ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Change Healthcare is now a part of Optum. To stay up-to-date with news please connect with us at Optum.com. At both Optum and Change Healthcare, our teams strive to help people live healthier lives and help the health system work better for everyone.

Change Healthcare A.I CyberSecurity Scoring

Change Healthcare

Company Details

Linkedin ID:

change-healthcare

Employees number:

4,876

Number of followers:

146,856

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

optum.com

IP Addresses:

14082

Company ID:

CHA_9081577

Scan Status:

Completed

AI scoreChange Healthcare Risk Score (AI oriented)

Between 0 and 549

https://images.rankiteo.com/companyimages/change-healthcare.jpeg
Change Healthcare IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreChange Healthcare Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/change-healthcare.jpeg
Change Healthcare IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Change Healthcare Company CyberSecurity News & History

Past Incidents
32
Attack Types
3
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Change Healthcare, Inc.Breach8542/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: On August 3, 2024, the California Attorney General reported a data breach involving Change Healthcare Inc. The breach occurred between February 12, 2024, and February 22, 2024, potentially affecting personal information including names, addresses, dates of birth, health insurance data, and Social Security numbers. The number of individuals affected is currently unknown.

Change Healthcare Inc.Breach8542/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Washington Attorney General's Office reported a data breach involving Change Healthcare Inc. on April 18, 2025. The breach, which occurred between February 17 and February 20, 2024, potentially affected approximately 3,175,442 individuals, with compromised data including personal and health information. This incident highlights the significant impact of data breaches on healthcare organizations, where the loss of sensitive information can have severe consequences for both the organization and the affected individuals.

Change HealthcareBreach10045/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Change Healthcare data breach due to a ransomware attack has introduced significant disruptions across the healthcare sector, with UnitedHealth, the parent company, estimating potential costs to be around $1.6 billion. The breach prompted concerns about reporting responsibilities under HIPAA, with provider organizations urging the Office for Civil Rights for clarity and a declaration of sole responsibility resting with Change Healthcare for breach notifications. UnitedHealth has offered support and to undertake notification responsibilities, yet provider organizations seek OCR validation to ensure legal compliance falls on UnitedHealth Group/Change Healthcare as the affected covered entity.

Change HealthcareBreach10042/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Change Healthcare data breach in February 2024 significantly impacted over 100 million individuals, marking the largest-ever healthcare data breach in the US. An extensive cyber attack disrupted IT operations, affecting numerous applications, pharmacies, and healthcare providers. Sensitive personal and medical information such as names, Social Security numbers, and treatment details were compromised. The incident led to substantial costs, with UnitedHealth Group reporting $1.1 billion in related expenses. Despite ransom payments, issues with the hacker group BlackCat/ALPHV and subsequent attempts by RansomHub to extort the company exacerbated the situation.

Change HealthcareCyber Attack100702/2023
Rankiteo Explanation :
Attack that could injure or kill people

Description: Change Healthcare, part of Optum and a subsidiary of UnitedHealth Group, experienced a significant cyber-attack that led to disruptions in prescription issuance. The attack began to surface on February 21, when certain applications became unavailable due to what was later identified as a network interruption caused by a cybersecurity issue. The company took measures to mitigate the impact by disconnecting its systems upon recognizing an external threat. The disruptions have affected the healthcare transactions of approximately one-third of US patients, given the company's substantial role in handling 15 billion transactions annually. This situation underscores the vulnerability of healthcare providers to cyber threats and the potential for such attacks to significantly delay medical treatments and prescriptions, affecting both the company's operations and patient care.

Change HealthcareCyber Attack10053/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: The Change Healthcare cyberattack has led to a significant disruption in the claims processing system affecting over 1,850 hospitals and 250,000 physicians. The direct impact has been a staggering $6.3 billion cash flow deficit since the breach, as reported through March 9. The inability to process claims digitally has caused a decline in cash and potential long-term consequences such as medical necessity denials and prior authorization denials due to delayed claims. Healthcare providers are struggling to cope with the manpower required for paper claims and the unsustainable financial pressure during the interim of restoring the compromised system. The lack of adequate action from payers exacerbates the situation, making it critical to reassess cybersecurity measures in the healthcare industry.

Change HealthcareCyber Attack10057/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Change Healthcare experienced a cyberattack, causing significant service disruption. Health systems relying on its services for medical billing and pre-authorizations were forced to delay procedures and prescriptions, resulting in financial strain, including doctor and nurse salary payment issues, with some pushed towards receivership. The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.

Change Healthcare (UnitedHealth Group)Ransomware10052/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare**, a subsidiary of **UnitedHealth Group**, fell victim to a **devastating ransomware attack** orchestrated by the **ALPHV/BlackCat** cybercriminal group. The breach crippled the company’s **payment and claims processing systems**, disrupting healthcare operations nationwide. Over **15,000 U.S. healthcare providers**—including hospitals, pharmacies, and clinics—experienced **outages in prescription processing, insurance claims, and revenue cycle management**. The attack forced many providers to **revert to manual paperwork**, delaying critical medical services and financial transactions.The incident exposed **sensitive patient data**, including **personal, financial, and medical records**, while the **ransom demand reportedly exceeded $22 million**. UnitedHealth Group confirmed the attack **compromised data across its systems**, though the full scope of the breach remains under investigation. The **prolonged downtime**—lasting weeks—**threatened the financial stability of smaller clinics** and pharmacies, some of which faced **cash flow crises** due to unprocessed claims. The U.S. Department of Health and Human Services (HHS) intervened, urging healthcare entities to **mitigate risks** and adopt emergency protocols. The attack underscored vulnerabilities in **third-party healthcare IT infrastructure**, raising concerns about **future cyber threats to the sector**.

Change HealthcareRansomware10056/2024
Rankiteo Explanation :
Attack threatening the organization's existence

Description: In the **2024 Change Healthcare breach**, attackers exploited a server lacking multifactor authentication (MFA) to infiltrate the company’s **Active Directory (AD)**, the central authentication backbone for over 90% of Fortune 1000 firms. Once inside, they escalated privileges, executed lateral movement, and deployed a **ransomware attack** that crippled operations. The incident forced a **complete halt to patient care services**, exposed **sensitive health records**, and resulted in the company paying **millions in ransom** to restore systems. The attack disrupted billing, claims processing, and pharmacy operations nationwide, causing prolonged financial and reputational damage. The breach highlighted critical vulnerabilities in AD security, including **weak credential management, unpatched systems, and excessive privileged access**, which allowed attackers to maintain persistence and evade detection by mimicking legitimate AD operations. Recovery efforts took weeks, with lingering impacts on healthcare providers and patients reliant on Change Healthcare’s infrastructure.

Change HealthcareRansomware10057/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Change Healthcare experienced a cyberattack leading to widespread disruption of medical billing and pre-authorization services, affecting hundreds of health systems across the United States. The incident resulted in delays in medical procedures, restricted access to prescription medications, financial strains on health systems, and some reportedly facing receivership. The consolidation in healthcare has resulted in fewer alternatives for such services, emphasizing the failures and risks associated with creating single points of failure within critical healthcare infrastructure.

Change HealthcareRansomware10046/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Change Healthcare suffered a significant cyber-attack impacting approximately 190 million individuals, a number revised from an earlier report of 100 million in July. As a major healthcare payment processing firm in the US, the breach's scale and the sensitive nature of the compromised data classify it as one of the most severe healthcare data breaches in 2024. The financial repercussions are substantial, with estimated costs reaching $3.1 billion. ALPHV/Blackcat ransomware group has been implicated in the breach. The incident has led to multiple lawsuits against UnitedHealth Group, Change Healthcare's parent company.

Change HealthcareRansomware10042/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Change Healthcare, a major healthcare payment processing firm, experienced a catastrophic data breach affecting 190 million individuals, as of the latest update by UnitedHealth Group, its parent company. This breach resulted in the loss of sensitive data and financial repercussions amounting to $3.1 billion. Initially reported in February 2024, the breach numbers escalated by 90 million by January 2025. Noted as the worst healthcare data breach of 2024, the incident has led to multiple lawsuits against UnitedHealth Group. ALPHV/Blackcat, a notorious ransomware group, was identified as responsible for the attack.

Change HealthcareRansomware10052/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Change Healthcare experienced a ransomware attack in February that resulted in significant cash flow disruptions for Medicare providers and suppliers, including hospitals, pharmacies, and physicians. The Centers for Medicare and Medicaid Services (CMS) responded by launching the Change Healthcare/Optum Payment Disruption (CHOPD) program to provide accelerated and advance payments to affected parties. More than $3.26 billion was disbursed to ensure continued patient care. CMS has recovered the majority of these payments as providers resumed normal Medicare billing. This incident highlights the potential financial and operational impacts of ransomware on the healthcare sector.

Change HealthcareRansomware10042/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: In February 2024, Change Healthcare, a major medical billing processor in the US owned by UnitedHealth, suffered a ransomware attack by ALPHV/BlackCat gang, impacting over 100 million people. The breach involved personal data including phone numbers, addresses, financial information, health records, diagnoses, prescriptions, and treatment details. The company paid a $22 million ransom, but the aftermath saw an increased rate of healthcare-focused cyberattacks, along with lawsuits and significant blowback for compromised security measures.

Change HealthcareRansomware100506/2023
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In February, Change Healthcare suffered a ransomware attack that disrupted its services, impacting cash flow for Medicare providers, including hospitals and pharmacies. The CMS initiated the CHOPD program to alleviate the financial strain on affected parties by distributing over $2.55 billion to Part A providers and more than $717.18 million to Part B suppliers. The swift mitigation efforts by CMS ensured the continued delivery of essential patient care amidst one of the largest cyberattacks targeting the U.S. healthcare sector. Notably, CMS has recouped most of the advance payments, and normal billing processes are now reinstated for providers.

Change HealthcareRansomware10051/2020
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare** suffered a **massive ransomware attack** after hackers exploited a server lacking multi-factor authentication. The breach compromised **personal health information of over 100 million individuals**, making it one of the largest healthcare data breaches in U.S. history. Operations were severely disrupted, leading to financial losses estimated between **$2.3 billion and $2.45 billion**. The incident triggered investigations by the **U.S. Department of Health and Human Services (HHS)**, intensifying regulatory scrutiny on healthcare cybersecurity. The attack highlighted systemic vulnerabilities in third-party vendors handling sensitive patient data, prompting broader industry-wide concerns about ransomware resilience and proactive threat detection. The fallout included operational chaos, reputational damage, and long-term financial repercussions, reinforcing the need for stricter access controls and advanced threat-monitoring systems.

Change Healthcare/OptumRansomware10052/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In February, Change Healthcare/Optum experienced a ransomware attack leading to significant financial and operational disruptions across the U.S. healthcare industry. The Centers for Medicare and Medicaid Services (CMS) initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems for affected Medicare providers and suppliers. Over $2.55 billion in accelerated payments were distributed to Part A providers, and more than $717.18 million in advance payments went to Part B suppliers. Recovery efforts by CMS have been effective, with over 96 percent of CHOPD payments recouped and normal Medicare billing resumed.

Change HealthcareRansomware10054/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Change Healthcare experienced a cybersecurity incident involving AI technologies that potentially exceeded anticipated risks. The event showcased the vulnerability of innovative systems to unforeseen threats, highlighting the lack of preparedness in evolving and securing these technologies. The incident served as a stark reminder that without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.

Change HealthcareRansomware10052/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare**, a subsidiary of UnitedHealth Group (annual revenue: $370B), fell victim to a **ransomware attack** orchestrated by the BlackCat/AlphV cybercrime syndicate. The breach disrupted **15 billion annual healthcare transactions**, crippling prescription processing, insurance claims, and payment systems across the U.S., including for military personnel. The attack forced hospitals and pharmacies to revert to manual operations, delaying critical care and financial workflows.Change Healthcare confirmed the incident was linked to a **nation-state-associated threat actor** and ultimately paid a **$22 million ransom** to restore systems. The breach exposed sensitive patient data, though the full scope of stolen records remains undisclosed. The fallout triggered federal investigations, class-action lawsuits, and regulatory scrutiny, with the U.S. Department of Health and Human Services (HHS) launching a probe into potential **HIPAA violations**. The attack’s ripple effects persisted for months, straining healthcare providers and eroding trust in digital health infrastructure.

