Entity Type: corporation
Industry: food/agriculture
Location: global (HQ: Brazil)
Size: large
Customers Affected: global meat supply chain

Entity Name: MOVEit (Progress Software)
Entity Type: corporation
Industry: software/IT
Location: global
Size: large
Customers Affected: 2,700+ organizations, 93.3M individuals

Entity Name: Marks & Spencer
Entity Type: corporation
Industry: retail
Location: UK
Size: large

Entity Name: CommonSpirit Health
Entity Type: healthcare
Industry: healthcare
Location: USA
Size: large

Entity Name: Medibank Private
Entity Type: healthcare
Industry: health insurance
Location: Australia
Size: large
Customers Affected: 9.7M

Entity Name: Cognizant
Entity Type: corporation
Industry: IT services
Location: global (HQ: USA)
Size: large

Entity Name: Baltimore City Government
Entity Type: government
Industry: public administration
Location: USA (Maryland)
Size: municipal
Customers Affected: residents

Entity Name: University Hospital Center Zagreb
Entity Type: healthcare
Industry: healthcare
Location: Croatia
Size: large (largest in Croatia)

Entity Name: Kadokawa Corporation
Entity Type: corporation
Industry: publishing/media
Location: Japan
Size: large
Customers Affected: 254K users (Niconico)

Entity Name: Patelco Credit Union
Entity Type: financial
Industry: banking
Location: USA
Size: medium
Customers Affected: 726K

Entity Name: Spanish Tax Agency (Agencia Tributaria)
Entity Type: government
Industry: public administration
Location: Spain
Size: large

Entity Name: Port of Nagoya
Entity Type: infrastructure
Industry: logistics/trade
Location: Japan
Size: large (10% of Japan’s trade)

Entity Name: British Library
Entity Type: public institution
Industry: education/culture
Location: UK
Size: large

Entity Name: Sensata Technologies
Entity Type: corporation
Industry: technology/manufacturing
Location: USA
Size: large

Entity Name: Christie’s
Entity Type: corporation
Industry: auction/art
Location: global (HQ: UK)
Size: large
Customers Affected: 500K clients

Entity Name: Change Healthcare
Entity Type: Healthcare IT Company
Industry: Healthcare
Location: U.S.
Customers Affected: 192.7 million individuals

Entity Name: U.S. Healthcare Providers (HHS Investigations)
Entity Type: Hospitals, Clinics, Diagnostic Centers
Industry: Healthcare
Location: U.S.
Customers Affected: 23M+ individuals (H1 2025 breaches)

Entity Name: Global Medical Device Manufacturers
Entity Type: Medical Device OEMs
Industry: Healthcare/Manufacturing
Location: Global

Entity Name: CDK Global
Entity Type: Vendor/Third-Party
Industry: Automotive Retail Software
Location: United States
Customers Affected: Industry-wide (automotive dealerships)

Entity Name: Change Healthcare
Entity Type: Vendor/Third-Party
Industry: Healthcare Technology
Location: United States
Customers Affected: Healthcare providers, insurers

Entity Name: Unspecified Organizations (Resilience Portfolio)
Entity Type: Diverse
Industry: Multiple Sectors
Location: Global

Entity Name: Goshen Medical Center
Entity Type: Healthcare Provider
Industry: Healthcare
Location: North Carolina, USA
Customers Affected: 456385

Entity Name: Retina Group of Florida
Entity Type: Healthcare Provider
Industry: Healthcare (Ophthalmology)
Location: Florida, USA (22 locations across east, west, and gulf coasts)
Customers Affected: 153429

Entity Name: Medical Associates of Brevard (MAB)
Entity Type: Healthcare Provider
Industry: Healthcare
Location: Brevard, Florida, USA
Customers Affected: 246711

Entity Name: Change Healthcare (United Healthcare)
Entity Type: Healthcare
Industry: Healthcare IT/Payment Processing
Location: USA
Size: Enterprise ($370B revenue)
Customers Affected: 15B annual transactions (US military included)

Entity Name: AT&T
Entity Type: Telecommunications
Industry: Telecom
Location: USA
Size: Enterprise
Customers Affected: 73M (7.6M current + 65.4M former)

Entity Name: Ascension
Entity Type: Healthcare Provider
Industry: Healthcare
Location: USA
Size: Large (multi-hospital system)
Customers Affected: Undisclosed (data theft confirmed)

Entity Name: Marks & Spencer (M&S)
Entity Type: Retailer
Industry: Retail
Location: UK
Size: Enterprise
Customers Affected: Undisclosed (payment data risk)

Entity Name: Co-op
Entity Type: Retailer
Industry: Retail/Grocery
Location: UK
Size: Large
Customers Affected: Undisclosed (system shutdowns)

Entity Name: Harrods
Entity Type: Luxury Retailer
Industry: Retail
Location: UK
Size: Enterprise
Customers Affected: Undisclosed (ransomware attempt)

Entity Name: General Businesses (Global)
Entity Type: Cross-Industry
Industry: All Sectors
Location: Worldwide
Size: SMB to Enterprise
Customers Affected: 59% hit by ransomware (2024)

Entity Name: Change Healthcare
Entity Type: Healthcare Organization
Industry: Healthcare
Location: USA

Entity Name: Rite Aid
Entity Type: Pharmacy Retail Chain
Industry: Healthcare/Retail
Location: USA

Entity Name: Kaiser Permanente (impersonated via malicious ads)
Entity Type: Healthcare Provider
Industry: Healthcare
Location: USA

Entity Name: Various WordPress Website Owners
Entity Type: Legitimate Businesses/Website Operators
Industry: Multiple
Location: Global

Entity Name: Change Healthcare
Entity Type: Healthcare Technology Company
Industry: Healthcare
Location: United States
Size: Large (Fortune 1000)
Customers Affected: Patients and Healthcare Providers (Exact Number Undisclosed)

Containment Measures: Disconnecting its systems

Recovery Measures: Ongoing restoration efforts

Recovery Measures: CMS launched CHOPD program

Recovery Measures: CMS initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems

Incident Response Plan Activated: True

Incident Response Plan Activated: Law enforcement takedowns (e.g., LockBit, AlphV, Hive)
Third Party Assistance: Malwarebytes, Flashpoint, Recorded Future, Trellix.
Containment Measures: Infrastructure disruption (e.g., LockBit takedown)International Ransomware Task Force operations
Communication Strategy: Public reports by cybersecurity firmsMedia coverage of gang fragmentation

Incident Response Plan Activated: ['Change Healthcare (2024, UnitedHealth Group)', 'CDK Global (2024, $25M ransom paid)', 'Colonial Pipeline (2021, $4.4M ransom paid)', 'JBS (2021, $11M ransom paid)', 'Cognizant (2020, $50M–$70M losses)', 'Baltimore (2019, $18M recovery cost)', 'CommonSpirit Health (2022, $160M losses)', 'Medibank (2022, 9.7M records at risk)']
Third Party Assistance: Cybersecurity Firms (E.G., For Colonial Pipeline, Change Healthcare), Doj/Europol (Qakbot Takedown, 2025), Insurance Providers (E.G., Syracuse City School District, 2019).
Law Enforcement Notified: Colonial Pipeline (FBI recovered $2.3M in Bitcoin), Qakbot (DOJ seized $24M, 2025), DanaBot (16 Russian nationals indicted, 2025), Washington DC Police (Babuk leak, 2021),
Containment Measures: network isolation (e.g., Change Healthcare, CDK Global)system shutdowns (e.g., Baltimore, 2019)disabling RDP access (common in SMBs)patching zero-days (e.g., MOVEit, 2023)
Remediation Measures: data recovery from backups (e.g., Sky Lakes Medical Center, 7 months)decryption tools (e.g., WannaCry kill switch, 2017)rebuilding systems (e.g., Garmin, 2020)credential resets (e.g., after stolen credentials used)
Recovery Measures: immutable backups (4x faster recovery, 50% less likely to pay ransom)cyber insurance claims (58% of large-value claims in H1 2024)manual processes (e.g., University Hospital Center Zagreb, 2024)third-party forensic investigations
Communication Strategy: public disclosures (e.g., Colonial Pipeline, Change Healthcare)customer notifications (e.g., Patelco Credit Union, Healthcorps)regulatory filings (e.g., Sensata Technologies, SEC)press releases (e.g., British Library, 2023)
Network Segmentation: ['recommended in mitigation strategies']
Enhanced Monitoring: recommended post-incident

Third Party Assistance: Cybersecurity Firms (E.G., Integrity Security Services, Health Catalyst), Regulatory Bodies (Hhs, Fda, Eu Agencies).
Containment Measures: Deployment of AI-based threat detection (e.g., BluePrint Protect™)Network segmentation for IoMT devicesEndpoint security upgrades
Remediation Measures: Patch management for vulnerable medical devicesEnhanced IAM and encryption solutionsDark web monitoring for stolen data
Communication Strategy: Public disclosures (e.g., HHS breach reports)Patient notification campaigns (where applicable)
Network Segmentation: Prioritized for IoMT ecosystems
Enhanced Monitoring: AI-driven real-time threat analysis

Third Party Assistance: Cyber Insurance Providers (E.G., Resilience), Threat Intelligence Sharing.
Containment Measures: Isolation of compromised vendor systemsDisabling affected accounts (post-phishing)
Remediation Measures: Restoration from backups (ransomware)MFA reinforcementVendor security audits
Recovery Measures: Tested recovery plans (reduced ransom payments to 14% in H1 2025)Supply chain diversification
Communication Strategy: Stakeholder advisories on vendor risksEmployee training on AI-powered phishing
Adaptive Behavioral WAF: Recommended
Network Segmentation: Recommended (Zero Trust for vendors)
Enhanced Monitoring: Behavioral anomaly detectionAI-powered threat detection for social engineering

Incident Response Plan Activated: True
Remediation Measures: Credit monitoring and identity protection services offered to all 855,787 affected individuals
Communication Strategy: Breach notification letters to affected individualsPublic disclosures (e.g., Retina Group’s report to state AGs and HHS)PDF letter posted on MAB’s website

Incident Response Plan Activated: ['Change Healthcare: SEC 8-K filing, ransom payment', 'Ascension: Emergency care diversions, forensic investigation', 'M&S/Co-op/Harrods: System shutdowns, customer notifications', 'AT&T: Dark web monitoring, credit protection offers']
Third Party Assistance: Cybersecurity Firms (Forensics, Recovery), Legal Counsel (Regulatory Compliance), Pr Agencies (Crisis Communications).
Law Enforcement Notified: FBI (BlackCat/AlphV, Scattered Spider), UK National Cyber Security Centre (M&S/Co-op/Harrods), Interpol/Europol (cross-border attacks),
Containment Measures: Network isolation (Ascension, retailers)Endpoint detection/response (EDR) deploymentDark web monitoring (AT&T)Password resets (M&S customers)
Remediation Measures: Patch management (IoT, zero-day vulnerabilities)Credential rotation (compromised accounts)Data encryption enhancementsLegacy system upgrades
Recovery Measures: Backup restoration (ransomware victims)Customer compensation (credit monitoring)Operational continuity planning
Communication Strategy: Public disclosures (SEC filings, press releases)Customer advisories (AT&T, M&S)Transparency reports (healthcare breaches)
Network Segmentation: ['Implemented post-breach (Ascension, retailers)']
Enhanced Monitoring: SIEM upgrades (Change Healthcare)Threat intelligence feeds (AT&T)

Third Party Assistance: Trustwave Spiderlabs (Research/Threat Intelligence).