Change HealthcareRansomware10056/2024
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Change Healthcare, a critical healthcare technology provider, fell victim to a devastating ransomware attack in early 2024, orchestrated by an affiliate of the **AlphV/BlackCat** gang. The breach disrupted pharmacy operations, billing systems, and claims processing nationwide, crippling healthcare providers' ability to process payments, verify insurance, or access patient records. The attack forced hospitals and pharmacies to revert to manual processes, delaying treatments, prescriptions, and financial transactions for weeks. The threat actor later pivoted to **RansomHub** after AlphV’s takedown by law enforcement, attempting to monetize the stolen data through multiple leak sites. The incident exposed deep vulnerabilities in healthcare cybersecurity, with reports suggesting the attacker exploited unpatched systems or compromised credentials. The financial and operational fallout was severe: Change Healthcare’s parent company, **UnitedHealth Group**, faced billions in recovery costs, lawsuits, and regulatory scrutiny. The attack also triggered a broader crisis, with smaller clinics and pharmacies facing cash flow shortages, underscoring how ransomware can paralyze critical infrastructure and endanger patient care.

Change HealthcareRansomware10053/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Change Healthcare, a subsidiary of UnitedHealth, faced a massive cyberattack which disrupted billions of medical claims processing and cost the company $3.1 billion. Dubbed the most significant attack in U.S. healthcare history, it led to extensive disruptions in the healthcare sector. The attack's magnitude and repercussions across interconnected systems underscore its potential to ripple through and impact an entire industry.

Change HealthcareRansomware10056/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Change Healthcare, a subsidiary of UnitedHealth, suffered a devastating cyberattack in 2024 carried out by affiliates of the ALPHV ransomware group. The attack resulted in the theft of sensitive data belonging to approximately **100 million Americans**, including personal, medical, and financial records. Beyond data exfiltration, the incident caused massive operational disruptions, crippling healthcare services nationwide. UnitedHealth reported cleanup costs exceeding **$2 billion** within a year, with severe financial strain on suppliers and providers. The breach exposed systemic cybersecurity negligence, leading to lawsuits and regulatory scrutiny. The attack’s ripple effects extended to delayed treatments, financial losses for healthcare entities, and long-term reputational damage to UnitedHealth. The incident underscored the vulnerability of critical healthcare infrastructure to ransomware, with attackers showing no remorse despite life-threatening consequences for patients, including disrupted cancer surgeries and at least one confirmed death linked to the attack’s fallout in London hospitals (via Qilin’s later ransomware strike).

Change HealthcareRansomware10056/2025
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Change Healthcare, a critical vendor in the U.S. healthcare system, suffered a devastating **ransomware attack** in early 2025, disrupting operations across pharmacies, hospitals, and insurance providers nationwide. The attack, attributed to **ALPHV/BlackCat**, encrypted systems and exfiltrated sensitive patient data, including medical records, billing information, and personally identifiable information (PII). The outage lasted weeks, crippling prescription processing, claims submissions, and revenue cycles for thousands of healthcare providers. While Change Healthcare reportedly paid a **$22 million ransom** to restore operations, the financial fallout extended far beyond the payment—providers faced **cash flow crises**, delayed patient care, and long-term reputational damage. The incident also triggered **regulatory scrutiny** and class-action lawsuits, with estimates suggesting total losses (including indirect costs) could exceed **$1 billion**. The attack exposed vulnerabilities in third-party supply chains, demonstrating how a single breach in a vendor can paralyze an entire sector.

Change HealthcareRansomware10052/2024
Rankiteo Explanation :
Attack threatening the organization's existence

Description: In February 2024, Change Healthcare's systems were hit by a ransomware attack, disrupting care across the U.S. and exposing 190 million records. The breach highlighted the vulnerabilities in third-party vendor security and the cascading effects on the healthcare system. The attack caused widespread disruption, financial losses, and exposed sensitive patient data, underscoring the critical need for robust cybersecurity measures in healthcare.

UnitedHealth Group, Optum, Inc., and Change HealthcareRansomware10044/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Following a ransomware attack on February 21, the extent of the impact on Change Healthcare, providers, and patients is being evaluated. Class action lawsuits filed against UnitedHealth Group, Optum, Inc., and Change Healthcare are converging in Nashville's federal court, as proposed by Change Healthcare to streamline proceedings. Healthcare providers faced difficulties in checking insurance eligibility and processing prior authorization requests, disrupting patient care. Restoration efforts for Change Healthcare's products and services were still ongoing as of March 31.

Change HealthcareRansomware10059/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Change Healthcare, a subsidiary of Optum Inc and part of UnitedHealth Group, faced a substantial ransomware attack that disabled many of its electronic systems. This disruption halted the ability of thousands of healthcare providers to submit claims and receive payments, causing an estimated $100 million in daily deferred patient care revenue over a period exceeding three weeks. The attack affected various operations, including insurance verification, prior authorization processes, clinical information exchange, and e-prescription services. The aftermath of the attack persisted, with reported continuing challenges and disruptions despite a hefty ransom payment allegedly made.

Change HealthcareRansomware10055/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: The ransomware attack on Change Healthcare has caused significant disruption within the healthcare sector, with UnitedHealth estimating breach-related costs around $1.6 billion. The breach has hindered financial recovery and operational functionality for providers relying on Change Healthcare's services, leading to a call for transparent reporting obligations and a plea for guidance from the OCR regarding HIPAA breach reporting requirements. This incident has underscored the need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.

Change HealthcareRansomware1005/2024
Rankiteo Explanation :
Attack affecting organizations offering vital services (healthcare sector), potential to disrupt healthcare services and patient care, with substantial financial implications.

Description: The ransomware attack on Change Healthcare reported on February 21st has caused substantial disruption across the healthcare sector, with the breach costs estimated by UnitedHealth, Change's parent company, to potentially reach $1.6 billion. The breach has drastically affected providers relying on Change Healthcare's services, leading to financial distress, with a clear recovery path not yet in sight. The repercussions of the breach have been amplified by the lack of definitive information and guidance on reporting responsibilities, causing unease among affected healthcare providers.

UnitedHealth Group, Optum Inc., and Change HealthcareRansomware10043/2024
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: UnitedHealth Group experienced a ransomware attack by the hacking group BlackCat on Feb. 21, leading to severe delays in processing claims and revenue cycle services, which pushed many healthcare providers towards financial distress and potential bankruptcy. Providers have filed lawsuits for cybersecurity negligence, with claims that sensitive data is now with cybercriminals. UnitedHealth Group paid over $2 billion to impacted providers while the status of compromised data and cooperation with the cyber threat actor remains unclear.

Change Healthcare (UnitedHealth Group)Ransomware10052/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare**, a critical division of UnitedHealth Group, fell victim to a devastating **BlackCat/ALPHV ransomware attack**. The assault crippled its systems, disrupting prescription processing, medical claims, and payment operations across the U.S. healthcare sector. Over **100 million individuals** were impacted due to service outages, with hospitals, pharmacies, and insurers facing delays in billing, reimbursements, and patient care. The company paid a **$22 million ransom**, but total financial losses ballooned to an estimated **$2 billion**, factoring in operational downtime, recovery costs, and reputational damage. The attack exposed vulnerabilities in third-party supply chains, as the breach originated from compromised credentials in a connected vendor system. Regulatory scrutiny intensified, with federal investigations probing compliance failures under **HIPAA** and cybersecurity negligence. The incident underscored the escalating threat of **RaaS (Ransomware-as-a-Service)** models, where affiliate hackers leverage sophisticated tools to target high-value sectors like healthcare, exploiting systemic interdependencies for maximum disruption.

Change HealthcareRansomware10052/2024
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare**, a subsidiary of UnitedHealth Group, fell victim to a **ransomware attack** orchestrated by the **BlackCat (ALPHV) cybercrime group**. The breach compromised the **protected health information (PHI) of approximately 192.7 million individuals**, making it one of the largest healthcare data breaches in U.S. history. The attack disrupted critical operations, including **pharmacy services, claims processing, and electronic prescribing systems**, causing widespread delays in patient care and financial transactions across the healthcare sector. The incident forced Change Healthcare to **shut down multiple systems** to contain the breach, leading to **operational outages** and **financial losses** for healthcare providers, pharmacies, and insurers reliant on its infrastructure. The company reportedly **paid a $22 million ransom** to restore systems, though data exfiltration had already occurred. The breach exposed **sensitive patient data**, including medical records, insurance details, and personally identifiable information (PII), raising concerns over **long-term identity theft and fraud risks**. Regulatory investigations by the **U.S. Department of Health and Human Services (HHS)** and potential **class-action lawsuits** further compounded the fallout, underscoring systemic vulnerabilities in healthcare cybersecurity.

Change HealthcareRansomware10056/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Change Healthcare, a critical healthcare technology provider, fell victim to a **SocGholish (FakeUpdates)**-driven cyberattack in early 2025, facilitated by the **RansomHub ransomware**. The attack originated from malicious Google Ads impersonating **Kaiser Permanente’s HR portal**, exploiting SocGholish’s Malware-as-a-Service (MaaS) infrastructure. The breach led to severe operational disruptions, including compromised patient data, financial records, and healthcare service outages. The incident was part of a broader campaign targeting healthcare entities, with **Evil Corp (a Russian cybercrime group linked to GRU Unit 29155)** involved in distributing payloads like **Raspberry Robin worm**. The attack crippled Change Healthcare’s systems, delaying medical treatments, disrupting payment processing for hospitals and pharmacies (e.g., **Rite Aid**), and exposing sensitive personal and financial information of patients and employees. The fallout included **ransom demands**, regulatory scrutiny, and long-term reputational damage, underscoring the threat’s capacity to weaponize trusted digital infrastructure for large-scale exploitation.

Change Healthcare, Inc.
Breach
Severity: 85
Impact: 4
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: On August 3, 2024, the California Attorney General reported a data breach involving Change Healthcare Inc. The breach occurred between February 12, 2024, and February 22, 2024, potentially affecting personal information including names, addresses, dates of birth, health insurance data, and Social Security numbers. The number of individuals affected is currently unknown.

Change Healthcare Inc.
Breach
Severity: 85
Impact: 4
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The Washington Attorney General's Office reported a data breach involving Change Healthcare Inc. on April 18, 2025. The breach, which occurred between February 17 and February 20, 2024, potentially affected approximately 3,175,442 individuals, with compromised data including personal and health information. This incident highlights the significant impact of data breaches on healthcare organizations, where the loss of sensitive information can have severe consequences for both the organization and the affected individuals.

Change Healthcare
Breach
Severity: 100
Impact: 4
Seen: 5/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The Change Healthcare data breach due to a ransomware attack has introduced significant disruptions across the healthcare sector, with UnitedHealth, the parent company, estimating potential costs to be around $1.6 billion. The breach prompted concerns about reporting responsibilities under HIPAA, with provider organizations urging the Office for Civil Rights for clarity and a declaration of sole responsibility resting with Change Healthcare for breach notifications. UnitedHealth has offered support and to undertake notification responsibilities, yet provider organizations seek OCR validation to ensure legal compliance falls on UnitedHealth Group/Change Healthcare as the affected covered entity.

Change Healthcare
Breach
Severity: 100
Impact: 4
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The Change Healthcare data breach in February 2024 significantly impacted over 100 million individuals, marking the largest-ever healthcare data breach in the US. An extensive cyber attack disrupted IT operations, affecting numerous applications, pharmacies, and healthcare providers. Sensitive personal and medical information such as names, Social Security numbers, and treatment details were compromised. The incident led to substantial costs, with UnitedHealth Group reporting $1.1 billion in related expenses. Despite ransom payments, issues with the hacker group BlackCat/ALPHV and subsequent attempts by RansomHub to extort the company exacerbated the situation.

Change Healthcare
Cyber Attack
Severity: 100
Impact: 7
Seen: 02/2023
Blog:
Rankiteo Explanation
Attack that could injure or kill people

Description: Change Healthcare, part of Optum and a subsidiary of UnitedHealth Group, experienced a significant cyber-attack that led to disruptions in prescription issuance. The attack began to surface on February 21, when certain applications became unavailable due to what was later identified as a network interruption caused by a cybersecurity issue. The company took measures to mitigate the impact by disconnecting its systems upon recognizing an external threat. The disruptions have affected the healthcare transactions of approximately one-third of US patients, given the company's substantial role in handling 15 billion transactions annually. This situation underscores the vulnerability of healthcare providers to cyber threats and the potential for such attacks to significantly delay medical treatments and prescriptions, affecting both the company's operations and patient care.

Change Healthcare
Cyber Attack
Severity: 100
Impact: 5
Seen: 3/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: The Change Healthcare cyberattack has led to a significant disruption in the claims processing system affecting over 1,850 hospitals and 250,000 physicians. The direct impact has been a staggering $6.3 billion cash flow deficit since the breach, as reported through March 9. The inability to process claims digitally has caused a decline in cash and potential long-term consequences such as medical necessity denials and prior authorization denials due to delayed claims. Healthcare providers are struggling to cope with the manpower required for paper claims and the unsustainable financial pressure during the interim of restoring the compromised system. The lack of adequate action from payers exacerbates the situation, making it critical to reassess cybersecurity measures in the healthcare industry.

Change Healthcare
Cyber Attack
Severity: 100
Impact: 5
Seen: 7/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Change Healthcare experienced a cyberattack, causing significant service disruption. Health systems relying on its services for medical billing and pre-authorizations were forced to delay procedures and prescriptions, resulting in financial strain, including doctor and nurse salary payment issues, with some pushed towards receivership. The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.

Change Healthcare (UnitedHealth Group)
Ransomware
Severity: 100
Impact: 5
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare**, a subsidiary of **UnitedHealth Group**, fell victim to a **devastating ransomware attack** orchestrated by the **ALPHV/BlackCat** cybercriminal group. The breach crippled the company’s **payment and claims processing systems**, disrupting healthcare operations nationwide. Over **15,000 U.S. healthcare providers**—including hospitals, pharmacies, and clinics—experienced **outages in prescription processing, insurance claims, and revenue cycle management**. The attack forced many providers to **revert to manual paperwork**, delaying critical medical services and financial transactions.The incident exposed **sensitive patient data**, including **personal, financial, and medical records**, while the **ransom demand reportedly exceeded $22 million**. UnitedHealth Group confirmed the attack **compromised data across its systems**, though the full scope of the breach remains under investigation. The **prolonged downtime**—lasting weeks—**threatened the financial stability of smaller clinics** and pharmacies, some of which faced **cash flow crises** due to unprocessed claims. The U.S. Department of Health and Human Services (HHS) intervened, urging healthcare entities to **mitigate risks** and adopt emergency protocols. The attack underscored vulnerabilities in **third-party healthcare IT infrastructure**, raising concerns about **future cyber threats to the sector**.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 6/2024
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: In the **2024 Change Healthcare breach**, attackers exploited a server lacking multifactor authentication (MFA) to infiltrate the company’s **Active Directory (AD)**, the central authentication backbone for over 90% of Fortune 1000 firms. Once inside, they escalated privileges, executed lateral movement, and deployed a **ransomware attack** that crippled operations. The incident forced a **complete halt to patient care services**, exposed **sensitive health records**, and resulted in the company paying **millions in ransom** to restore systems. The attack disrupted billing, claims processing, and pharmacy operations nationwide, causing prolonged financial and reputational damage. The breach highlighted critical vulnerabilities in AD security, including **weak credential management, unpatched systems, and excessive privileged access**, which allowed attackers to maintain persistence and evade detection by mimicking legitimate AD operations. Recovery efforts took weeks, with lingering impacts on healthcare providers and patients reliant on Change Healthcare’s infrastructure.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 7/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Change Healthcare experienced a cyberattack leading to widespread disruption of medical billing and pre-authorization services, affecting hundreds of health systems across the United States. The incident resulted in delays in medical procedures, restricted access to prescription medications, financial strains on health systems, and some reportedly facing receivership. The consolidation in healthcare has resulted in fewer alternatives for such services, emphasizing the failures and risks associated with creating single points of failure within critical healthcare infrastructure.

Change Healthcare
Ransomware
Severity: 100
Impact: 4
Seen: 6/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Change Healthcare suffered a significant cyber-attack impacting approximately 190 million individuals, a number revised from an earlier report of 100 million in July. As a major healthcare payment processing firm in the US, the breach's scale and the sensitive nature of the compromised data classify it as one of the most severe healthcare data breaches in 2024. The financial repercussions are substantial, with estimated costs reaching $3.1 billion. ALPHV/Blackcat ransomware group has been implicated in the breach. The incident has led to multiple lawsuits against UnitedHealth Group, Change Healthcare's parent company.

Change Healthcare
Ransomware
Severity: 100
Impact: 4
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Change Healthcare, a major healthcare payment processing firm, experienced a catastrophic data breach affecting 190 million individuals, as of the latest update by UnitedHealth Group, its parent company. This breach resulted in the loss of sensitive data and financial repercussions amounting to $3.1 billion. Initially reported in February 2024, the breach numbers escalated by 90 million by January 2025. Noted as the worst healthcare data breach of 2024, the incident has led to multiple lawsuits against UnitedHealth Group. ALPHV/Blackcat, a notorious ransomware group, was identified as responsible for the attack.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 2/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Change Healthcare experienced a ransomware attack in February that resulted in significant cash flow disruptions for Medicare providers and suppliers, including hospitals, pharmacies, and physicians. The Centers for Medicare and Medicaid Services (CMS) responded by launching the Change Healthcare/Optum Payment Disruption (CHOPD) program to provide accelerated and advance payments to affected parties. More than $3.26 billion was disbursed to ensure continued patient care. CMS has recovered the majority of these payments as providers resumed normal Medicare billing. This incident highlights the potential financial and operational impacts of ransomware on the healthcare sector.

Change Healthcare
Ransomware
Severity: 100
Impact: 4
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: In February 2024, Change Healthcare, a major medical billing processor in the US owned by UnitedHealth, suffered a ransomware attack by ALPHV/BlackCat gang, impacting over 100 million people. The breach involved personal data including phone numbers, addresses, financial information, health records, diagnoses, prescriptions, and treatment details. The company paid a $22 million ransom, but the aftermath saw an increased rate of healthcare-focused cyberattacks, along with lawsuits and significant blowback for compromised security measures.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 06/2023
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In February, Change Healthcare suffered a ransomware attack that disrupted its services, impacting cash flow for Medicare providers, including hospitals and pharmacies. The CMS initiated the CHOPD program to alleviate the financial strain on affected parties by distributing over $2.55 billion to Part A providers and more than $717.18 million to Part B suppliers. The swift mitigation efforts by CMS ensured the continued delivery of essential patient care amidst one of the largest cyberattacks targeting the U.S. healthcare sector. Notably, CMS has recouped most of the advance payments, and normal billing processes are now reinstated for providers.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 1/2020
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare** suffered a **massive ransomware attack** after hackers exploited a server lacking multi-factor authentication. The breach compromised **personal health information of over 100 million individuals**, making it one of the largest healthcare data breaches in U.S. history. Operations were severely disrupted, leading to financial losses estimated between **$2.3 billion and $2.45 billion**. The incident triggered investigations by the **U.S. Department of Health and Human Services (HHS)**, intensifying regulatory scrutiny on healthcare cybersecurity. The attack highlighted systemic vulnerabilities in third-party vendors handling sensitive patient data, prompting broader industry-wide concerns about ransomware resilience and proactive threat detection. The fallout included operational chaos, reputational damage, and long-term financial repercussions, reinforcing the need for stricter access controls and advanced threat-monitoring systems.

Change Healthcare/Optum
Ransomware
Severity: 100
Impact: 5
Seen: 2/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In February, Change Healthcare/Optum experienced a ransomware attack leading to significant financial and operational disruptions across the U.S. healthcare industry. The Centers for Medicare and Medicaid Services (CMS) initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems for affected Medicare providers and suppliers. Over $2.55 billion in accelerated payments were distributed to Part A providers, and more than $717.18 million in advance payments went to Part B suppliers. Recovery efforts by CMS have been effective, with over 96 percent of CHOPD payments recouped and normal Medicare billing resumed.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 4/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Change Healthcare experienced a cybersecurity incident involving AI technologies that potentially exceeded anticipated risks. The event showcased the vulnerability of innovative systems to unforeseen threats, highlighting the lack of preparedness in evolving and securing these technologies. The incident served as a stark reminder that without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare**, a subsidiary of UnitedHealth Group (annual revenue: $370B), fell victim to a **ransomware attack** orchestrated by the BlackCat/AlphV cybercrime syndicate. The breach disrupted **15 billion annual healthcare transactions**, crippling prescription processing, insurance claims, and payment systems across the U.S., including for military personnel. The attack forced hospitals and pharmacies to revert to manual operations, delaying critical care and financial workflows.Change Healthcare confirmed the incident was linked to a **nation-state-associated threat actor** and ultimately paid a **$22 million ransom** to restore systems. The breach exposed sensitive patient data, though the full scope of stolen records remains undisclosed. The fallout triggered federal investigations, class-action lawsuits, and regulatory scrutiny, with the U.S. Department of Health and Human Services (HHS) launching a probe into potential **HIPAA violations**. The attack’s ripple effects persisted for months, straining healthcare providers and eroding trust in digital health infrastructure.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 6/2024
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: Change Healthcare, a critical healthcare technology provider, fell victim to a devastating ransomware attack in early 2024, orchestrated by an affiliate of the **AlphV/BlackCat** gang. The breach disrupted pharmacy operations, billing systems, and claims processing nationwide, crippling healthcare providers' ability to process payments, verify insurance, or access patient records. The attack forced hospitals and pharmacies to revert to manual processes, delaying treatments, prescriptions, and financial transactions for weeks. The threat actor later pivoted to **RansomHub** after AlphV’s takedown by law enforcement, attempting to monetize the stolen data through multiple leak sites. The incident exposed deep vulnerabilities in healthcare cybersecurity, with reports suggesting the attacker exploited unpatched systems or compromised credentials. The financial and operational fallout was severe: Change Healthcare’s parent company, **UnitedHealth Group**, faced billions in recovery costs, lawsuits, and regulatory scrutiny. The attack also triggered a broader crisis, with smaller clinics and pharmacies facing cash flow shortages, underscoring how ransomware can paralyze critical infrastructure and endanger patient care.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 3/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Change Healthcare, a subsidiary of UnitedHealth, faced a massive cyberattack which disrupted billions of medical claims processing and cost the company $3.1 billion. Dubbed the most significant attack in U.S. healthcare history, it led to extensive disruptions in the healthcare sector. The attack's magnitude and repercussions across interconnected systems underscore its potential to ripple through and impact an entire industry.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 6/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Change Healthcare, a subsidiary of UnitedHealth, suffered a devastating cyberattack in 2024 carried out by affiliates of the ALPHV ransomware group. The attack resulted in the theft of sensitive data belonging to approximately **100 million Americans**, including personal, medical, and financial records. Beyond data exfiltration, the incident caused massive operational disruptions, crippling healthcare services nationwide. UnitedHealth reported cleanup costs exceeding **$2 billion** within a year, with severe financial strain on suppliers and providers. The breach exposed systemic cybersecurity negligence, leading to lawsuits and regulatory scrutiny. The attack’s ripple effects extended to delayed treatments, financial losses for healthcare entities, and long-term reputational damage to UnitedHealth. The incident underscored the vulnerability of critical healthcare infrastructure to ransomware, with attackers showing no remorse despite life-threatening consequences for patients, including disrupted cancer surgeries and at least one confirmed death linked to the attack’s fallout in London hospitals (via Qilin’s later ransomware strike).