Incident Response Plan Activated: Likely (Given Scale of Breach)
Remediation Measures: Ransom Payment (Millions)Patch Deployment for Domain Controllers (Post-Breach)Potential Review of AD Security Posture
Incident Response Plan: The company's incident response plan is described as Law enforcement takedowns (e.g., LockBit, AlphV, Hive), Change Healthcare (2024, UnitedHealth Group), CDK Global (2024, $25M ransom paid), Colonial Pipeline (2021, $4.4M ransom paid), JBS (2021, $11M ransom paid), Cognizant (2020, $50M–$70M losses), Baltimore (2019, $18M recovery cost), CommonSpirit Health (2022, $160M losses), Medibank (2022, 9.7M records at risk), , , Change Healthcare: SEC 8-K filing, ransom payment, Ascension: Emergency care diversions, forensic investigation, M&S/Co-op/Harrods: System shutdowns, customer notifications, AT&T: Dark web monitoring, credit protection offers, , Likely (Given Scale of Breach).
Third-Party Assistance: The company involves third-party assistance in incident response through MalwareBytes, Flashpoint, Recorded Future, Trellix, , cybersecurity firms (e.g., for Colonial Pipeline, Change Healthcare), DOJ/Europol (Qakbot takedown, 2025), insurance providers (e.g., Syracuse City School District, 2019), , Cybersecurity firms (e.g., INTEGRITY Security Services, Health Catalyst), Regulatory bodies (HHS, FDA, EU agencies), , Cyber insurance providers (e.g., Resilience), Threat intelligence sharing, , Cybersecurity firms (forensics, recovery), Legal counsel (regulatory compliance), PR agencies (crisis communications), , Trustwave SpiderLabs (research/threat intelligence), .

Type of Data Compromised: Personal information, Medical information
Number of Records Exposed: Over 100 million
Sensitivity of Data: High
Personally Identifiable Information: NamesSocial Security numbers

Type of Data Compromised: Phone numbers, Addresses, Financial information, Health records, Diagnoses, Prescriptions, Treatment details
Number of Records Exposed: Over 100 million
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Sensitive data
Number of Records Exposed: 190 million

Type of Data Compromised: Sensitive healthcare data
Number of Records Exposed: 190 million
Sensitivity of Data: High

Type of Data Compromised: Personal information, Health information
Number of Records Exposed: 3,175,442

Type of Data Compromised: Names, Addresses, Dates of birth, Health insurance data, Social security numbers

Type of Data Compromised: Patient information
Number of Records Exposed: 190 million
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Personal health information (phi), Patient records
Number of Records Exposed: 100 million+
Sensitivity of Data: High (includes protected health information)

Type of Data Compromised: Personally identifiable information (pii), Healthcare records, Financial data, Corporate secrets
Sensitivity of Data: High (includes healthcare and financial data)
Data Encryption: True

Type of Data Compromised: Pii (e.g., medibank, patelco credit union), Medical records (e.g., commonspirit, healthcorps), Payment information (e.g., spanish tax agency), Corporate secrets (e.g., apple blueprints via quanta), Government data (e.g., washington dc police, costa rica), Student/employee data (e.g., munster technological university), Customer data (e.g., christie’s, marks & spencer)
Number of Records Exposed: 93.3M (MOVEit, 2023), 9.7M (Medibank, 2022), 5.6M (Healthcorps, 2024), 726K (Patelco Credit Union, 2024), 254K (Kadokawa/Niconico, 2024), 500K (Christie’s, 2025), 1.4M (Lubbock County, 2019), 70K (Nvidia, 2022)
Sensitivity of Data: high (PII, medical, financial, corporate secrets)
Data Exfiltration: MOVEit (Clop gang, 2023)BlackCat/ALPHV (Change Healthcare, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, 2022)Babuk (Washington DC Police, 2021)Rhysida (British Library, 2023)
Data Encryption: ['WannaCry (2017, 300K+ computers)', 'Colonial Pipeline (2021)', 'CDK Global (2024)', 'Change Healthcare (2024)', 'Port of Nagoya (2023)']
File Types Exposed: databases (e.g., patient records, customer data)documents (e.g., corporate secrets, legal files)emails (e.g., phishing lures, credentials)source code (e.g., Samsung, Nvidia)financial records (e.g., Spanish Tax Agency)
Personally Identifiable Information: names, addresses, SSNs (e.g., Patelco Credit Union)medical histories (e.g., Medibank, Healthcorps)payment card data (e.g., retail breaches)biometric data (e.g., healthcare breaches)

Type of Data Compromised: Protected health information (phi), Personally identifiable information (pii), Medical device operational data
Number of Records Exposed: 215.7M+ (aggregated from 2024–2025 incidents)
Sensitivity of Data: High (health records, financial data, biometric data)
Data Exfiltration: Confirmed in ransomware attacks (e.g., Change Healthcare)
Data Encryption: Lack of encryption cited as a vulnerability in breaches
File Types Exposed: EHRsDiagnostic imagesBilling recordsDevice logs
Personally Identifiable Information: Yes (names, SSNs, medical histories)

Data Exfiltration: Reported in double extortion ransomware cases
Data Encryption: Ransomware encryption (systems locked)

Type of Data Compromised: Personal information (names, dates of birth), Social security numbers (ssns), Driver’s license/state id numbers, Medical record numbers, Medical treatment information, Health insurance information, Financial account information (limited subset at mab)
Number of Records Exposed: 855787
Sensitivity of Data: High (PII, PHI, financial data)

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi), Social security numbers (ssns), Payment card data (masked/unmasked), Credentials (usernames, passwords), Military/civilian personnel records (pentagon 2015), Corporate espionage data
Number of Records Exposed: 3B+ (Yahoo 2013), 198M (US healthcare 2024), 73M (AT&T 2019), 57M (Uber 2016), 339M (Marriott 2018)
Sensitivity of Data: Critical (PHI, SSNs, military data)High (PII, financial records)Moderate (masked payment data)
Data Exfiltration: Confirmed (Change Healthcare, Ascension, AT&T)Attempted (M&S/Co-op/Harrods)
Data Encryption: ['Lack of encryption (AT&T 2019 breach)', 'Post-breach encryption upgrades (healthcare)']
File Types Exposed: Databases (PII/PHI)Documents (contracts, military records)Emails (BEC scams)Transaction logs (Change Healthcare)
Personally Identifiable Information: Names, addresses, SSNs (AT&T)Medical histories (Change Healthcare)Login credentials (M&S)

Type of Data Compromised: Credentials, Sensitive business data, Potentially pii/phi (in healthcare attacks)
Sensitivity of Data: High
Data Exfiltration: Likely (via data-stealing malware payloads)
Personally Identifiable Information: Likely (in healthcare-related attacks)

Type of Data Compromised: Health records, Patient data, Potentially administrative credentials
Sensitivity of Data: High (Protected Health Information - PHI)
Data Exfiltration: Confirmed (Health Records)
Data Encryption: Likely (Ransomware Encryption)
Personally Identifiable Information: Yes (Patient Identities)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: data recovery from backups (e.g., Sky Lakes Medical Center, 7 months), decryption tools (e.g., WannaCry kill switch, 2017), rebuilding systems (e.g., Garmin, 2020), credential resets (e.g., after stolen credentials used), , Patch management for vulnerable medical devices, Enhanced IAM and encryption solutions, Dark web monitoring for stolen data, , Restoration from backups (ransomware), MFA reinforcement, Vendor security audits, , Credit monitoring and identity protection services offered to all 855,787 affected individuals, , Patch management (IoT, zero-day vulnerabilities), Credential rotation (compromised accounts), Data encryption enhancements, Legacy system upgrades, , Ransom Payment (Millions), Patch Deployment for Domain Controllers (Post-Breach), Potential Review of AD Security Posture, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disconnecting its systems, infrastructure disruption (e.g., lockbit takedown), international ransomware task force operations, , network isolation (e.g., change healthcare, cdk global), system shutdowns (e.g., baltimore, 2019), disabling rdp access (common in smbs), patching zero-days (e.g., moveit, 2023), , deployment of ai-based threat detection (e.g., blueprint protect™), network segmentation for iomt devices, endpoint security upgrades, , isolation of compromised vendor systems, disabling affected accounts (post-phishing), , network isolation (ascension, retailers), endpoint detection/response (edr) deployment, dark web monitoring (at&t), password resets (m&s customers) and .