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 6/2025
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Change Healthcare, a critical vendor in the U.S. healthcare system, suffered a devastating **ransomware attack** in early 2025, disrupting operations across pharmacies, hospitals, and insurance providers nationwide. The attack, attributed to **ALPHV/BlackCat**, encrypted systems and exfiltrated sensitive patient data, including medical records, billing information, and personally identifiable information (PII). The outage lasted weeks, crippling prescription processing, claims submissions, and revenue cycles for thousands of healthcare providers. While Change Healthcare reportedly paid a **$22 million ransom** to restore operations, the financial fallout extended far beyond the payment—providers faced **cash flow crises**, delayed patient care, and long-term reputational damage. The incident also triggered **regulatory scrutiny** and class-action lawsuits, with estimates suggesting total losses (including indirect costs) could exceed **$1 billion**. The attack exposed vulnerabilities in third-party supply chains, demonstrating how a single breach in a vendor can paralyze an entire sector.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: In February 2024, Change Healthcare's systems were hit by a ransomware attack, disrupting care across the U.S. and exposing 190 million records. The breach highlighted the vulnerabilities in third-party vendor security and the cascading effects on the healthcare system. The attack caused widespread disruption, financial losses, and exposed sensitive patient data, underscoring the critical need for robust cybersecurity measures in healthcare.

UnitedHealth Group, Optum, Inc., and Change Healthcare
Ransomware
Severity: 100
Impact: 4
Seen: 4/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Following a ransomware attack on February 21, the extent of the impact on Change Healthcare, providers, and patients is being evaluated. Class action lawsuits filed against UnitedHealth Group, Optum, Inc., and Change Healthcare are converging in Nashville's federal court, as proposed by Change Healthcare to streamline proceedings. Healthcare providers faced difficulties in checking insurance eligibility and processing prior authorization requests, disrupting patient care. Restoration efforts for Change Healthcare's products and services were still ongoing as of March 31.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 9/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Change Healthcare, a subsidiary of Optum Inc and part of UnitedHealth Group, faced a substantial ransomware attack that disabled many of its electronic systems. This disruption halted the ability of thousands of healthcare providers to submit claims and receive payments, causing an estimated $100 million in daily deferred patient care revenue over a period exceeding three weeks. The attack affected various operations, including insurance verification, prior authorization processes, clinical information exchange, and e-prescription services. The aftermath of the attack persisted, with reported continuing challenges and disruptions despite a hefty ransom payment allegedly made.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 5/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: The ransomware attack on Change Healthcare has caused significant disruption within the healthcare sector, with UnitedHealth estimating breach-related costs around $1.6 billion. The breach has hindered financial recovery and operational functionality for providers relying on Change Healthcare's services, leading to a call for transparent reporting obligations and a plea for guidance from the OCR regarding HIPAA breach reporting requirements. This incident has underscored the need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.

Change Healthcare
Ransomware
Severity: 100
Impact:
Seen: 5/2024
Blog:
Rankiteo Explanation
Attack affecting organizations offering vital services (healthcare sector), potential to disrupt healthcare services and patient care, with substantial financial implications.

Description: The ransomware attack on Change Healthcare reported on February 21st has caused substantial disruption across the healthcare sector, with the breach costs estimated by UnitedHealth, Change's parent company, to potentially reach $1.6 billion. The breach has drastically affected providers relying on Change Healthcare's services, leading to financial distress, with a clear recovery path not yet in sight. The repercussions of the breach have been amplified by the lack of definitive information and guidance on reporting responsibilities, causing unease among affected healthcare providers.

UnitedHealth Group, Optum Inc., and Change Healthcare
Ransomware
Severity: 100
Impact: 4
Seen: 3/2024
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: UnitedHealth Group experienced a ransomware attack by the hacking group BlackCat on Feb. 21, leading to severe delays in processing claims and revenue cycle services, which pushed many healthcare providers towards financial distress and potential bankruptcy. Providers have filed lawsuits for cybersecurity negligence, with claims that sensitive data is now with cybercriminals. UnitedHealth Group paid over $2 billion to impacted providers while the status of compromised data and cooperation with the cyber threat actor remains unclear.

Change Healthcare (UnitedHealth Group)
Ransomware
Severity: 100
Impact: 5
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare**, a critical division of UnitedHealth Group, fell victim to a devastating **BlackCat/ALPHV ransomware attack**. The assault crippled its systems, disrupting prescription processing, medical claims, and payment operations across the U.S. healthcare sector. Over **100 million individuals** were impacted due to service outages, with hospitals, pharmacies, and insurers facing delays in billing, reimbursements, and patient care. The company paid a **$22 million ransom**, but total financial losses ballooned to an estimated **$2 billion**, factoring in operational downtime, recovery costs, and reputational damage. The attack exposed vulnerabilities in third-party supply chains, as the breach originated from compromised credentials in a connected vendor system. Regulatory scrutiny intensified, with federal investigations probing compliance failures under **HIPAA** and cybersecurity negligence. The incident underscored the escalating threat of **RaaS (Ransomware-as-a-Service)** models, where affiliate hackers leverage sophisticated tools to target high-value sectors like healthcare, exploiting systemic interdependencies for maximum disruption.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 2/2024
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In February 2024, **Change Healthcare**, a subsidiary of UnitedHealth Group, fell victim to a **ransomware attack** orchestrated by the **BlackCat (ALPHV) cybercrime group**. The breach compromised the **protected health information (PHI) of approximately 192.7 million individuals**, making it one of the largest healthcare data breaches in U.S. history. The attack disrupted critical operations, including **pharmacy services, claims processing, and electronic prescribing systems**, causing widespread delays in patient care and financial transactions across the healthcare sector. The incident forced Change Healthcare to **shut down multiple systems** to contain the breach, leading to **operational outages** and **financial losses** for healthcare providers, pharmacies, and insurers reliant on its infrastructure. The company reportedly **paid a $22 million ransom** to restore systems, though data exfiltration had already occurred. The breach exposed **sensitive patient data**, including medical records, insurance details, and personally identifiable information (PII), raising concerns over **long-term identity theft and fraud risks**. Regulatory investigations by the **U.S. Department of Health and Human Services (HHS)** and potential **class-action lawsuits** further compounded the fallout, underscoring systemic vulnerabilities in healthcare cybersecurity.

Change Healthcare
Ransomware
Severity: 100
Impact: 5
Seen: 6/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: Change Healthcare, a critical healthcare technology provider, fell victim to a **SocGholish (FakeUpdates)**-driven cyberattack in early 2025, facilitated by the **RansomHub ransomware**. The attack originated from malicious Google Ads impersonating **Kaiser Permanente’s HR portal**, exploiting SocGholish’s Malware-as-a-Service (MaaS) infrastructure. The breach led to severe operational disruptions, including compromised patient data, financial records, and healthcare service outages. The incident was part of a broader campaign targeting healthcare entities, with **Evil Corp (a Russian cybercrime group linked to GRU Unit 29155)** involved in distributing payloads like **Raspberry Robin worm**. The attack crippled Change Healthcare’s systems, delaying medical treatments, disrupting payment processing for hospitals and pharmacies (e.g., **Rite Aid**), and exposing sensitive personal and financial information of patients and employees. The fallout included **ransom demands**, regulatory scrutiny, and long-term reputational damage, underscoring the threat’s capacity to weaponize trusted digital infrastructure for large-scale exploitation.

Ailogo

Change Healthcare Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Change Healthcare

Incidents vs IT Services and IT Consulting Industry Average (This Year)

Change Healthcare has 825.93% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Change Healthcare has 681.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types Change Healthcare vs IT Services and IT Consulting Industry Avg (This Year)

Change Healthcare reported 5 incidents this year: 0 cyber attacks, 5 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Change Healthcare (X = Date, Y = Severity)

Change Healthcare cyber incidents detection timeline including parent company and subsidiaries

Change Healthcare Company Subsidiaries

SubsidiaryImage

Change Healthcare is now a part of Optum. To stay up-to-date with news please connect with us at Optum.com. At both Optum and Change Healthcare, our teams strive to help people live healthier lives and help the health system work better for everyone.

Loading...
similarCompanies

Change Healthcare Similar Companies

Globant

At Globant, we create the digitally-native products that people love. We bridge the gap between businesses and consumers through technology and creativity, leveraging our experience as an AI powerhouse. We dare to digitally transform organizations and strive to delight their customers. - We have mo

Carelon Global Solutions India

Carelon Global Solutions makes healthcare operations more practical, effective, and efficient. Our global team of more than 25K innovators drives growth, delivers exceptional support, and develops digital tools specifically for health plans, providers, and systems. Each day, our partners and experts

LexisNexis

LexisNexis Legal & Professional is a leading global provider of legal, regulatory and business information and analytics that help customers increase productivity, improve decision-making and outcomes, and advance the rule of law around the world. We help lawyers win cases, manage their work more e

FPT Software

FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. The company champions complex business opportunities and challenges with its world-class servic

iSoftStone is a global IT service and consulting company‚ÄØthat creates value and drives success through technology solutions, service excellence, and digital innovation. We specialize in web and application development, software testing and support, data and content management, digital experience,

Ricoh USA, Inc.

At Ricoh, we bring people, processes, and technology together to make information work for you. We unlock the power of information so organizations can unlock the full potential of their people. We're a leader in information management and digital services, creating competitive advantage for over 1.

NTT DATA, Inc.

NTT DATA, Inc. is a trusted global innovator of business and technology services. We're committed to helping clients innovate, optimize and transform for long-term success. Our R&D investments help organizations and society move confidently and sustainably into the digital future. As a Global Top Em

LTIMindtree is a global technology consulting and digital solutions company that enables enterprises across industries to reimagine business models, accelerate innovation, and maximize growth by harnessing digital technologies. As a digital transformation partner to more than 700 clients, LTIMindtre

Luxoft

Luxoft, a DXC Technology Company (NYSE: DXC), is a digital strategy and software engineering firm providing bespoke technology solutions that drive business change for customers the world over. Acquired by U.S. company DXC Technology in 2019, Luxoft is a global operation in 44 cities and 21 countrie

newsone

Change Healthcare CyberSecurity News

November 17, 2025 11:15 PM
Nebraska AG’s Lawsuit Against Change Healthcare Survives Motion to Dismiss

A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...

November 15, 2025 03:04 AM
Nebraska’s lawsuit against Optum and Change Healthcare can move forward, judge rules

The UnitedHealth Group subsidiaries had attempted to have the case dismissed. However, a court rejected the motion.

November 12, 2025 10:05 PM
The Change Healthcare cybersecurity breach: Impact on healthcare providers

What US healthcare operations need to know about the incident, its timeline, the pending litigation, and potential claims adjudication and...

October 26, 2025 07:00 AM
Healthcare Data Breach Statistics

In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.

September 23, 2025 07:00 AM
Healthcare Cybersecurity: The Urgency Of Now

Healthcare exists at the intersection of trust and vulnerability. Every medical record, test result, and insurance claim is more than just...

August 27, 2025 07:00 AM
Healthcare's shift to sound cybersecurity measures

The shift from reactive security postures to proactive is in direct response to an ever-rising wave of attacks healthcare industry organizations...

August 26, 2025 07:00 AM
How Many Cyber Attacks Occur Each Day? (2025)

In 2024, there were 600 million cybersecurity attacks each day. And the risk of cyberattacks has increased substantially in recent years due...

August 08, 2025 07:00 AM
Senators Demand Answers from UnitedHealth After Second Massive Data Breach in a Year

Two U.S. senators have written to UnitedHealth Group (UHG) CEO Stephen J. Hemsley demanding answers about cybersecurity and the response to...

August 06, 2025 07:00 AM
Senators criticize UnitedHealth Group's cybersecurity after Episource breach

U.S. Senators Bill Cassidy, R-La., and Maggie Hassan, D-N.H., have sent a letter to UnitedHealth Group CEO Stephen Hemsley expressing...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Change Healthcare CyberSecurity History Information

Official Website of Change Healthcare

The official website of Change Healthcare is http://www.changehealthcare.com.

Change Healthcare’s AI-Generated Cybersecurity Score

According to Rankiteo, Change Healthcare’s AI-generated cybersecurity score is 100, reflecting their Critical security posture.

How many security badges does Change Healthcare’ have ?

According to Rankiteo, Change Healthcare currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Change Healthcare have SOC 2 Type 1 certification ?

According to Rankiteo, Change Healthcare is not certified under SOC 2 Type 1.

Does Change Healthcare have SOC 2 Type 2 certification ?

According to Rankiteo, Change Healthcare does not hold a SOC 2 Type 2 certification.

Does Change Healthcare comply with GDPR ?

According to Rankiteo, Change Healthcare is not listed as GDPR compliant.

Does Change Healthcare have PCI DSS certification ?

According to Rankiteo, Change Healthcare does not currently maintain PCI DSS compliance.

Does Change Healthcare comply with HIPAA ?

According to Rankiteo, Change Healthcare is not compliant with HIPAA regulations.

Does Change Healthcare have ISO 27001 certification ?

According to Rankiteo,Change Healthcare is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Change Healthcare

Change Healthcare operates primarily in the IT Services and IT Consulting industry.

Number of Employees at Change Healthcare

Change Healthcare employs approximately 4,876 people worldwide.

Subsidiaries Owned by Change Healthcare

Change Healthcare presently has no subsidiaries across any sectors.

Change Healthcare’s LinkedIn Followers

Change Healthcare’s official LinkedIn profile has approximately 146,856 followers.

NAICS Classification of Change Healthcare

Change Healthcare is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

Change Healthcare’s Presence on Crunchbase

No, Change Healthcare does not have a profile on Crunchbase.

Change Healthcare’s Presence on LinkedIn

Yes, Change Healthcare maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/change-healthcare.

Cybersecurity Incidents Involving Change Healthcare

As of November 30, 2025, Rankiteo reports that Change Healthcare has experienced 32 cybersecurity incidents.

Number of Peer and Competitor Companies

Change Healthcare has an estimated 36,514 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Change Healthcare ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack, Breach and Ransomware.

What was the total financial impact of these incidents on Change Healthcare ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $26.49 billion.

How does Change Healthcare detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with disconnecting its systems, and recovery measures with ongoing restoration efforts, and recovery measures with cms launched chopd program, and recovery measures with cms initiated the accelerated and advance payment (aap) program (chopd) to mitigate cash flow problems, and and and incident response plan activated with law enforcement takedowns (e.g., lockbit, alphv, hive), and third party assistance with malwarebytes, third party assistance with flashpoint, third party assistance with recorded future, third party assistance with trellix, and and containment measures with infrastructure disruption (e.g., lockbit takedown), containment measures with international ransomware task force operations, and communication strategy with public reports by cybersecurity firms, communication strategy with media coverage of gang fragmentation, and incident response plan activated with change healthcare (2024, unitedhealth group), incident response plan activated with cdk global (2024, $25m ransom paid), incident response plan activated with colonial pipeline (2021, $4.4m ransom paid), incident response plan activated with jbs (2021, $11m ransom paid), incident response plan activated with cognizant (2020, $50m–$70m losses), incident response plan activated with baltimore (2019, $18m recovery cost), incident response plan activated with commonspirit health (2022, $160m losses), incident response plan activated with medibank (2022, 9.7m records at risk), and third party assistance with cybersecurity firms (e.g., for colonial pipeline, change healthcare), third party assistance with doj/europol (qakbot takedown, 2025), third party assistance with insurance providers (e.g., syracuse city school district, 2019), and law enforcement notified with colonial pipeline (fbi recovered $2.3m in bitcoin), law enforcement notified with qakbot (doj seized $24m, 2025), law enforcement notified with danabot (16 russian nationals indicted, 2025), law enforcement notified with washington dc police (babuk leak, 2021), and containment measures with network isolation (e.g., change healthcare, cdk global), containment measures with system shutdowns (e.g., baltimore, 2019), containment measures with disabling rdp access (common in smbs), containment measures with patching zero-days (e.g., moveit, 2023), and remediation measures with data recovery from backups (e.g., sky lakes medical center, 7 months), remediation measures with decryption tools (e.g., wannacry kill switch, 2017), remediation measures with rebuilding systems (e.g., garmin, 2020), remediation measures with credential resets (e.g., after stolen credentials used), and recovery measures with immutable backups (4x faster recovery, 50% less likely to pay ransom), recovery measures with cyber insurance claims (58% of large-value claims in h1 2024), recovery measures with manual processes (e.g., university hospital center zagreb, 2024), recovery measures with third-party forensic investigations, and communication strategy with public disclosures (e.g., colonial pipeline, change healthcare), communication strategy with customer notifications (e.g., patelco credit union, healthcorps), communication strategy with regulatory filings (e.g., sensata technologies, sec), communication strategy with press releases (e.g., british library, 2023), and network segmentation with recommended in mitigation strategies, and enhanced monitoring with recommended post-incident, and third party assistance with cybersecurity firms (e.g., integrity security services, health catalyst), third party assistance with regulatory bodies (hhs, fda, eu agencies), and containment measures with deployment of ai-based threat detection (e.g., blueprint protect™), containment measures with network segmentation for iomt devices, containment measures with endpoint security upgrades, and remediation measures with patch management for vulnerable medical devices, remediation measures with enhanced iam and encryption solutions, remediation measures with dark web monitoring for stolen data, and communication strategy with public disclosures (e.g., hhs breach reports), communication strategy with patient notification campaigns (where applicable), and network segmentation with prioritized for iomt ecosystems, and enhanced monitoring with ai-driven real-time threat analysis, and third party assistance with cyber insurance providers (e.g., resilience), third party assistance with threat intelligence sharing, and containment measures with isolation of compromised vendor systems, containment measures with disabling affected accounts (post-phishing), and remediation measures with restoration from backups (ransomware), remediation measures with mfa reinforcement, remediation measures with vendor security audits, and recovery measures with tested recovery plans (reduced ransom payments to 14% in h1 2025), recovery measures with supply chain diversification, and communication strategy with stakeholder advisories on vendor risks, communication strategy with employee training on ai-powered phishing, and adaptive behavioral waf with recommended, and network segmentation with recommended (zero trust for vendors), and enhanced monitoring with behavioral anomaly detection, enhanced monitoring with ai-powered threat detection for social engineering, and and remediation measures with credit monitoring and identity protection services offered to all 855,787 affected individuals, and communication strategy with breach notification letters to affected individuals, communication strategy with public disclosures (e.g., retina group’s report to state ags and hhs), communication strategy with pdf letter posted on mab’s website, and incident response plan activated with change healthcare: sec 8-k filing, ransom payment, incident response plan activated with ascension: emergency care diversions, forensic investigation, incident response plan activated with m&s/co-op/harrods: system shutdowns, customer notifications, incident response plan activated with at&t: dark web monitoring, credit protection offers, and third party assistance with cybersecurity firms (forensics, recovery), third party assistance with legal counsel (regulatory compliance), third party assistance with pr agencies (crisis communications), and law enforcement notified with fbi (blackcat/alphv, scattered spider), law enforcement notified with uk national cyber security centre (m&s/co-op/harrods), law enforcement notified with interpol/europol (cross-border attacks), and containment measures with network isolation (ascension, retailers), containment measures with endpoint detection/response (edr) deployment, containment measures with dark web monitoring (at&t), containment measures with password resets (m&s customers), and remediation measures with patch management (iot, zero-day vulnerabilities), remediation measures with credential rotation (compromised accounts), remediation measures with data encryption enhancements, remediation measures with legacy system upgrades, and recovery measures with backup restoration (ransomware victims), recovery measures with customer compensation (credit monitoring), recovery measures with operational continuity planning, and communication strategy with public disclosures (sec filings, press releases), communication strategy with customer advisories (at&t, m&s), communication strategy with transparency reports (healthcare breaches), and network segmentation with implemented post-breach (ascension, retailers), and enhanced monitoring with siem upgrades (change healthcare), enhanced monitoring with threat intelligence feeds (at&t), and third party assistance with trustwave spiderlabs (research/threat intelligence), and incident response plan activated with likely (given scale of breach), and remediation measures with ransom payment (millions), remediation measures with patch deployment for domain controllers (post-breach), remediation measures with potential review of ad security posture..

Incident Details

Can you provide details on each incident ?

Incident : Cyber-Attack

Title: Change Healthcare Cyber-Attack

Description: Change Healthcare, part of Optum and a subsidiary of UnitedHealth Group, experienced a significant cyber-attack that led to disruptions in prescription issuance. The attack began to surface on February 21, when certain applications became unavailable due to what was later identified as a network interruption caused by a cybersecurity issue. The company took measures to mitigate the impact by disconnecting its systems upon recognizing an external threat. The disruptions have affected the healthcare transactions of approximately one-third of US patients, given the company's substantial role in handling 15 billion transactions annually. This situation underscores the vulnerability of healthcare providers to cyber threats and the potential for such attacks to significantly delay medical treatments and prescriptions, affecting both the company's operations and patient care.

Date Detected: 2023-02-21

Type: Cyber-Attack

Incident : Ransomware Attack

Title: Change Healthcare Ransomware Attack

Description: In February, Change Healthcare suffered a ransomware attack that disrupted its services, impacting cash flow for Medicare providers, including hospitals and pharmacies. The CMS initiated the CHOPD program to alleviate the financial strain on affected parties by distributing over $2.55 billion to Part A providers and more than $717.18 million to Part B suppliers. The swift mitigation efforts by CMS ensured the continued delivery of essential patient care amidst one of the largest cyberattacks targeting the U.S. healthcare sector. Notably, CMS has recouped most of the advance payments, and normal billing processes are now reinstated for providers.

Date Detected: February

Type: Ransomware Attack

Incident : Ransomware

Title: Ransomware Attack on UnitedHealth Group

Description: UnitedHealth Group experienced a ransomware attack by the hacking group BlackCat on Feb. 21, leading to severe delays in processing claims and revenue cycle services, which pushed many healthcare providers towards financial distress and potential bankruptcy. Providers have filed lawsuits for cybersecurity negligence, with claims that sensitive data is now with cybercriminals. UnitedHealth Group paid over $2 billion to impacted providers while the status of compromised data and cooperation with the cyber threat actor remains unclear.

Date Detected: 2023-02-21

Type: Ransomware

Threat Actor: BlackCat

Incident : Cyber Incident

Title: Cyber Incident at Change Healthcare Involving AI Technologies

Description: Change Healthcare experienced a cybersecurity incident involving AI technologies that potentially exceeded anticipated risks. The event showcased the vulnerability of innovative systems to unforeseen threats, highlighting the lack of preparedness in evolving and securing these technologies. The incident served as a stark reminder that without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.

Type: Cyber Incident

Vulnerability Exploited: AI technologies

Incident : Cyberattack

Title: Change Healthcare Cyberattack

Description: The Change Healthcare cyberattack has led to a significant disruption in the claims processing system affecting over 1,850 hospitals and 250,000 physicians. The direct impact has been a staggering $6.3 billion cash flow deficit since the breach, as reported through March 9. The inability to process claims digitally has caused a decline in cash and potential long-term consequences such as medical necessity denials and prior authorization denials due to delayed claims. Healthcare providers are struggling to cope with the manpower required for paper claims and the unsustainable financial pressure during the interim of restoring the compromised system. The lack of adequate action from payers exacerbates the situation, making it critical to reassess cybersecurity measures in the healthcare industry.

Type: Cyberattack

Incident : Cyberattack

Title: Cyberattack on Change Healthcare

Description: Change Healthcare experienced a cyberattack, causing significant service disruption. Health systems relying on its services for medical billing and pre-authorizations were forced to delay procedures and prescriptions, resulting in financial strain, including doctor and nurse salary payment issues, with some pushed towards receivership. The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.