Ransom Demanded: 22 million USD
Ransom Paid: 22 million USD
Ransomware Strain: ALPHV/BlackCat

Ransomware Strain: ALPHV/Blackcat

Ransom Paid: hefty ransom payment allegedly made

Ransomware Strain: ALPHV/Blackcat

Ransom Demanded: $4 million

Ransomware Strain: SafePay (LockBit-derived)QilinAkiraRansomHubOther rebranded/leaked-code variants
Data Encryption: True
Data Exfiltration: True

Ransom Demanded: ['$4.4M (Colonial Pipeline, 2021)', '$11M (JBS, 2021)', '$50M (Acer, Quanta, 2021)', '$40M (CNA Financial, 2021)', '$22M (Change Healthcare, 2024)', '$25M (CDK Global, 2024)', '$38M (Spanish Tax Agency, 2024)', '$50M (Apple supplier Quanta, 2021)', '$42M (Grubman Shire Meislas, 2020)', '$1.14M (UCSF, 2020)', '$400K–$600K (Florida municipalities, 2019)']
Ransom Paid: $4.4M (Colonial Pipeline, 2021)$11M (JBS, 2021)$40M (CNA Financial, 2021)$22M (Change Healthcare, 2024)$25M (CDK Global, 2024)$5M (Rackspace, 2022)$1.14M (UCSF, 2020)$2.3M (Travelex, 2020)$460K (Lake City, FL, 2019)$600K (Rivera Beach, FL, 2019)$400K (Jackson County, GA, 2019)
Ransomware Strain: WannaCry (2017)LockBit (2025, $91M in payments)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)Clop (MOVEit, 2023)REvil (JBS, Kaseya, 2021)Maze (Cognizant, Canon, 2020)Ryuk (Onslow Water, 2019)NetWalker (UCSF, 2020)Sodinokibi (Travelex, 2020)Babuk (Washington DC Police, 2021)Lapsus$ (Nvidia, Samsung, 2022)Rhysida (British Library, 2023)NoEscape (University of Hawaii, 2023)
Data Encryption: ['widespread across most attacks']
Data Exfiltration: ['common in double/triple extortion (e.g., Clop, BlackCat)']

Data Encryption: Used in Change Healthcare attack (Feb 2024)
Data Exfiltration: Double extortion tactic observed

Ransom Paid: 14% of ransomware claims (H1 2025, down from 22% in 2024)
Data Encryption: Widespread
Data Exfiltration: Double extortion cases

Data Exfiltration: True

Ransom Demanded: ['$22M (Change Healthcare, paid)', 'Undisclosed (M&S/Co-op/Harrods, attempted)']
Ransom Paid: $22M (Change Healthcare to BlackCat/AlphV)
Ransomware Strain: BlackCat/AlphV (Change Healthcare)Scattered Spider (UK retailers, failed)
Data Encryption: ['Full encryption (Change Healthcare)', 'Partial encryption (Ascension)']
Data Exfiltration: ['Double extortion (Change Healthcare: data stolen + encrypted)']

Ransomware Strain: LockBitRansomHub
Data Encryption: Yes (via ransomware payloads)
Data Exfiltration: Yes (double extortion model likely)

Ransom Paid: Millions (Exact Amount Undisclosed)
Data Encryption: Yes (Systems Locked)
Data Exfiltration: Yes (Double Extortion)
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Ongoing restoration efforts, , CMS launched CHOPD program, CMS initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems, immutable backups (4x faster recovery, 50% less likely to pay ransom), cyber insurance claims (58% of large-value claims in H1 2024), manual processes (e.g., University Hospital Center Zagreb, 2024), third-party forensic investigations, , Tested recovery plans (reduced ransom payments to 14% in H1 2025), Supply chain diversification, , Backup restoration (ransomware victims), Customer compensation (credit monitoring), Operational continuity planning, .

Legal Actions: Lawsuits for cybersecurity negligence,

Legal Actions: Class action lawsuits,

Legal Actions: Lawsuits

Regulations Violated: HIPAA,

Legal Actions: Multiple lawsuits

Regulatory Notifications: HIPAA breach reporting requirements

Legal Actions: Multiple lawsuits

Regulations Violated: HIPAA (likely), State data breach notification laws,
Legal Actions: Investigation by U.S. Department of Health and Human Services (HHS)

Legal Actions: International Ransomware Task Force operations, Infrastructure seizures,

Regulations Violated: GDPR (e.g., European data breaches), HIPAA (e.g., healthcare breaches like Medibank, Change Healthcare), state data breach laws (e.g., California, New York), SEC disclosure rules (e.g., Sensata Technologies, 2025),
Legal Actions: lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims),
Regulatory Notifications: HHS Office for Civil Rights (healthcare breaches)FBI IC3 (cybercrime reporting)SEC filings (public companies)GDPR notifications (EU breaches)

Regulations Violated: HIPAA (U.S.), GDPR (EU), FDA medical device cybersecurity guidelines,
Legal Actions: HHS investigations into 307 breaches (H1 2025), Potential class-action lawsuits,
Regulatory Notifications: Mandatory breach reporting under HIPAA/GDPRFDA pre-market cybersecurity submissions for new devices

Regulations Violated: Potential HIPAA violations (PHI exposure),
Legal Actions: Investigation by law firms (e.g., Levi & Korsinsky for Retina Group of Florida),
Regulatory Notifications: State attorneys generalDepartment of Health and Human Services (HHS)

Regulations Violated: HIPAA (Change Healthcare, Ascension), GDPR (AT&T, UK retailers), SEC Disclosure Rules (Change Healthcare 8-K), CCPA (AT&T, if CA residents affected),
Fines Imposed: ['Potential: $4.99M (insider threat average)', 'Undisclosed (ongoing investigations)']
Legal Actions: Class-action lawsuits (AT&T, healthcare breaches), Regulatory probes (SEC, ICO UK),
Regulatory Notifications: SEC (Change Healthcare)ICO (UK retailers)HHS (healthcare breaches)

Regulations Violated: Potential HIPAA violations (healthcare data breaches), GDPR (if EU citizen data affected),

Regulations Violated: HIPAA (Health Insurance Portability and Accountability Act),
Regulatory Notifications: Likely (HHS Breach Reporting Requirements)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuits for cybersecurity negligence, , Class action lawsuits, , Lawsuits, Multiple lawsuits, Multiple lawsuits, Investigation by U.S. Department of Health and Human Services (HHS), International Ransomware Task Force operations, Infrastructure seizures, , lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims), , HHS investigations into 307 breaches (H1 2025), Potential class-action lawsuits, , Investigation by law firms (e.g., Levi & Korsinsky for Retina Group of Florida), , Class-action lawsuits (AT&T, healthcare breaches), Regulatory probes (SEC, ICO UK), .

Lessons Learned: Without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.

Lessons Learned: The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.

Lessons Learned: The need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.

Lessons Learned: Potential financial and operational impacts of ransomware on the healthcare sector

Lessons Learned: The incident underscores the need for better third-party vendor oversight, proactive IT risk assessments, and regular testing of incident response plans.

Lessons Learned: The incident highlights the critical need for multi-factor authentication (MFA) on all exposed servers, especially in healthcare where consolidated data repositories create high-value targets. Proactive cybersecurity measures, including AI-driven threat detection and vulnerability prioritization, are essential to mitigate risks in an industry facing escalating attacks. The breach also underscores the systemic risks posed by third-party vendors in the healthcare ecosystem.

Lessons Learned: Law enforcement takedowns disrupt but do not eliminate threat actors, who rebrand or form new groups., Leaked ransomware code and commoditized tools lower the barrier to entry for new gangs., Distrust and infighting among affiliates weaken large RaaS operations, leading to fragmentation., Initial access brokers and open-source tools enable smaller, independent ransomware operations., Volatility in the ransomware ecosystem requires adaptive defense strategies.

Lessons Learned: RaaS and affiliate models enable rapid scaling of attacks., Triple extortion (encryption + data theft + DDoS) increases pressure to pay., Supply chain attacks (e.g., MOVEit, Kaseya) amplify impact., Unpatched vulnerabilities remain a top entry point., AI and phishing lures are evolving faster than defenses., Immutable backups and segmentation reduce ransom payments., Cyber insurance is critical but increasingly expensive., Public-sector targets (e.g., municipalities, healthcare) face severe operational disruptions., Regulatory fines and legal liabilities extend financial impact beyond ransoms., Collaboration with law enforcement (e.g., Qakbot takedown) can disrupt threat actors.

Lessons Learned: IoMT devices require built-in security by design, not bolt-on solutions., AI-driven attacks necessitate AI-powered defense mechanisms., Legacy medical devices are high-risk targets; segmentation is critical., Regulatory compliance is a minimum baseline, not a substitute for proactive security.

Lessons Learned: Vendor risk management must be dynamic and continuous, not a one-time assessment., AI amplifies traditional social engineering, requiring reinforced fundamentals (e.g., red-teaming, behavioral baselines)., Strong backups and tested recovery plans significantly reduce ransomware payments., Single points of failure in supply chains can disrupt entire industries., Proactive vendor resilience investments (e.g., Zero Trust, insider threat monitoring) mitigate cascading impacts.

Lessons Learned: Healthcare sector remains a prime target for cybercriminals due to high-value data., Delayed detection (e.g., Goshen’s 1-month gap) exacerbates exposure risks., Proactive monitoring and rapid response are critical to mitigating impact., Credit monitoring is now standard but insufficient for long-term trust restoration.

Lessons Learned: Legacy systems are prime targets (AT&T 2019 breach resurfaced), Third-party risks extend attack surfaces (Change Healthcare), Human error remains a critical vector (Ascension malware download), Ransomware payments fund further attacks (BlackCat/AlphV), Encrypted threats bypass traditional firewalls (93% increase in 2024), IoT devices require dedicated security (124% attack surge), AI-driven attacks (vishing +442%) demand adaptive defenses

Lessons Learned: Legitimate software update mechanisms are high-value targets for malware distribution., Domain Shadowing and compromised websites can bypass traditional security controls., Traffic Distribution Systems (TDS) enable targeted malware delivery., Initial Access Brokers (IABs) like SocGholish lower the barrier for cybercriminals to launch attacks., State-sponsored actors may leverage cybercriminal infrastructure for plausible deniability.

Lessons Learned: Active Directory is the 'holy grail' for attackers; compromising it grants full network control., Hybrid environments (on-premises + cloud) introduce complex attack surfaces (e.g., Azure AD Connect, OAuth tokens, NTLM)., Legacy protocols (NTLM) and fragmented security tools create visibility gaps exploited by attackers., Weak passwords, stale service accounts, and cached credentials are top entry points., Privileged access management (PAM) and zero-trust principles are critical to limiting lateral movement., Continuous monitoring for AD changes (e.g., group modifications, replication anomalies) can detect attacks early., Rapid patching of domain controllers is essential to close privilege escalation paths., Password policies must evolve: block breached credentials, enforce MFA, and use dynamic feedback for users.

Recommendations: Reassess cybersecurity measures in the healthcare industry

Recommendations: Include all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditions

Recommendations: Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.

Recommendations: Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.

Recommendations: Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.

Recommendations: Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.

Recommendations: Strategic Investments: Advanced threat detection for AI-powered attacks., Insider threat monitoring via behavioral analysis., Supply chain security assessments with financial risk modeling., Strategic Investments: Advanced threat detection for AI-powered attacks., Insider threat monitoring via behavioral analysis., Supply chain security assessments with financial risk modeling., Strategic Investments: Advanced threat detection for AI-powered attacks., Insider threat monitoring via behavioral analysis., Supply chain security assessments with financial risk modeling., Strategic Investments: Advanced threat detection for AI-powered attacks., Insider threat monitoring via behavioral analysis., Supply chain security assessments with financial risk modeling..

Recommendations: Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.