Type: Cyberattack

Incident : Ransomware Attack

Title: Ransomware Attack on Change Healthcare

Description: A ransomware attack on Change Healthcare disrupted healthcare services, including insurance eligibility checks and prior authorization requests, impacting providers and patients. Restoration efforts were ongoing as of March 31.

Date Detected: 2023-02-21

Type: Ransomware Attack

Incident : Data Breach

Title: Change Healthcare Data Breach

Description: The Change Healthcare data breach in February 2024 significantly impacted over 100 million individuals, marking the largest-ever healthcare data breach in the US. An extensive cyber attack disrupted IT operations, affecting numerous applications, pharmacies, and healthcare providers. Sensitive personal and medical information such as names, Social Security numbers, and treatment details were compromised. The incident led to substantial costs, with UnitedHealth Group reporting $1.1 billion in related expenses. Despite ransom payments, issues with the hacker group BlackCat/ALPHV and subsequent attempts by RansomHub to extort the company exacerbated the situation.

Date Detected: February 2024

Type: Data Breach

Threat Actor: BlackCat/ALPHVRansomHub

Motivation: Financial Gain

Incident : Ransomware Attack

Title: Change Healthcare Ransomware Attack

Description: Change Healthcare, a major medical billing processor in the US owned by UnitedHealth, suffered a ransomware attack by ALPHV/BlackCat gang, impacting over 100 million people. The breach involved personal data including phone numbers, addresses, financial information, health records, diagnoses, prescriptions, and treatment details. The company paid a $22 million ransom, but the aftermath saw an increased rate of healthcare-focused cyberattacks, along with lawsuits and significant blowback for compromised security measures.

Date Detected: February 2024

Type: Ransomware Attack

Threat Actor: ALPHV/BlackCat gang

Motivation: Financial Gain

Incident : Data Breach, Ransomware

Title: Change Healthcare Data Breach

Description: The Change Healthcare data breach due to a ransomware attack has introduced significant disruptions across the healthcare sector, with UnitedHealth, the parent company, estimating potential costs to be around $1.6 billion. The breach prompted concerns about reporting responsibilities under HIPAA, with provider organizations urging the Office for Civil Rights for clarity and a declaration of sole responsibility resting with Change Healthcare for breach notifications. UnitedHealth has offered support and to undertake notification responsibilities, yet provider organizations seek OCR validation to ensure legal compliance falls on UnitedHealth Group/Change Healthcare as the affected covered entity.

Type: Data Breach, Ransomware

Incident : Cyberattack

Title: Massive Cyberattack on Change Healthcare

Description: Change Healthcare, a subsidiary of UnitedHealth, faced a massive cyberattack which disrupted billions of medical claims processing and cost the company $3.1 billion. Dubbed the most significant attack in U.S. healthcare history, it led to extensive disruptions in the healthcare sector. The attack's magnitude and repercussions across interconnected systems underscore its potential to ripple through and impact an entire industry.

Type: Cyberattack

Incident : Data Breach, Ransomware

Title: Change Healthcare Data Breach

Description: Change Healthcare, a major healthcare payment processing firm, experienced a catastrophic data breach affecting 190 million individuals, as of the latest update by UnitedHealth Group, its parent company. This breach resulted in the loss of sensitive data and financial repercussions amounting to $3.1 billion. Initially reported in February 2024, the breach numbers escalated by 90 million by January 2025. Noted as the worst healthcare data breach of 2024, the incident has led to multiple lawsuits against UnitedHealth Group. ALPHV/Blackcat, a notorious ransomware group, was identified as responsible for the attack.

Date Detected: February 2024

Type: Data Breach, Ransomware

Threat Actor: ALPHV/Blackcat

Incident : Ransomware

Title: Ransomware Attack on Change Healthcare

Description: The ransomware attack on Change Healthcare has caused significant disruption within the healthcare sector, with UnitedHealth estimating breach-related costs around $1.6 billion. The breach has hindered financial recovery and operational functionality for providers relying on Change Healthcare's services, leading to a call for transparent reporting obligations and a plea for guidance from the OCR regarding HIPAA breach reporting requirements. This incident has underscored the need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.

Type: Ransomware

Incident : Ransomware

Title: Ransomware Attack on Change Healthcare

Description: Change Healthcare, a subsidiary of Optum Inc and part of UnitedHealth Group, faced a substantial ransomware attack that disabled many of its electronic systems. This disruption halted the ability of thousands of healthcare providers to submit claims and receive payments, causing an estimated $100 million in daily deferred patient care revenue over a period exceeding three weeks. The attack affected various operations, including insurance verification, prior authorization processes, clinical information exchange, and e-prescription services. The aftermath of the attack persisted, with reported continuing challenges and disruptions despite a hefty ransom payment allegedly made.

Type: Ransomware

Motivation: Financial

Incident : Cyberattack

Title: Change Healthcare Cyberattack

Description: Change Healthcare experienced a cyberattack leading to widespread disruption of medical billing and pre-authorization services, affecting hundreds of health systems across the United States. The incident resulted in delays in medical procedures, restricted access to prescription medications, financial strains on health systems, and some reportedly facing receivership. The consolidation in healthcare has resulted in fewer alternatives for such services, emphasizing the failures and risks associated with creating single points of failure within critical healthcare infrastructure.

Type: Cyberattack

Incident : Ransomware Attack

Title: Change Healthcare Ransomware Attack

Description: Change Healthcare experienced a ransomware attack in February that resulted in significant cash flow disruptions for Medicare providers and suppliers, including hospitals, pharmacies, and physicians. The Centers for Medicare and Medicaid Services (CMS) responded by launching the Change Healthcare/Optum Payment Disruption (CHOPD) program to provide accelerated and advance payments to affected parties. More than $3.26 billion was disbursed to ensure continued patient care. CMS has recovered the majority of these payments as providers resumed normal Medicare billing. This incident highlights the potential financial and operational impacts of ransomware on the healthcare sector.

Date Detected: February

Type: Ransomware Attack

Motivation: Financial Disruption

Incident : Data Breach, Ransomware

Title: Change Healthcare Data Breach

Description: Change Healthcare suffered a significant cyber-attack impacting approximately 190 million individuals, a number revised from an earlier report of 100 million in July. As a major healthcare payment processing firm in the US, the breach's scale and the sensitive nature of the compromised data classify it as one of the most severe healthcare data breaches in 2024. The financial repercussions are substantial, with estimated costs reaching $3.1 billion. ALPHV/Blackcat ransomware group has been implicated in the breach. The incident has led to multiple lawsuits against UnitedHealth Group, Change Healthcare's parent company.

Type: Data Breach, Ransomware

Threat Actor: ALPHV/Blackcat ransomware group

Incident : Ransomware Attack

Title: Ransomware Attack on Change Healthcare

Description: The ransomware attack on Change Healthcare reported on February 21st has caused substantial disruption across the healthcare sector, with the breach costs estimated by UnitedHealth, Change's parent company, to potentially reach $1.6 billion. The breach has drastically affected providers relying on Change Healthcare's services, leading to financial distress, with a clear recovery path not yet in sight. The repercussions of the breach have been amplified by the lack of definitive information and guidance on reporting responsibilities, causing unease among affected healthcare providers.

Date Publicly Disclosed: 2024-02-21

Type: Ransomware Attack

Incident : Ransomware Attack

Title: Change Healthcare/Optum Ransomware Attack

Description: In February, Change Healthcare/Optum experienced a ransomware attack leading to significant financial and operational disruptions across the U.S. healthcare industry. The Centers for Medicare and Medicaid Services (CMS) initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems for affected Medicare providers and suppliers. Over $2.55 billion in accelerated payments were distributed to Part A providers, and more than $717.18 million in advance payments went to Part B suppliers. Recovery efforts by CMS have been effective, with over 96 percent of CHOPD payments recouped and normal Medicare billing resumed.

Date Detected: February

Type: Ransomware Attack

Incident : Data Breach

Title: Change Healthcare Inc. Data Breach

Description: The Washington Attorney General's Office reported a data breach involving Change Healthcare Inc. on April 18, 2025. The breach, which occurred between February 17 and February 20, 2024, potentially affected approximately 3,175,442 individuals, with compromised data including personal and health information.

Date Detected: 2024-02-17

Date Publicly Disclosed: 2025-04-18

Type: Data Breach

Incident : Data Breach

Title: Change Healthcare Inc. Data Breach

Description: A data breach involving Change Healthcare Inc. was reported by the California Attorney General on August 3, 2024. The breach occurred between February 12, 2024, and February 22, 2024, potentially affecting personal information including names, addresses, dates of birth, health insurance data, and Social Security numbers.

Date Detected: 2024-02-12

Date Publicly Disclosed: 2024-08-03

Type: Data Breach

Incident : Ransomware

Title: Ransomware Attack on Change Healthcare

Description: A major ransomware attack on Change Healthcare in February 2024 disrupted healthcare services across the U.S. and exposed 190 million records. The incident highlights the vulnerabilities in the healthcare sector, particularly due to third-party risks and human error.

Date Detected: February 2024

Type: Ransomware

Threat Actor: BlackCatCl0pLockbitMedusaInterlock

Motivation: Financial gain

Incident : ransomware

Title: Change Healthcare Ransomware Attack (2024)

Description: Change Healthcare suffered a significant ransomware attack in February 2024. The breach exploited a server lacking multi-factor authentication (MFA), allowing hackers to access sensitive data and disrupt operations. The attack compromised personal health information (PHI) of over 100 million individuals, marking it as one of the largest healthcare data breaches in U.S. history. The total cost of the response is estimated between $2.3 billion and $2.45 billion. The incident prompted investigations by the U.S. Department of Health and Human Services (HHS) and increased scrutiny of cybersecurity practices in the healthcare sector.

Date Detected: 2024-02

Date Publicly Disclosed: 2024-02

Type: ransomware

Attack Vector: Exploited server lacking multi-factor authentication (MFA)

Vulnerability Exploited: Lack of multi-factor authentication (MFA) on a critical server

Motivation: financial gaindata exfiltration

Incident : Ransomware Proliferation

Title: Fragmentation and Proliferation of Ransomware Gangs (2024–2025)

Description: The ransomware ecosystem has seen a significant splintering, with a surge in new gangs emerging following law enforcement takedowns of major operations like LockBit, BlackCat/AlphV, and Hive. Between July 2024 and June 2025, MalwareBytes tracked 41 new ransomware groups, bringing the total to over 60 active gangs—the highest number recorded. The fragmentation is driven by factors such as leaked ransomware source code (e.g., SafePay sharing code with LockBit), distrust among affiliates, and the commoditization of malware tools. Law enforcement successes have disrupted large RaaS (Ransomware-as-a-Service) operations but failed to secure arrests, allowing threat actors to rebrand or form new groups. The top-10 most active groups now account for only 50% of attacks (down from 69% in 2022), reflecting decentralization. Infighting, exit scams, and cross-group data leaks (e.g., Change Healthcare attack data offered via RansomHub after AlphV's takedown) highlight the volatile and distrustful state of the ecosystem. Experts note that the barrier to entry has lowered due to AI, leaked tools, and initial access brokers, enabling smaller, entrepreneurial groups to operate independently.

Date Publicly Disclosed: 2025-06-30

Type: Ransomware Proliferation

Threat Actor: Splintered LockBit affiliatesRebranded AlphV/BlackCat membersNew entrepreneurial ransomware groups (e.g., SafePay, Qilin, Akira, RansomHub)Initial Access Brokers (IABs)Former Conti/REvil affiliates

Motivation: Financial gainAvoidance of law enforcement scrutinyDistrust in centralized RaaS operationsExploitation of leaked ransomware codeEntrepreneurial independence

Incident : ransomware

Title: Ransomware Attacks Overview (2011–2025)

Description: The last decade has seen a steep increase in ransomware attacks across healthcare, medicine, and supply chains. Threat actors now use RaaS, triple extortion, supply chain attacks, and phishing to coerce companies into paying ransoms. Notable incidents include WannaCry (2017), Colonial Pipeline (2021), MOVEit (2023), Change Healthcare (2024), and CDK Global (2024). Ransom payments and financial losses have surged, with the average ransom payment reaching $2.73M in 2024. Industries like healthcare, education, and financial services remain top targets, while AI-driven phishing and zero-day exploits are rising trends.