Recommendations: Compliance: Align with NIS2 (EU), CIS Controls, MITRE ATT&CK, Automate compliance reporting (GDPR, HIPAA), Conduct annual penetration tests, Compliance: Align with NIS2 (EU), CIS Controls, MITRE ATT&CK, Automate compliance reporting (GDPR, HIPAA), Conduct annual penetration tests, Compliance: Align with NIS2 (EU), CIS Controls, MITRE ATT&CK, Automate compliance reporting (GDPR, HIPAA), Conduct annual penetration tests, Compliance: Align with NIS2 (EU), CIS Controls, MITRE ATT&CK, Automate compliance reporting (GDPR, HIPAA), Conduct annual penetration tests.

Recommendations: Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.

Recommendations: Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks., Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks., Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks., Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks., Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks..
Key Lessons Learned: The key lessons learned from past incidents are Without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.The need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.Potential financial and operational impacts of ransomware on the healthcare sectorThe incident underscores the need for better third-party vendor oversight, proactive IT risk assessments, and regular testing of incident response plans.The incident highlights the critical need for multi-factor authentication (MFA) on all exposed servers, especially in healthcare where consolidated data repositories create high-value targets. Proactive cybersecurity measures, including AI-driven threat detection and vulnerability prioritization, are essential to mitigate risks in an industry facing escalating attacks. The breach also underscores the systemic risks posed by third-party vendors in the healthcare ecosystem.Law enforcement takedowns disrupt but do not eliminate threat actors, who rebrand or form new groups.,Leaked ransomware code and commoditized tools lower the barrier to entry for new gangs.,Distrust and infighting among affiliates weaken large RaaS operations, leading to fragmentation.,Initial access brokers and open-source tools enable smaller, independent ransomware operations.,Volatility in the ransomware ecosystem requires adaptive defense strategies.RaaS and affiliate models enable rapid scaling of attacks.,Triple extortion (encryption + data theft + DDoS) increases pressure to pay.,Supply chain attacks (e.g., MOVEit, Kaseya) amplify impact.,Unpatched vulnerabilities remain a top entry point.,AI and phishing lures are evolving faster than defenses.,Immutable backups and segmentation reduce ransom payments.,Cyber insurance is critical but increasingly expensive.,Public-sector targets (e.g., municipalities, healthcare) face severe operational disruptions.,Regulatory fines and legal liabilities extend financial impact beyond ransoms.,Collaboration with law enforcement (e.g., Qakbot takedown) can disrupt threat actors.IoMT devices require built-in security by design, not bolt-on solutions.,AI-driven attacks necessitate AI-powered defense mechanisms.,Legacy medical devices are high-risk targets; segmentation is critical.,Regulatory compliance is a minimum baseline, not a substitute for proactive security.Vendor risk management must be dynamic and continuous, not a one-time assessment.,AI amplifies traditional social engineering, requiring reinforced fundamentals (e.g., red-teaming, behavioral baselines).,Strong backups and tested recovery plans significantly reduce ransomware payments.,Single points of failure in supply chains can disrupt entire industries.,Proactive vendor resilience investments (e.g., Zero Trust, insider threat monitoring) mitigate cascading impacts.Healthcare sector remains a prime target for cybercriminals due to high-value data.,Delayed detection (e.g., Goshen’s 1-month gap) exacerbates exposure risks.,Proactive monitoring and rapid response are critical to mitigating impact.,Credit monitoring is now standard but insufficient for long-term trust restoration.Legacy systems are prime targets (AT&T 2019 breach resurfaced),Third-party risks extend attack surfaces (Change Healthcare),Human error remains a critical vector (Ascension malware download),Ransomware payments fund further attacks (BlackCat/AlphV),Encrypted threats bypass traditional firewalls (93% increase in 2024),IoT devices require dedicated security (124% attack surge),AI-driven attacks (vishing +442%) demand adaptive defensesLegitimate software update mechanisms are high-value targets for malware distribution.,Domain Shadowing and compromised websites can bypass traditional security controls.,Traffic Distribution Systems (TDS) enable targeted malware delivery.,Initial Access Brokers (IABs) like SocGholish lower the barrier for cybercriminals to launch attacks.,State-sponsored actors may leverage cybercriminal infrastructure for plausible deniability.Active Directory is the 'holy grail' for attackers; compromising it grants full network control.,Hybrid environments (on-premises + cloud) introduce complex attack surfaces (e.g., Azure AD Connect, OAuth tokens, NTLM).,Legacy protocols (NTLM) and fragmented security tools create visibility gaps exploited by attackers.,Weak passwords, stale service accounts, and cached credentials are top entry points.,Privileged access management (PAM) and zero-trust principles are critical to limiting lateral movement.,Continuous monitoring for AD changes (e.g., group modifications, replication anomalies) can detect attacks early.,Rapid patching of domain controllers is essential to close privilege escalation paths.,Password policies must evolve: block breached credentials, enforce MFA, and use dynamic feedback for users.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Prioritize encryption for data at rest and in transit in medical devices., Adopt zero-trust architectures for medical device networks., Category: Active Directory Hardening, , Category: Hybrid Environment Security, , Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Reassess cybersecurity measures in the healthcare industry, Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing., Category: Credential Security, , Category: Detection & Response, , Category: Privileged Access Management (PAM) and .

Source: Washington Attorney General's Office
Date Accessed: 2025-04-18

Source: Resilience

Source: Article on Change Healthcare ransomware attack and healthcare cybersecurity trends

Source: U.S. Department of Health and Human Services (HHS) investigation reports (referenced)

Source: Google's acquisition of Wiz (contextual reference)

Source: MalwareBytes
URL: https://www.malwarebytes.com
Date Accessed: 2025-06-30

Source: Flashpoint
URL: https://www.flashpoint.io
Date Accessed: 2025-06-30

Source: Recorded Future (The Record)
Date Accessed: 2025-06-30

Source: Sophos State of Ransomware 2024

Source: IBM Security X-Force Threat Intelligence

Source: Chainalysis 2025 Crypto Crime Report

Source: Verizon 2025 Data Breach Investigations Report (DBIR)
URL: https://www.verizon.com/business/resources/reports/dbir/

Source: CISA Known Exploited Vulnerabilities (KEV) Catalog
URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Source: FBI Internet Crime Complaint Center (IC3)
URL: https://www.ic3.gov

Source: The Business Research Company (Ransomware Market Report)

Source: PurpleSec Ransomware Statistics 2025

Source: DOJ Press Release: Qakbot Takedown (2025)

Source: BlackKite Ransomware Report 2025

Source: Coherent Market Insights (CMI)
URL: https://www.coherentmarketinsights.com/insight/request-sample/8415
Date Accessed: 2025-09-04

Source: U.S. Department of Health and Human Services (HHS)
URL: https://www.hhs.gov

Source: Health Catalyst Press Release (AI Cyber Protection Solution)
Date Accessed: 2024-11-01

Source: Resilience Midyear 2025 Cyber Risk Landscape Report

Source: Help Net Security Interview with Judson Dressler (Resilience)

Source: The Register

Source: Goshen Medical Center Breach Notice

Source: Retina Group of Florida HHS Filing
Date Accessed: 2024-09-16

Source: Medical Associates of Brevard Breach Letter (PDF)

Source: Levi & Korsinsky Law Firm Investigation

Source: ITRC Annual Data Breach Report 2024
URL: https://www.idtheftcenter.org
Date Accessed: 2024

Source: Sophos: The State of Ransomware 2024
Date Accessed: 2024

Source: Verizon 2025 Data Breach Investigations Report
URL: https://www.verizon.com/business/resources/reports/dbir/
Date Accessed: 2025

Source: SonicWall Cyber Threat Report 2024
URL: https://www.sonicwall.com/threat-report/
Date Accessed: 2024

Source: IBM Cost of a Data Breach Report 2024
URL: https://www.ibm.com/reports/data-breach
Date Accessed: 2024

Source: UK Government Cyber Security Breaches Survey 2024
URL: https://www.gov.uk/government/statistics
Date Accessed: 2024

Source: SEC Filing: Change Healthcare 8-K (February 2024)
URL: https://www.sec.gov/edgar/browse/
Date Accessed: 2024

Source: BBC: M&S, Co-op, Harrods Cyberattacks (April 2025)
Date Accessed: 2025

Source: Trustwave SpiderLabs Research (via Hackread.com)
Date Accessed: 2025

Source: Verizon Data Breach Investigations Report (DBIR)
URL: https://www.verizon.com/business/resources/reports/dbir/

Source: Specops Software - Active Directory Security

Source: Microsoft Security Guidance for Active Directory

Source: Change Healthcare Ransomware Attack Coverage (Various News Outlets)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington Attorney General's OfficeDate Accessed: 2025-04-18, and Source: California Attorney GeneralDate Accessed: 2024-08-03, and Source: Resilience, and Source: Article on Change Healthcare ransomware attack and healthcare cybersecurity trends, and Source: U.S. Department of Health and Human Services (HHS) investigation reports (referenced), and Source: Google's acquisition of Wiz (contextual reference), and Source: MalwareBytesUrl: https://www.malwarebytes.comDate Accessed: 2025-06-30, and Source: FlashpointUrl: https://www.flashpoint.ioDate Accessed: 2025-06-30, and Source: Recorded Future (The Record)Url: https://therecord.mediaDate Accessed: 2025-06-30, and Source: TrellixUrl: https://www.trellix.comDate Accessed: 2025-06-30, and Source: StatistaUrl: https://www.statista.com, and Source: Sophos State of Ransomware 2024Url: https://www.sophos.com/en-us/state-of-ransomware, and Source: IBM Security X-Force Threat IntelligenceUrl: https://www.ibm.com/security, and Source: Chainalysis 2025 Crypto Crime ReportUrl: https://www.chainalysis.com, and Source: Verizon 2025 Data Breach Investigations Report (DBIR)Url: https://www.verizon.com/business/resources/reports/dbir/, and Source: CISA Known Exploited Vulnerabilities (KEV) CatalogUrl: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, and Source: FBI Internet Crime Complaint Center (IC3)Url: https://www.ic3.gov, and Source: The Business Research Company (Ransomware Market Report)Url: https://www.thebusinessresearchcompany.com, and Source: PurpleSec Ransomware Statistics 2025Url: https://purplesec.us/ransomware-statistics/, and Source: DOJ Press Release: Qakbot Takedown (2025)Url: https://www.justice.gov, and Source: Cybersecurity DiveUrl: https://www.cybersecuritydive.com, and Source: BlackKite Ransomware Report 2025Url: https://www.blackkite.com, and Source: Coherent Market Insights (CMI)Url: https://www.coherentmarketinsights.com/insight/request-sample/8415Date Accessed: 2025-09-04, and Source: U.S. Department of Health and Human Services (HHS)Url: https://www.hhs.gov, and Source: Health Catalyst Press Release (AI Cyber Protection Solution)Date Accessed: 2024-11-01, and Source: Resilience Midyear 2025 Cyber Risk Landscape Report, and Source: Help Net Security Interview with Judson Dressler (Resilience), and Source: The Register, and Source: Goshen Medical Center Breach Notice, and Source: Retina Group of Florida HHS FilingDate Accessed: 2024-09-16, and Source: Medical Associates of Brevard Breach Letter (PDF), and Source: Levi & Korsinsky Law Firm Investigation, and Source: ITRC Annual Data Breach Report 2024Url: https://www.idtheftcenter.orgDate Accessed: 2024, and Source: Sophos: The State of Ransomware 2024Url: https://www.sophos.comDate Accessed: 2024, and Source: Verizon 2025 Data Breach Investigations ReportUrl: https://www.verizon.com/business/resources/reports/dbir/Date Accessed: 2025, and Source: SonicWall Cyber Threat Report 2024Url: https://www.sonicwall.com/threat-report/Date Accessed: 2024, and Source: IBM Cost of a Data Breach Report 2024Url: https://www.ibm.com/reports/data-breachDate Accessed: 2024, and Source: UK Government Cyber Security Breaches Survey 2024Url: https://www.gov.uk/government/statisticsDate Accessed: 2024, and Source: SEC Filing: Change Healthcare 8-K (February 2024)Url: https://www.sec.gov/edgar/browse/Date Accessed: 2024, and Source: BBC: M&S, Co-op, Harrods Cyberattacks (April 2025)Url: https://www.bbc.com/newsDate Accessed: 2025, and Source: Trustwave SpiderLabs Research (via Hackread.com)Date Accessed: 2025, and Source: Verizon Data Breach Investigations Report (DBIR)Url: https://www.verizon.com/business/resources/reports/dbir/, and Source: Specops Software - Active Directory SecurityUrl: https://specopssoft.com/, and Source: Microsoft Security Guidance for Active DirectoryUrl: https://learn.microsoft.com/en-us/security/, and Source: Change Healthcare Ransomware Attack Coverage (Various News Outlets).

Investigation Status: Ongoing (HHS investigation as of 2024)

Investigation Status: Ongoing (tracked by cybersecurity firms and law enforcement)

Investigation Status: ['Ongoing for recent attacks (e.g., Change Healthcare, CDK Global)', 'Resolved for older cases (e.g., WannaCry, NotPetya)', 'Law enforcement actions (e.g., Qakbot, DanaBot takedowns)', 'Private forensic investigations (e.g., CommonSpirit, Medibank)']

Investigation Status: Ongoing (HHS investigations into 2025 breaches; market trends analysis)

Investigation Status: Ongoing (trend analysis based on H1 2025 cyber insurance claims)

Investigation Status: ['Ongoing (e.g., Retina Group of Florida under legal scrutiny)']

Investigation Status: [{'incident': 'Change Healthcare', 'status': 'Ongoing (ransom paid, forensic analysis)'}, {'incident': 'AT&T', 'status': 'Ongoing (2019 breach, dark web monitoring)'}, {'incident': 'Ascension', 'status': 'Ongoing (data theft confirmed, recovery phase)'}, {'incident': 'M&S/Co-op/Harrods', 'status': 'Contained (failed ransomware, systems restored)'}, {'incident': 'General Trends', 'status': 'Continuous (industry-wide threat intelligence)'}]

Investigation Status: Ongoing (active since 2017, with recent 2025 campaigns)

Investigation Status: Likely Ongoing (2024–2025)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Reports By Cybersecurity Firms, Media Coverage Of Gang Fragmentation, Public Disclosures (E.G., Colonial Pipeline, Change Healthcare), Customer Notifications (E.G., Patelco Credit Union, Healthcorps), Regulatory Filings (E.G., Sensata Technologies, Sec), Press Releases (E.G., British Library, 2023), Public Disclosures (E.G., Hhs Breach Reports), Patient Notification Campaigns (Where Applicable), Stakeholder Advisories On Vendor Risks, Employee Training On Ai-Powered Phishing, Breach Notification Letters To Affected Individuals, Public Disclosures (E.G., Retina Group’S Report To State Ags And Hhs), Pdf Letter Posted On Mab’S Website, Public Disclosures (Sec Filings, Press Releases), Customer Advisories (At&T, M&S) and Transparency Reports (Healthcare Breaches).

Stakeholder Advisories: Unitedhealth Group (Change Healthcare Breach Updates), Cdk Global Customer Notifications (2024), Hhs Advisories For Healthcare Sector (2024–2025), Cisa Alerts On Ransomware Trends (E.G., #Stopransomware), Fbi Warnings On Raas And Phishing (2025).
Customer Advisories: Credit monitoring for affected individuals (e.g., Patelco Credit Union, Healthcorps)Password reset recommendations (e.g., after credential leaks)Fraud alerts for financial data exposure (e.g., Spanish Tax Agency)Healthcare providers’ notifications to patients (e.g., Medibank, CommonSpirit)

Stakeholder Advisories: Fda Guidance On Medical Device Cybersecurity (2023), Hhs Cybersecurity Best Practices For Healthcare Providers.
Customer Advisories: Change Healthcare patient notification (2024)General alerts from affected healthcare providers

Stakeholder Advisories: Cisos Advised To Prioritize Dynamic Vendor Risk Management And Ai Threat Detection., Boards Urged To Allocate Budget For Supply Chain Resilience And Behavioral Security Tools..
Customer Advisories: Organizations using CDK Global or Change Healthcare services were likely notified of disruptions.General guidance issued on recognizing AI-powered phishing (e.g., voice synthesis, browser-based attacks).

Stakeholder Advisories: Breach Notifications To State Ags, Hhs, And Affected Individuals.
Customer Advisories: Credit monitoring services offeredBreach letters mailed to victims

Stakeholder Advisories: Healthcare: Hhs Bulletins On Ransomware Resilience, Retail: Pci Dss Updates For Payment Security, Telecom: Fcc Guidelines On Customer Data Protection, Smbs: Cisa Resources For Ransomware Readiness.
Customer Advisories: AT&T: Credit monitoring for affected customersM&S: Password reset prompts, transaction reviewsChange Healthcare: Prescription workflow updatesGeneral: FTC tips on phishing/vishing avoidance
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Unitedhealth Group (Change Healthcare Breach Updates), Cdk Global Customer Notifications (2024), Hhs Advisories For Healthcare Sector (2024–2025), Cisa Alerts On Ransomware Trends (E.G., #Stopransomware), Fbi Warnings On Raas And Phishing (2025), Credit Monitoring For Affected Individuals (E.G., Patelco Credit Union, Healthcorps), Password Reset Recommendations (E.G., After Credential Leaks), Fraud Alerts For Financial Data Exposure (E.G., Spanish Tax Agency), Healthcare Providers’ Notifications To Patients (E.G., Medibank, Commonspirit), , Fda Guidance On Medical Device Cybersecurity (2023), Hhs Cybersecurity Best Practices For Healthcare Providers, Change Healthcare Patient Notification (2024), General Alerts From Affected Healthcare Providers, , Cisos Advised To Prioritize Dynamic Vendor Risk Management And Ai Threat Detection., Boards Urged To Allocate Budget For Supply Chain Resilience And Behavioral Security Tools., Organizations Using Cdk Global Or Change Healthcare Services Were Likely Notified Of Disruptions., General Guidance Issued On Recognizing Ai-Powered Phishing (E.G., Voice Synthesis, Browser-Based Attacks)., , Breach Notifications To State Ags, Hhs, And Affected Individuals, Credit Monitoring Services Offered, Breach Letters Mailed To Victims, , Healthcare: Hhs Bulletins On Ransomware Resilience, Retail: Pci Dss Updates For Payment Security, Telecom: Fcc Guidelines On Customer Data Protection, Smbs: Cisa Resources For Ransomware Readiness, At&T: Credit Monitoring For Affected Customers, M&S: Password Reset Prompts, Transaction Reviews, Change Healthcare: Prescription Workflow Updates, General: Ftc Tips On Phishing/Vishing Avoidance and .

Entry Point: Server lacking multi-factor authentication (MFA)
High Value Targets: Patient Health Records, Payment Processing Systems,
Data Sold on Dark Web: Patient Health Records, Payment Processing Systems,

Entry Point: Vpn Exploits, Phishing, Stolen Credentials, Unpatched Vulnerabilities,
Backdoors Established: True
High Value Targets: Healthcare (E.G., Change Healthcare), Financial Institutions, Critical Infrastructure,
Data Sold on Dark Web: Healthcare (E.G., Change Healthcare), Financial Institutions, Critical Infrastructure,

Entry Point: Phishing Emails (67% Of Attacks), Unpatched Vulnerabilities (32%), Rdp Compromise (30% In Smbs), Stolen Credentials (29%), Third-Party Software (25%), Malicious Ads/Websites (E.G., Fake Chrome Updates For Spora), Botnets (E.G., Necurs For Locky, Qakbot For Ransomware Delivery),
Reconnaissance Period: ['weeks to months (e.g., APT-style attacks)', 'rapid exploitation (e.g., zero-days like MOVEit)']
Backdoors Established: ['common in RaaS attacks (e.g., LockBit, BlackCat)', 'persistent access via RDP or VPN flaws']
High Value Targets: Healthcare (E.G., Change Healthcare, Medibank), Critical Infrastructure (E.G., Colonial Pipeline, Port Of Nagoya), Supply Chain Providers (E.G., Moveit, Kaseya), Municipalities (E.G., Baltimore, Lake City),
Data Sold on Dark Web: Healthcare (E.G., Change Healthcare, Medibank), Critical Infrastructure (E.G., Colonial Pipeline, Port Of Nagoya), Supply Chain Providers (E.G., Moveit, Kaseya), Municipalities (E.G., Baltimore, Lake City),

Entry Point: Exploited Vulnerabilities In Unpatched Medical Devices, Phishing Emails Targeting Healthcare Employees, Compromised Third-Party Vendors (E.G., It Service Providers),
Backdoors Established: Likely in long-term campaigns (e.g., ransomware groups)
High Value Targets: Ehr Systems, Diagnostic Imaging Devices, Insulin Pumps/Pacemakers (Life-Critical Devices),
Data Sold on Dark Web: Ehr Systems, Diagnostic Imaging Devices, Insulin Pumps/Pacemakers (Life-Critical Devices),

Entry Point: Compromised Vendor Systems (E.G., Cdk Global, Change Healthcare), Phishing/Impersonation (Ai-Enhanced),
High Value Targets: It Helpdesks (For Credential Harvesting), Vendor Portals With Supply Chain Access,
Data Sold on Dark Web: It Helpdesks (For Credential Harvesting), Vendor Portals With Supply Chain Access,