Type: ransomware

Attack Vector: phishing emails (67% of attacks in North America)software vulnerabilities (32% of attacks)RDP compromise (30% in SMBs)stolen credentials (29%)unmanaged third-party integrations (25%)zero-day exploits (e.g., MOVEit)RaaS (Ransomware-as-a-Service)botnet malware (e.g., Qakbot, DanaBot)AI-generated phishing luresunpatched systems

Vulnerability Exploited: EternalBlue (WannaCry, 2017)unpatched Windows SMB flaw (WannaCry)MOVEit Transfer zero-day (Clop gang, 2023)third-party compromises (35.5% of breaches in 2024)200+ vulnerabilities in CISA’s KEV catalog (2024–2025)

Threat Actor: LockBit (most prolific in 2025, $91M in payments)RansomHub (most active in 2024–2025)Clop (MOVEit breach, 2023)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, Okta, 2022)Babuk (Washington DC Police, 2021)Scattered Spider (Marks & Spencer, 2025)Russian-linked groups (e.g., DanaBot, Qakbot)State-sponsored actors (e.g., 16 Russian nationals indicted for DanaBot)

Motivation: financial gain (ransom payments, data extortion)disruption of critical infrastructure (e.g., healthcare, supply chains)data theft for dark web sales (e.g., PII, medical records)espionage (e.g., state-linked DanaBot attacks)reputation damage (e.g., leaking sensitive data)

Incident : Cyberattack Trend Analysis

Title: Rising Cyberattacks on IoT-Enabled Medical Devices Fueling Growth in Medical Device Security Market

Description: The global medical device security market is experiencing rapid growth (CAGR 8.8%, 2025–2032) due to increasing cyberattacks on healthcare systems and IoT-enabled medical devices. Key incidents include the Change Healthcare ransomware attack (Feb 2024, 192.7M records compromised) and 307 HHS-investigated breaches in H1 2025. High implementation costs and AI-driven threats (e.g., automated phishing, ransomware) are major challenges, while AI-based security solutions (e.g., Health Catalyst’s BluePrint Protect™) and cloud-based protections are emerging trends. Regulatory compliance and IoMT expansion are driving demand for encryption, IAM, and endpoint security solutions.

Date Publicly Disclosed: 2025-09-04

Type: Cyberattack Trend Analysis

Attack Vector: Ransomware (e.g., Change Healthcare, Feb 2024)AI-driven automated attacks (phishing, vulnerability scanning)IoMT/Connected Device ExploitationData Breaches (23M+ records in first 5 months of 2025)

Vulnerability Exploited: Unsecured IoT/wearable medical devices (34.5% market share in 2025)Legacy system vulnerabilities in healthcare ITLack of network segmentation in medical device ecosystemsWeak identity and access management (IAM) protocols

Threat Actor: Cybercriminal groups leveraging AI tools (e.g., Claude Code)Ransomware operators targeting healthcare (e.g., Change Healthcare attackers)Initial Access Brokers (IABs) selling medical device access on dark web

Motivation: Financial gain (ransomware, data theft for dark web sales)Espionage (theft of sensitive health data)Disruption of critical healthcare services

Incident : Ransomware

Title: Midyear 2025 Cyber Risk Landscape Analysis: Ransomware, Vendor Disruptions, and AI-Powered Attacks

Description: A midyear analysis from Resilience highlights how ransomware, third-party disruptions, and AI-powered attacks are reshaping the cyber risk landscape in 2025. The report, based on cyber insurance claims, details the financial impact of attacks, emerging vulnerabilities, and trends affecting organizations across sectors. Key findings include the persistence of vendor-related risks (15% of claims in H1 2025), the dominance of AI-enhanced social engineering (57% of incurred claims, 60% of total losses), and the increasing severity of ransomware attacks (average claim of $1.18M, up 17% from 2024). High-profile incidents like those affecting CDK Global and Change Healthcare demonstrate the cascading impact of single points of failure in supply chains. The report emphasizes the need for dynamic vendor monitoring, advanced threat detection, and reinforced fundamentals to mitigate AI-amplified social engineering risks.

Date Publicly Disclosed: 2025-06-30

Type: Ransomware

Attack Vector: Phishing (AI-enhanced)Impersonation (voice synthesis, browser-based)Vendor Supply Chain CompromiseDouble Extortion (ransomware + data theft)

Vulnerability Exploited: Human error (social engineering susceptibility)Weak vendor security controlsInsufficient multi-factor authentication (MFA) protectionsLack of continuous vendor monitoringGaps in anomaly detection for behavioral baselines

Motivation: Financial gain (ransomware, extortion)Data theft for resale/exploitationDisruption of operations (supply chain impact)

Incident : Ransomware

Title: None

Description: None

Type: Ransomware

Incident : Data Breach

Title: Massive Healthcare Data Breaches Affecting Nearly a Million Americans in Three Separate Incidents

Description: Cybercriminals executed three major digital burglaries at US healthcare providers—Goshen Medical Center (North Carolina), Retina Group of Florida, and Medical Associates of Brevard (Florida)—compromising the personal and medical data of nearly 855,787 Americans within a week. The breaches exposed sensitive information including SSNs, driver’s license numbers, medical records, and financial data. While healthcare delivery was reportedly unaffected, the incidents underscore the persistent targeting of the sector by threat actors, with historical parallels to high-impact attacks like the 2024 Change Healthcare breach (100M records, $2B+ costs) and Qilin’s ransomware assault on London hospitals (resulting in delayed surgeries and a confirmed death).

Date Detected: 2024-03-04 (Goshen Medical Center)2024-11-09 (Retina Group of Florida)

Date Publicly Disclosed: 2024-09-16 (Retina Group of Florida)

Type: Data Breach

Motivation: Data TheftFinancial Gain (potential sale on dark web)

Incident : Data Breach

Title: Cybersecurity Threats and Incident Trends (2024-2025)

Description: A comprehensive report on the latest cybersecurity threats, attack statistics, and notable incidents in 2024-2025. Highlights include the rise in ransomware, phishing, malware, and IoT attacks, with significant financial and operational impacts across industries. Key incidents include breaches at Change Healthcare, AT&T, Ascension, M&S, Co-op, and Harrods, alongside broader trends in attack vectors, costs, and regulatory compliance.

Date Publicly Disclosed: 2024-2025

Type: Data Breach

Attack Vector: Phishing (Email, Vishing, Smishing)Malware (Ransomware, Spyware, Trojans)Exploiting Vulnerabilities (Zero-Day, IoT)Credential StuffingSupply Chain AttacksInsider Threats (Malicious/Accidental)DDoS (Zombie IoT Devices)Cryptojacking (Malicious Scripts, Cloud Exploitation)Physical AttacksSystem/Human Error

Vulnerability Exploited: Legacy Firewall Gaps (Encrypted Threats)Unpatched Software (IoT, Zero-Day)Weak Credentials (Reused/Predictable Passwords)Lack of Multi-Factor Authentication (MFA)Misconfigured Cloud StorageThird-Party Vendor RisksSocial Engineering (Trust Exploitation)

Threat Actor: BlackCat/AlphV (Ransomware Group, Nation-State Linked)Scattered Spider (Cybercrime Group)Unspecified APT Groups (Advanced Persistent Threats)Insider Threats (Malicious/Compromised)Opportunistic Cybercriminals (Phishing, BEC)Hacktivists (Data Leaks for Ideological Reasons)

Motivation: Financial Gain (Ransomware, BEC, Cryptojacking)Espionage (Data Theft, Corporate/State Secrets)Disruption (DDoS, Operational Sabotage)Data Exfiltration (Dark Web Sales)Reputation Damage (Brand Targeting)Geopolitical (Nation-State Attacks)

Incident : Malware-as-a-Service (MaaS)

Title: SocGholish (FakeUpdates) Malware-as-a-Service Campaign Exploiting Software Updates

Description: A sophisticated Malware-as-a-Service (MaaS) platform, SocGholish (also known as FakeUpdates), is turning legitimate software updates into a global trap for victims. Operated by threat group TA569 since 2017, the campaign compromises legitimate websites (often WordPress) to inject malicious scripts, using techniques like Domain Shadowing. The platform distributes ransomware (e.g., LockBit, RansomHub), RATs (e.g., AsyncRAT), and data-stealing malware. It acts as an Initial Access Broker (IAB) for criminal groups like Evil Corp and has ties to Russian state-sponsored actors (GRU Unit 29155). Recent attacks include healthcare targets via malicious Google Ads impersonating Kaiser Permanente’s HR portal, leading to breaches at Change Healthcare and Rite Aid.

Date Publicly Disclosed: 2025

Type: Malware-as-a-Service (MaaS)

Attack Vector: Compromised Legitimate Websites (e.g., WordPress via wp-admin exploits)Domain Shadowing (malicious subdomains on trusted sites)Malicious Software Updates (e.g., browser/Flash Player impersonation)Traffic Distribution Systems (TDS) like Keitaro and Parrot TDSMalvertising (e.g., Google Ads impersonating Kaiser Permanente HR portal)

Vulnerability Exploited: Compromised WordPress admin accountsLegitimate website vulnerabilities enabling script injectionUser trust in software update promptsLack of subdomain monitoring (Domain Shadowing)

Threat Actor: Name: TA569, Type: Cybercriminal Group, Motivation: Financial (Malware-as-a-Service revenue), Affiliations: ['Evil Corp', 'Russian GRU Unit 29155 (state-sponsored link)'], Name: Evil Corp, Type: Russian Cybercrime Syndicate, Motivation: Financial (ransomware, data theft), Affiliations: ['Russian intelligence services'], Name: GRU Unit 29155, Type: Russian Military Intelligence, Motivation: Espionage/State-Sponsored Operations, Payloads: ['Raspberry Robin worm'].

Motivation: Financial Gain (MaaS subscriptions, ransomware profits)Cybercrime Enablement (selling access to affiliates)State-Sponsored Activities (via GRU Unit 29155)

Incident : Data Breach

Title: Active Directory Compromise and Ransomware Attack on Change Healthcare (2024)

Description: In the 2024 Change Healthcare breach, attackers exploited a server lacking multifactor authentication (MFA), pivoted to Active Directory (AD), escalated privileges, and executed a highly costly ransomware attack. The incident disrupted patient care, exposed health records, and resulted in millions paid in ransom. The attack demonstrated the criticality of AD as the 'holy grail' for adversaries, enabling full network control through techniques like Golden Ticket, DCSync, and Kerberoasting. Hybrid environments (on-premises + cloud) expanded the attack surface, with attackers exploiting synchronization gaps, legacy protocols (e.g., NTLM), and fragmented security postures. Common vulnerabilities included weak passwords, stale service accounts, cached credentials, and poor visibility into privileged access. The breach underscored the need for layered defenses: strong password policies, privileged access management (PAM), zero-trust principles, continuous monitoring, and rapid patching of domain controllers.