Reconnaissance Period: ['~1 month (Goshen: Feb 15–Mar 4 detection)']
High Value Targets: Pii, Phi, Financial Data,
Data Sold on Dark Web: Pii, Phi, Financial Data,

Entry Point: Phishing Emails (Ascension Malware Download), Exploited Vulnerabilities (Change Healthcare), Compromised Credentials (At&T 2019 Breach), Third-Party Vendors (Supply Chain Attacks), Unpatched Iot Devices (Lateral Movement),
Reconnaissance Period: ['Weeks-Months (APT groups)', 'Days (opportunistic ransomware)']
Backdoors Established: ['Persistent access (BlackCat/AlphV)', 'Web shells (Ascension)']
High Value Targets: Healthcare (Phi, Insurance Data), Financial (Payment Systems, Bec), Government (Military Personnel Records),
Data Sold on Dark Web: Healthcare (Phi, Insurance Data), Financial (Payment Systems, Bec), Government (Military Personnel Records),

Entry Point: Compromised Wordpress Sites (Wp-Admin Exploits), Domain Shadowing (Malicious Subdomains), Malvertising (E.G., Google Ads Impersonating Hr Portals),
Backdoors Established: Likely (for persistent access)
High Value Targets: Healthcare Organizations (E.G., Change Healthcare, Rite Aid), Enterprises With Valuable Data,
Data Sold on Dark Web: Healthcare Organizations (E.G., Change Healthcare, Rite Aid), Enterprises With Valuable Data,

Entry Point: Server Without MFA
Backdoors Established: Likely (Persistent AD Access via Golden Ticket/DCSync)
High Value Targets: Active Directory, Domain Controllers, Health Records Databases,
Data Sold on Dark Web: Active Directory, Domain Controllers, Health Records Databases,

Root Causes: Lack of preparedness in evolving and securing AI technologies

Root Causes: Third-party vendor compromise, human error, poor vendor oversight, failed disaster recovery tests, untested backups

Root Causes: Lack Of Multi-Factor Authentication (Mfa) On Critical Server, Inadequate Segmentation Of High-Value Data Repositories, Failure To Detect Or Prevent Lateral Movement By Attackers, Potential Insider Threat Or Credential Compromise (Unconfirmed),
Corrective Actions: Mandatory Mfa Implementation Across All Systems, Enhanced Network Segmentation And Zero-Trust Architecture, Increased Investment In Ai-Driven Threat Detection And Response, Third-Party Security Audits For All Vendors Handling Phi, Regulatory Push For Stricter Cybersecurity Standards In Healthcare,

Root Causes: Law Enforcement Takedowns Scattering Affiliates Without Arrests, Leaked Ransomware Source Code (E.G., Lockbit, Conti), Commoditization Of Malware Tools And Ai Lowering Entry Barriers, Distrust Among Affiliates Due To Infiltrations (E.G., Lockbit, Hive), Financial Disputes And Underpayment In Large Raas Groups,
Corrective Actions: Targeted Arrests Of Threat Actors, Not Just Infrastructure Disruption, Dark Web Monitoring For Leaked Code And Initial Access Sales, Public-Private Partnerships To Share Threat Intelligence, Adaptive Defenses Against Fragmented, Smaller Ransomware Groups,

Root Causes: Unpatched Vulnerabilities (E.G., Eternalblue, Moveit), Lack Of Mfa (E.G., Rdp Compromises), Poor Segmentation (E.G., Lateral Movement In Colonial Pipeline), Inadequate Backups (E.G., Baltimore’S $18M Recovery), Third-Party Risks (E.G., Supply Chain Attacks), Human Error (E.G., Phishing Clicks), Insufficient Employee Training (E.G., Recognizing Phishing),
Corrective Actions: Mandatory **Mfa** Implementation, Accelerated **Patch Management** For Kev Vulnerabilities, **Network Segmentation** To Limit Blast Radius, **Immutable Backups** With Offline Storage, **Incident Response Drills** Quarterly, **Threat Hunting** For Early Detection, **Vendor Risk Assessments** For Third Parties, **Dark Web Monitoring** For Leaked Credentials, **Ai-Driven Anomaly Detection** (E.G., For Phishing), **Cyber Insurance** Policy Reviews,

Root Causes: Inadequate Security-By-Design In Iomt Devices, Delayed Patch Management For Known Vulnerabilities, Over-Reliance On Perimeter Security Without Segmentation, Lack Of Ai-Driven Threat Detection In Legacy Systems,
Corrective Actions: Fda’S 2023 Cybersecurity Requirements For New Medical Devices, Adoption Of Iss Secure Platform For Medical (Iss-Spm) By Manufacturers, Healthcare Provider Investments In Ai-Based Security (E.G., Blueprint Protect™),

Root Causes: Over-Reliance On Static Vendor Assessments., Inadequate Protections Against Ai-Amplified Social Engineering., Lack Of Segmented Backups Enabling Ransomware Spread., Single Points Of Failure In Critical Supply Chains.,
Corrective Actions: Shift To Continuous Vendor Monitoring With Financial Risk Modeling., Integration Of Behavioral Baselines Into Anomaly Detection., Mandatory Zero Trust Adoption For High-Risk Vendors., Expanded Red-Teaming For Ai Threat Scenarios.,

Root Causes: Inadequate Intrusion Detection (Delayed Breach Discovery), Likely Exploitation Of Unpatched Vulnerabilities Or Phishing, Insufficient Segmentation Of Sensitive Data,
Corrective Actions: Mandatory Credit Monitoring For Victims, Regulatory Filings And Legal Disclosures, Potential Litigation-Driven Security Overhauls (E.G., Retina Group Of Florida),

Root Causes: Inadequate Patch Management (At&T, Iot), Lack Of Mfa (Ascension, Phishing), Over-Reliance On Legacy Firewalls (Encrypted Threats), Third-Party Risk Blindness (Change Healthcare), Insider Threat Neglect (Malicious/Accidental), Poor Iot Security Hygiene (Default Credentials),
Corrective Actions: Technical: ['Deploy EDR/XDR solutions', 'Implement network micro-segmentation', 'Upgrade to next-gen firewalls (NGFW)', 'Enforce least-privilege access'], Process: ['Mandate security awareness training (quarterly)', 'Conduct tabletop exercises (ransomware scenarios)', 'Automate threat intelligence sharing', 'Integrate threat hunting into SOC operations'], Governance: ['Appoint dedicated CISO/DSO roles', 'Align cybersecurity with business risk appetite', 'Increase board-level oversight', 'Adopt cybersecurity frameworks (NIST, ISO 27001)'],

Root Causes: Over-Reliance On User Trust In Software Update Prompts., Inadequate Monitoring Of Website Subdomains (Enabling Domain Shadowing)., Lack Of Behavioral Detection For Malicious Scripts On Legitimate Sites., Profit-Driven Maas Model Lowering The Barrier For Cybercriminals.,

Root Causes: Lack Of Mfa On Critical Server (Initial Access Point)., Weak Password Policies (Reused/Breached Credentials)., Excessive Permissions For Service Accounts (Lateral Movement)., Unpatched Domain Controllers (Privilege Escalation Flaw)., Hybrid Environment Complexity (Azure Ad Connect Abuse)., Fragmented Security Tools (On-Premises Vs. Cloud Visibility Gaps).,
Corrective Actions: Mandated Mfa For All Privileged And Sync Accounts., Deployed **Specops Password Policy** To Block Compromised Credentials., Implemented **Just-In-Time (Jit) Access** For Administrative Tasks., Disabled **Ntlm** And Enforced Smb Signing., Unified **Siem/Xdr Monitoring** For Ad And Cloud Identities., Accelerated **Patch Management** For Domain Controllers., Conducted **Ad Security Assessment** And Red Team Exercises.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Malwarebytes, Flashpoint, Recorded Future, Trellix, , Cybersecurity Firms (E.G., For Colonial Pipeline, Change Healthcare), Doj/Europol (Qakbot Takedown, 2025), Insurance Providers (E.G., Syracuse City School District, 2019), , Recommended Post-Incident, , Cybersecurity Firms (E.G., Integrity Security Services, Health Catalyst), Regulatory Bodies (Hhs, Fda, Eu Agencies), , AI-driven real-time threat analysis, Cyber Insurance Providers (E.G., Resilience), Threat Intelligence Sharing, , Behavioral Anomaly Detection, Ai-Powered Threat Detection For Social Engineering, , Cybersecurity Firms (Forensics, Recovery), Legal Counsel (Regulatory Compliance), Pr Agencies (Crisis Communications), , Siem Upgrades (Change Healthcare), Threat Intelligence Feeds (At&T), , Trustwave Spiderlabs (Research/Threat Intelligence), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Mandatory Mfa Implementation Across All Systems, Enhanced Network Segmentation And Zero-Trust Architecture, Increased Investment In Ai-Driven Threat Detection And Response, Third-Party Security Audits For All Vendors Handling Phi, Regulatory Push For Stricter Cybersecurity Standards In Healthcare, , Targeted Arrests Of Threat Actors, Not Just Infrastructure Disruption, Dark Web Monitoring For Leaked Code And Initial Access Sales, Public-Private Partnerships To Share Threat Intelligence, Adaptive Defenses Against Fragmented, Smaller Ransomware Groups, , Mandatory **Mfa** Implementation, Accelerated **Patch Management** For Kev Vulnerabilities, **Network Segmentation** To Limit Blast Radius, **Immutable Backups** With Offline Storage, **Incident Response Drills** Quarterly, **Threat Hunting** For Early Detection, **Vendor Risk Assessments** For Third Parties, **Dark Web Monitoring** For Leaked Credentials, **Ai-Driven Anomaly Detection** (E.G., For Phishing), **Cyber Insurance** Policy Reviews, , Fda’S 2023 Cybersecurity Requirements For New Medical Devices, Adoption Of Iss Secure Platform For Medical (Iss-Spm) By Manufacturers, Healthcare Provider Investments In Ai-Based Security (E.G., Blueprint Protect™), , Shift To Continuous Vendor Monitoring With Financial Risk Modeling., Integration Of Behavioral Baselines Into Anomaly Detection., Mandatory Zero Trust Adoption For High-Risk Vendors., Expanded Red-Teaming For Ai Threat Scenarios., , Mandatory Credit Monitoring For Victims, Regulatory Filings And Legal Disclosures, Potential Litigation-Driven Security Overhauls (E.G., Retina Group Of Florida), , Technical: ['Deploy EDR/XDR solutions', 'Implement network micro-segmentation', 'Upgrade to next-gen firewalls (NGFW)', 'Enforce least-privilege access'], Process: ['Mandate security awareness training (quarterly)', 'Conduct tabletop exercises (ransomware scenarios)', 'Automate threat intelligence sharing', 'Integrate threat hunting into SOC operations'], Governance: ['Appoint dedicated CISO/DSO roles', 'Align cybersecurity with business risk appetite', 'Increase board-level oversight', 'Adopt cybersecurity frameworks (NIST, ISO 27001)'], , Mandated Mfa For All Privileged And Sync Accounts., Deployed **Specops Password Policy** To Block Compromised Credentials., Implemented **Just-In-Time (Jit) Access** For Administrative Tasks., Disabled **Ntlm** And Enforced Smb Signing., Unified **Siem/Xdr Monitoring** For Ad And Cloud Identities., Accelerated **Patch Management** For Domain Controllers., Conducted **Ad Security Assessment** And Red Team Exercises., .
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was 22 million USD.
Last Attacking Group: The attacking group in the last incident were an BlackCat, BlackCat/ALPHVRansomHub, ALPHV/BlackCat gang, ALPHV/Blackcat, ALPHV/Blackcat ransomware group, BlackCatCl0pLockbitMedusaInterlock, Splintered LockBit affiliatesRebranded AlphV/BlackCat membersNew entrepreneurial ransomware groups (e.g., SafePay, Qilin, Akira, RansomHub)Initial Access Brokers (IABs)Former Conti/REvil affiliates, LockBit (most prolific in 2025, $91M in payments)RansomHub (most active in 2024–2025)Clop (MOVEit breach, 2023)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, Okta, 2022)Babuk (Washington DC Police, 2021)Scattered Spider (Marks & Spencer, 2025)Russian-linked groups (e.g., DanaBot, Qakbot)State-sponsored actors (e.g., 16 Russian nationals indicted for DanaBot), Cybercriminal groups leveraging AI tools (e.g., Claude Code)Ransomware operators targeting healthcare (e.g., Change Healthcare attackers)Initial Access Brokers (IABs) selling medical device access on dark web, BlackCat/AlphV (Ransomware Group, Nation-State Linked)Scattered Spider (Cybercrime Group)Unspecified APT Groups (Advanced Persistent Threats)Insider Threats (Malicious/Compromised)Opportunistic Cybercriminals (Phishing, BEC)Hacktivists (Data Leaks for Ideological Reasons), Name: TA569Type: Cybercriminal GroupMotivation: Financial (Malware-as-a-Service revenue)Affiliations: Evil Corp, Affiliations: Russian GRU Unit 29155 (state-sponsored link), Name: Evil CorpType: Russian Cybercrime SyndicateMotivation: Financial (ransomware, data theft)Affiliations: Russian intelligence services, Name: GRU Unit 29155Type: Russian Military IntelligenceMotivation: Espionage/State-Sponsored OperationsPayloads: Raspberry Robin worm and .
Most Recent Incident Detected: The most recent incident detected was on 2023-02-21.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-02-00.
Highest Financial Loss: The highest financial loss from an incident was $6.3 billion.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers, Treatment details, , phone numbers, addresses, financial information, health records, diagnoses, prescriptions, treatment details, , Sensitive data, Sensitive healthcare data, personal information, health information, , names, addresses, dates of birth, health insurance data, Social Security numbers, , 190 million records, Personal health information (PHI) of over 100 million individuals, Widespread (varies by group; e.g., Change Healthcare data leaked via multiple gangs), 93.3M individuals (MOVEit, 2023), 9.7M medical records (Medibank, 2022), 5.6M patient records (Healthcorps, 2024), 726K customers (Patelco Credit Union, 2024), 254K users (Kadokawa/Niconico, 2024), 500GB (Spanish Tax Agency, 2024), 1TB (Nvidia, 2022), 190GB (Samsung, 2022), 65GB (British Library, University of Hawaii, 2023), PII, payment info, medical records, corporate secrets (e.g., Apple blueprints via Quanta, 2021), , 215.7M+ records (Change Healthcare: 192.7M; H1 2025 breaches: 23M+), , 3B+ records (largest breach, Yahoo 2013), 198M Americans (healthcare breaches, 2024), 73M AT&T customers (SSNs, 2019 breach), 57M Uber users/drivers (2016), 339M Marriott guests (2018), PII, PHI, payment data, credentials, military/civilian records, , Sensitive business information, Credentials (via data-stealing malware), Potential PII/PHI (in healthcare attacks), , Health Records, Patient Data and .
Most Significant System Affected: The most significant system affected in an incident were Claims processingRevenue cycle services and AI technologies and and Medical billingPre-authorizations and Insurance eligibility checksPrior authorization requests and ApplicationsPharmaciesHealthcare providers and and electronic systemsinsurance verificationprior authorization processesclinical information exchangee-prescription services and Medical billing servicesPre-authorization services and network serversoperational systems and 300K+ computers (WannaCry, 150+ countries, 2017)650 servers + 150 apps (Sky Lakes Medical Center, 2021)800 servers (Costa Rica government, 2022)10TB data (Canon, 2020)740GB (Toshiba, 2021)1.4M patient records (Lubbock County, 2019)Port of Nagoya (10% of Japan’s trade disrupted, 2023)thousands of dealerships (CDK Global, 2024)US fuel supply (Colonial Pipeline, 2021)US meat supply (JBS, 2021) and IoT-enabled medical devices (wearables, implantables, diagnostic tools)Hospital networks and EHR systemsCloud-based healthcare platforms and Healthcare (Change Healthcare, Ascension)Telecom (AT&T)Retail (M&S, Co-op, Harrods)Government/Military (Pentagon 2015)IoT Devices (124% attack increase)Cloud Infrastructure (Cryptojacking) and End-user devices (via fake updates)Legitimate websites (compromised for distribution)Healthcare systems (e.g., Change Healthcare, Rite Aid) and Active DirectoryDomain ControllersHybrid Cloud Infrastructure (Azure AD)Patient Care Systems.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was malwarebytes, flashpoint, recorded future, trellix, , cybersecurity firms (e.g., for colonial pipeline, change healthcare), doj/europol (qakbot takedown, 2025), insurance providers (e.g., syracuse city school district, 2019), , cybersecurity firms (e.g., integrity security services, health catalyst), regulatory bodies (hhs, fda, eu agencies), , cyber insurance providers (e.g., resilience), threat intelligence sharing, , cybersecurity firms (forensics, recovery), legal counsel (regulatory compliance), pr agencies (crisis communications), , trustwave spiderlabs (research/threat intelligence), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Disconnecting its systems, Infrastructure disruption (e.g., LockBit takedown)International Ransomware Task Force operations, network isolation (e.g., Change Healthcare, CDK Global)system shutdowns (e.g., Baltimore, 2019)disabling RDP access (common in SMBs)patching zero-days (e.g., MOVEit, 2023), Deployment of AI-based threat detection (e.g., BluePrint Protect™)Network segmentation for IoMT devicesEndpoint security upgrades, Isolation of compromised vendor systemsDisabling affected accounts (post-phishing), Network isolation (Ascension and retailers)Endpoint detection/response (EDR) deploymentDark web monitoring (AT&T)Password resets (M&S customers).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 339M Marriott guests (2018), dates of birth, personal information, 73M AT&T customers (SSNs, 2019 breach), 254K users (Kadokawa/Niconico, 2024), Health Records, 198M Americans (healthcare breaches, 2024), 215.7M+ records (Change Healthcare: 192.7M; H1 2025 breaches: 23M+), Potential PII/PHI (in healthcare attacks), phone numbers, health information, Sensitive data, Treatment details, 1TB (Nvidia, 2022), Credentials (via data-stealing malware), 3B+ records (largest breach, Yahoo 2013), health insurance data, prescriptions, names, Patient Data, addresses, Widespread (varies by group; e.g., Change Healthcare data leaked via multiple gangs), diagnoses, 500GB (Spanish Tax Agency, 2024), PII, payment info, medical records, corporate secrets (e.g., Apple blueprints via Quanta, 2021), 726K customers (Patelco Credit Union, 2024), 190 million records, financial information, treatment details, 5.6M patient records (Healthcorps, 2024), Sensitive healthcare data, PII, PHI, payment data, credentials, military/civilian records, 190GB (Samsung, 2022), Personal health information (PHI) of over 100 million individuals, Sensitive business information, 65GB (British Library, University of Hawaii, 2023), Names, health records, Social Security numbers, 93.3M individuals (MOVEit, 2023), 9.7M medical records (Medibank, 2022) and 57M Uber users/drivers (2016).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 873.2M.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $4 million.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was Potential: $4.99M (insider threat average), Undisclosed (ongoing investigations), .
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuits for cybersecurity negligence, , Class action lawsuits, , Lawsuits, Multiple lawsuits, Multiple lawsuits, Investigation by U.S. Department of Health and Human Services (HHS), International Ransomware Task Force operations, Infrastructure seizures, , lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims), , HHS investigations into 307 breaches (H1 2025), Potential class-action lawsuits, , Investigation by law firms (e.g., Levi & Korsinsky for Retina Group of Florida), , Class-action lawsuits (AT&T, healthcare breaches), Regulatory probes (SEC, ICO UK), .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Password policies must evolve: block breached credentials, enforce MFA, and use dynamic feedback for users.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Prepare for **double/triple extortion** with data leak response plans., Develop and **test incident response plans** annually., Prioritize encryption for data at rest and in transit in medical devices., Evaluate **cyber insurance** coverage for ransomware scenarios., Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor **dark web** for leaked credentials or data., Invest in **threat intelligence** to preempt zero-day exploits., Monitor dark web for signs of stolen data or credential sales., Category: Hybrid Environment Security, , Monitor dark web forums for leaked ransomware code and initial access broker activities., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups., Invest in employee training to recognize phishing/social engineering attacks., Treat insurance policies as sensitive documents, Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Implement **immutable backups** and test recovery processes regularly., Conduct regular third-party security audits to identify vulnerabilities., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Implement strict access controls for WordPress admin panels and other CMS platforms., Isolate **third-party integrations** and vet vendors rigorously., Include all critical data types in tested backup strategies, Adopt zero-trust architectures for medical device networks., Quantify cyber risk in financial terms to guide investment, Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Deploy **Multi-Factor Authentication (MFA)** across all access points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Invest in employee training to counter AI-generated phishing attacks., Segment networks to limit lateral movement by attackers., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Monitor and secure website subdomains to prevent Domain Shadowing., Collaborate with cybersecurity firms for continuous threat intelligence sharing., Apply the **principle of least privilege** to minimize attack surfaces., Disable **RDP** where possible; use VPNs with MFA., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Category: Detection & Response, , Train staff on phishing, social engineering, and safe data handling, Segment networks to **limit lateral movement**., Category: Active Directory Hardening, , Engage **red team exercises** to simulate ransomware attacks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Reassess cybersecurity measures in the healthcare industry, Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Educate users on verifying software update sources before execution., Assume breach posture: segment networks to limit lateral movement post-infection., Implement MFA across all critical systems, especially those handling PHI., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish., Category: Privileged Access Management (PAM), , Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Train employees on **phishing awareness** and social engineering., Monitor third-party vendors continuously, Develop and test incident response plans specifically tailored to ransomware scenarios., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Develop incident response playbooks tailored to healthcare-specific threats., Enhance intrusion detection systems to reduce dwell time., Conduct regular penetration testing and red team exercises to identify weak points., Category: Credential Security, , Regularly test incident response plans under realistic conditions and Enhance third-party risk management for vendors handling sensitive data..
Most Recent Source: The most recent source of information about an incident are U.S. Department of Health and Human Services (HHS), Flashpoint, U.S. Department of Health and Human Services (HHS) investigation reports (referenced), Coherent Market Insights (CMI), Microsoft Security Guidance for Active Directory, The Register, Verizon 2025 Data Breach Investigations Report, IBM Cost of a Data Breach Report 2024, Levi & Korsinsky Law Firm Investigation, SonicWall Cyber Threat Report 2024, FBI Internet Crime Complaint Center (IC3), Medical Associates of Brevard Breach Letter (PDF), Sophos State of Ransomware 2024, MalwareBytes, BlackKite Ransomware Report 2025, Trustwave SpiderLabs Research (via Hackread.com), California Attorney General, Article on Change Healthcare ransomware attack and healthcare cybersecurity trends, PurpleSec Ransomware Statistics 2025, Cybersecurity Dive, ITRC Annual Data Breach Report 2024, Resilience Midyear 2025 Cyber Risk Landscape Report, Trellix, Health Catalyst Press Release (AI Cyber Protection Solution), Google's acquisition of Wiz (contextual reference), The Business Research Company (Ransomware Market Report), BBC: M&S, Co-op, Harrods Cyberattacks (April 2025), Sophos: The State of Ransomware 2024, IBM Security X-Force Threat Intelligence, Chainalysis 2025 Crypto Crime Report, Verizon 2025 Data Breach Investigations Report (DBIR), Retina Group of Florida HHS Filing, Washington Attorney General's Office, Specops Software - Active Directory Security, Recorded Future (The Record), Statista, UK Government Cyber Security Breaches Survey 2024, Change Healthcare Ransomware Attack Coverage (Various News Outlets), SEC Filing: Change Healthcare 8-K (February 2024), DOJ Press Release: Qakbot Takedown (2025), Goshen Medical Center Breach Notice, CISA Known Exploited Vulnerabilities (KEV) Catalog, Verizon Data Breach Investigations Report (DBIR), Resilience and Help Net Security Interview with Judson Dressler (Resilience).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.malwarebytes.com, https://www.flashpoint.io, https://therecord.media, https://www.trellix.com, https://www.statista.com, https://www.sophos.com/en-us/state-of-ransomware, https://www.ibm.com/security, https://www.chainalysis.com, https://www.verizon.com/business/resources/reports/dbir/, https://www.cisa.gov/known-exploited-vulnerabilities-catalog, https://www.ic3.gov, https://www.thebusinessresearchcompany.com, https://purplesec.us/ransomware-statistics/, https://www.justice.gov, https://www.cybersecuritydive.com, https://www.blackkite.com, https://www.coherentmarketinsights.com/insight/request-sample/8415, https://www.hhs.gov, https://www.idtheftcenter.org, https://www.sophos.com, https://www.verizon.com/business/resources/reports/dbir/, https://www.sonicwall.com/threat-report/, https://www.ibm.com/reports/data-breach, https://www.gov.uk/government/statistics, https://www.sec.gov/edgar/browse/, https://www.bbc.com/news, https://www.verizon.com/business/resources/reports/dbir/, https://specopssoft.com/, https://learn.microsoft.com/en-us/security/ .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (HHS investigation as of 2024).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was UnitedHealth Group (Change Healthcare breach updates), CDK Global customer notifications (2024), HHS advisories for healthcare sector (2024–2025), CISA alerts on ransomware trends (e.g., #StopRansomware), FBI warnings on RaaS and phishing (2025), FDA guidance on medical device cybersecurity (2023), HHS cybersecurity best practices for healthcare providers, CISOs advised to prioritize dynamic vendor risk management and AI threat detection., Boards urged to allocate budget for supply chain resilience and behavioral security tools., Breach notifications to state AGs, HHS, and affected individuals, Healthcare: HHS bulletins on ransomware resilience, Retail: PCI DSS updates for payment security, Telecom: FCC guidelines on customer data protection, SMBs: CISA resources for ransomware readiness, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Credit monitoring for affected individuals (e.g., Patelco Credit Union, Healthcorps)Password reset recommendations (e.g., after credential leaks)Fraud alerts for financial data exposure (e.g., Spanish Tax Agency)Healthcare providers’ notifications to patients (e.g., Medibank, CommonSpirit), Change Healthcare patient notification (2024)General alerts from affected healthcare providers, Organizations using CDK Global or Change Healthcare services were likely notified of disruptions.General guidance issued on recognizing AI-powered phishing (e.g., voice synthesis, browser-based attacks)., Credit monitoring services offeredBreach letters mailed to victims, AT&T: Credit monitoring for affected customersM&S: Password reset prompts and transaction reviewsChange Healthcare: Prescription workflow updatesGeneral: FTC tips on phishing/vishing avoidance.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Server Without MFA and Server lacking multi-factor authentication (MFA).
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was weeks to months (e.g., APT-style attacks)rapid exploitation (e.g., zero-days like MOVEit), ~1 month (Goshen: Feb 15–Mar 4 detection), Weeks-Months (APT groups)Days (opportunistic ransomware).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Lack of preparedness in evolving and securing AI technologies, Third-party vendor compromise, human error, poor vendor oversight, failed disaster recovery tests, untested backups, Lack of multi-factor authentication (MFA) on critical serverInadequate segmentation of high-value data repositoriesFailure to detect or prevent lateral movement by attackersPotential insider threat or credential compromise (unconfirmed), Law enforcement takedowns scattering affiliates without arrestsLeaked ransomware source code (e.g., LockBit, Conti)Commoditization of malware tools and AI lowering entry barriersDistrust among affiliates due to infiltrations (e.g., LockBit, Hive)Financial disputes and underpayment in large RaaS groups, unpatched vulnerabilities (e.g., EternalBlue, MOVEit)lack of MFA (e.g., RDP compromises)poor segmentation (e.g., lateral movement in Colonial Pipeline)inadequate backups (e.g., Baltimore’s $18M recovery)third-party risks (e.g., supply chain attacks)human error (e.g., phishing clicks)insufficient employee training (e.g., recognizing phishing), Inadequate security-by-design in IoMT devicesDelayed patch management for known vulnerabilitiesOver-reliance on perimeter security without segmentationLack of AI-driven threat detection in legacy systems, Over-reliance on static vendor assessments.Inadequate protections against AI-amplified social engineering.Lack of segmented backups enabling ransomware spread.Single points of failure in critical supply chains., Inadequate intrusion detection (delayed breach discovery)Likely exploitation of unpatched vulnerabilities or phishingInsufficient segmentation of sensitive data, Inadequate patch management (AT&T, IoT)Lack of MFA (Ascension, phishing)Over-reliance on legacy firewalls (encrypted threats)Third-party risk blindness (Change Healthcare)Insider threat neglect (malicious/accidental)Poor IoT security hygiene (default credentials), Over-reliance on user trust in software update prompts.Inadequate monitoring of website subdomains (enabling Domain Shadowing).Lack of behavioral detection for malicious scripts on legitimate sites.Profit-driven MaaS model lowering the barrier for cybercriminals., Lack of MFA on critical server (initial access point).Weak password policies (reused/breached credentials).Excessive permissions for service accounts (lateral movement).Unpatched domain controllers (privilege escalation flaw).Hybrid environment complexity (Azure AD Connect abuse).Fragmented security tools (on-premises vs. cloud visibility gaps)..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Mandatory MFA implementation across all systemsEnhanced network segmentation and zero-trust architectureIncreased investment in AI-driven threat detection and responseThird-party security audits for all vendors handling PHIRegulatory push for stricter cybersecurity standards in healthcare, Targeted arrests of threat actors, not just infrastructure disruptionDark web monitoring for leaked code and initial access salesPublic-private partnerships to share threat intelligenceAdaptive defenses against fragmented, smaller ransomware groups, mandatory **MFA** implementationaccelerated **patch management** for KEV vulnerabilities**network segmentation** to limit blast radius**immutable backups** with offline storage**incident response drills** quarterly**threat hunting** for early detection**vendor risk assessments** for third parties**dark web monitoring** for leaked credentials**AI-driven anomaly detection** (e.g., for phishing)**cyber insurance** policy reviews, FDA’s 2023 cybersecurity requirements for new medical devicesAdoption of ISS Secure Platform for Medical (ISS-SPM) by manufacturersHealthcare provider investments in AI-based security (e.g., BluePrint Protect™), Shift to continuous vendor monitoring with financial risk modeling.Integration of behavioral baselines into anomaly detection.Mandatory Zero Trust adoption for high-risk vendors.Expanded red-teaming for AI threat scenarios., Mandatory credit monitoring for victimsRegulatory filings and legal disclosuresPotential litigation-driven security overhauls (e.g., Retina Group of Florida), technical: ['Deploy EDR/XDR solutions', 'Implement network micro-segmentation', 'Upgrade to next-gen firewalls (NGFW)', 'Enforce least-privilege access'], process: ['Mandate security awareness training (quarterly)', 'Conduct tabletop exercises (ransomware scenarios)', 'Automate threat intelligence sharing', 'Integrate threat hunting into SOC operations'], governance: ['Appoint dedicated CISO/DSO roles', 'Align cybersecurity with business risk appetite', 'Increase board-level oversight', 'Adopt cybersecurity frameworks (NIST, ISO 27001)'], , Mandated MFA for all privileged and sync accounts.Deployed **Specops Password Policy** to block compromised credentials.Implemented **just-in-time (JIT) access** for administrative tasks.Disabled **NTLM** and enforced SMB signing.Unified **SIEM/XDR monitoring** for AD and cloud identities.Accelerated **patch management** for domain controllers.Conducted **AD security assessment** and red team exercises..
.png)
Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.
Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.
Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from 1.0.0 through 2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.
Improper Privilege Management vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from v2.9.0 through v2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.
File upload vulnerability in HCL Technologies Ltd. Unica 12.0.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.