Date Publicly Disclosed: 2024-02-00

Type: Data Breach

Attack Vector: Compromised Credentials (Phishing/Malware/Breach Databases)Server Without MFAActive Directory Exploitation (Golden Ticket, DCSync, Kerberoasting)Hybrid Environment Abuse (Azure AD Connect, OAuth Tokens, NTLM Relay)

Vulnerability Exploited: Weak/Reused Passwords (88% of breaches per Verizon DBIR)Service Accounts with Non-Expiring Passwords & Excessive PermissionsCached Administrative Credentials in Workstation MemoryLack of Visibility into Privileged Account UsageStale Accounts (Former Employees with Retained Access)Unpatched Domain Controllers (Privilege Escalation Flaw, April 2025)Legacy Protocols (NTLM Enabled for Backward Compatibility)Fragmented Security Posture (On-Premises vs. Cloud Visibility Gaps)

Motivation: Financial Gain (Ransom Payment)Data Theft (Health Records)Disruption (Patient Care Halt)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Server lacking multi-factor authentication (MFA), VPN exploitsPhishingStolen credentialsUnpatched vulnerabilities, phishing emails (67% of attacks)unpatched vulnerabilities (32%)RDP compromise (30% in SMBs)stolen credentials (29%)third-party software (25%)malicious ads/websites (e.g., Fake Chrome updates for Spora)botnets (e.g., Necurs for Locky, Qakbot for ransomware delivery), Exploited vulnerabilities in unpatched medical devicesPhishing emails targeting healthcare employeesCompromised third-party vendors (e.g., IT service providers), Compromised vendor systems (e.g., CDK Global, Change Healthcare)Phishing/impersonation (AI-enhanced), Phishing emails (Ascension malware download)Exploited vulnerabilities (Change Healthcare)Compromised credentials (AT&T 2019 breach)Third-party vendors (supply chain attacks)Unpatched IoT devices (lateral movement), Compromised WordPress sites (wp-admin exploits)Domain Shadowing (malicious subdomains)Malvertising (e.g., Google Ads impersonating HR portals) and Server Without MFA.

Impact of the Incidents

What was the impact of each incident ?

Incident : Cyber-Attack CHA412050824

Systems Affected: Prescription issuance applications

Operational Impact: Disruptions in prescription issuance

Incident : Ransomware Attack CHA424070124

Operational Impact: Disruption of services, impacting cash flow for Medicare providers

Incident : Ransomware CHA508070624

Financial Loss: $2 billion

Systems Affected: Claims processingRevenue cycle services

Operational Impact: Severe delays in processing claims and revenue cycle services

Legal Liabilities: Lawsuits for cybersecurity negligence

Incident : Cyber Incident CHA1011070724

Systems Affected: AI technologies

Incident : Cyberattack CHA1012070724

Financial Loss: $6.3 billion

Systems Affected: Claims processing system

Operational Impact: Inability to process claims digitallyDecline in cashMedical necessity denialsPrior authorization denialsDelayed claims

Incident : Cyberattack CHA000082724

Systems Affected: Medical billingPre-authorizations

Operational Impact: Delay in proceduresDelay in prescriptionsDoctor and nurse salary payment issues

Incident : Ransomware Attack CHA004101724

Systems Affected: Insurance eligibility checksPrior authorization requests

Operational Impact: Disruption in patient care

Legal Liabilities: Class action lawsuits

Incident : Data Breach CHA000102624

Financial Loss: $1.1 billion

Data Compromised: Names, Social security numbers, Treatment details

Systems Affected: ApplicationsPharmaciesHealthcare providers

Incident : Ransomware Attack CHA000122724

Data Compromised: Phone numbers, Addresses, Financial information, Health records, Diagnoses, Prescriptions, Treatment details

Brand Reputation Impact: Significant blowback for compromised security measures

Legal Liabilities: Lawsuits

Incident : Data Breach, Ransomware CHA002011725

Financial Loss: $1.6 billion

Incident : Cyberattack CHA123030725

Financial Loss: $3.1 billion

Systems Affected: Medical claims processing systems

Operational Impact: Extensive disruptions in the healthcare sector

Incident : Data Breach, Ransomware CHA000031825

Financial Loss: $3.1 billion

Data Compromised: Sensitive data

Legal Liabilities: Multiple lawsuits

Incident : Ransomware CHA004031825

Financial Loss: $1.6 billion

Incident : Ransomware CHA001032225

Financial Loss: $100 million in daily deferred patient care revenue

Systems Affected: electronic systemsinsurance verificationprior authorization processesclinical information exchangee-prescription services

Downtime: over three weeks

Operational Impact: halted the ability of thousands of healthcare providers to submit claims and receive payments

Revenue Loss: $100 million in daily deferred patient care revenue

Incident : Cyberattack CHA002032225

Financial Loss: Delays in medical proceduresRestricted access to prescription medicationsFinancial strains on health systemsSome health systems facing receivership

Systems Affected: Medical billing servicesPre-authorization services

Operational Impact: Widespread disruption of medical billing and pre-authorization services

Incident : Ransomware Attack CHA003032225

Operational Impact: Cash Flow Disruptions

Incident : Data Breach, Ransomware CHA000032325

Financial Loss: $3.1 billion

Data Compromised: Sensitive healthcare data

Legal Liabilities: Multiple lawsuits

Incident : Ransomware Attack CHA002032325

Financial Loss: $1.6 billion

Operational Impact: Substantial disruption across the healthcare sector

Incident : Ransomware Attack CHA002040125

Operational Impact: Significant financial and operational disruptions

Incident : Data Breach CHA507072725

Data Compromised: Personal information, Health information

Incident : Data Breach CHA950080425

Data Compromised: Names, Addresses, Dates of birth, Health insurance data, Social security numbers

Incident : Ransomware CHA541081125

Data Compromised: 190 million records

Operational Impact: Disruption of healthcare services across the U.S.

Identity Theft Risk: High

Incident : ransomware CHA734082825

Financial Loss: $2.3 billion to $2.45 billion (estimated response cost)

Data Compromised: Personal health information (PHI) of over 100 million individuals

Systems Affected: network serversoperational systems

Operational Impact: Significant disruption to healthcare operations and payment processing

Brand Reputation Impact: Severe damage due to scale of breach and regulatory scrutiny

Legal Liabilities: Investigations by U.S. Department of Health and Human Services (HHS)

Identity Theft Risk: High (due to exposure of PHI for 100M+ individuals)

Incident : Ransomware Proliferation CHA630082925

Data Compromised: Widespread (varies by group; e.g., Change Healthcare data leaked via multiple gangs)

Operational Impact: Increased volatility in ransomware operations; decentralization of attack sources

Brand Reputation Impact: Erosion of trust in cybercriminal underground; infighting among gangs

Identity Theft Risk: High (due to leaked PII from attacks like Change Healthcare)

Payment Information Risk: High (ransomware groups target financial and healthcare sectors)

Incident : ransomware CHA455090325

Financial Loss: $4B (WannaCry, 2017)$18M (Baltimore, 2019)$50M–$70M (Cognizant, 2020)$4.4M (Colonial Pipeline) + $11M (JBS, 2021)$1.1B (MOVEit breaches, 2023)$22M ransom + $2B losses (Change Healthcare, 2024)$25M (CDK Global, 2024)$160M (CommonSpirit Health, 2022)$300M (Marks & Spencer, 2024–2025)$4B (Sensata Technologies, 2025)Average ransom payment: $2.73M (2024, up from $1.5M in 2023)Average cost per attack: $5.13M (2025, +574% since 2019)

Data Compromised: 93.3m individuals (moveit, 2023), 9.7m medical records (medibank, 2022), 5.6m patient records (healthcorps, 2024), 726k customers (patelco credit union, 2024), 254k users (kadokawa/niconico, 2024), 500gb (spanish tax agency, 2024), 1tb (nvidia, 2022), 190gb (samsung, 2022), 65gb (british library, university of hawaii, 2023), Pii, payment info, medical records, corporate secrets (e.g., apple blueprints via quanta, 2021)

Systems Affected: 300K+ computers (WannaCry, 150+ countries, 2017)650 servers + 150 apps (Sky Lakes Medical Center, 2021)800 servers (Costa Rica government, 2022)10TB data (Canon, 2020)740GB (Toshiba, 2021)1.4M patient records (Lubbock County, 2019)Port of Nagoya (10% of Japan’s trade disrupted, 2023)thousands of dealerships (CDK Global, 2024)US fuel supply (Colonial Pipeline, 2021)US meat supply (JBS, 2021)

Downtime: ['1 month (Baltimore, 2019)', '7 months (Sky Lakes Medical Center, 2021)', 'prolonged disruptions (Change Healthcare, CDK Global, 2024)', 'manual processes (University Hospital Center Zagreb, 2024)']

Operational Impact: fuel shortages (Colonial Pipeline, 2021)meat supply disruption (JBS, 2021)healthcare service outages (CommonSpirit, Change Healthcare)auto sales halted (CDK Global, 2024)container operations destroyed (Port of Nagoya, 2023)online retail disruptions (Marks & Spencer, 2024–2025)government crises (Costa Rica, 2022)

Revenue Loss: ['$2B (Change Healthcare, 2024)', '$300M (Marks & Spencer, 2024–2025)', '$160M (CommonSpirit Health, 2022)', 'stock price drops (e.g., Carnival Corp, 2020)', 'market cap drop of £1B (Marks & Spencer, 2025)']

Brand Reputation Impact: leaked sensitive data (e.g., Washington DC Police, British Library)loss of trust in healthcare (e.g., Medibank, Healthcorps)publicized breaches (e.g., Christie’s, 2025)

Legal Liabilities: fines for regulatory violations (e.g., GDPR, HIPAA)lawsuits from affected customers (e.g., patients, credit union members)SEC disclosures (e.g., Sensata Technologies, 2025)

Identity Theft Risk: ['9.7M medical records (Medibank, 2022)', '5.6M patient records (Healthcorps, 2024)', '726K customers (Patelco Credit Union, 2024)', '500K clients (Christie’s, 2025)']

Payment Information Risk: ['credit card data (e.g., Patelco Credit Union, 2024)', 'financial records (e.g., Spanish Tax Agency, 2024)', 'cryptocurrency theft (e.g., CoinDash, 2017)']

Incident : Cyberattack Trend Analysis CHA0555405090425

Data Compromised: 215.7M+ records (Change Healthcare: 192.7M; H1 2025 breaches: 23M+)

Systems Affected: IoT-enabled medical devices (wearables, implantables, diagnostic tools)Hospital networks and EHR systemsCloud-based healthcare platforms

Operational Impact: Disruption of patient care services (e.g., delayed diagnoses/treatments)Increased IT security overhead for healthcare providersRegulatory scrutiny and compliance burdens

Brand Reputation Impact: Erosion of patient trust in digital health technologiesReputational damage to affected healthcare providers (e.g., Change Healthcare)

Legal Liabilities: Potential HIPAA violations (U.S.) and GDPR (EU) finesClass-action lawsuits from affected patients

Identity Theft Risk: High (PII/PHI exposure in 200M+ records)

Incident : Ransomware CHA2962029091225

Operational Impact: Industry-wide disruptions (e.g., CDK Global, Change Healthcare)Supply chain ripple effectsIT helpdesk compromises via social engineering

Brand Reputation Impact: Erosion of trust in vendor securityPerceived vulnerability to AI-powered attacks

Incident : Data Breach CHA0892008100325

Operational Impact: None reported (healthcare delivery unaffected)

Customer Complaints: ['Potential lawsuits (e.g., Levi & Korsinsky investigating Retina Group of Florida)']

Brand Reputation Impact: High (massive breaches in healthcare sector)Credit monitoring offered to 855,787 individuals

Legal Liabilities: Potential lawsuitsRegulatory notifications to state attorneys general and HHS

Identity Theft Risk: ['High (SSNs, driver’s license numbers, medical records exposed)']

Payment Information Risk: ['Limited subset of 246,711 individuals (Medical Associates of Brevard)']

Incident : Data Breach CHA4702047101025

Financial Loss: Incident: Change Healthcare Ransomware, Amount: $22 million (ransom) + $330M+ (operational costs), Incident: AT&T Data Breach, Amount: Undisclosed (73M records exposed, 2019 breach), Incident: Ascension Malware Attack, Amount: Undisclosed (emergency care diversions, data theft), Incident: M&S/Co-op/Harrods Hacks, Amount: Undisclosed (payment data risk, operational disruption), Incident: Average Ransomware Cost, Amount: $4.91M (including downtime/recovery), Incident: Average IoT Attack Cost, Amount: $330,000+, Incident: Business Email Compromise (BEC), Amount: $6.3B (2024 total),

Data Compromised: 3b+ records (largest breach, yahoo 2013), 198m americans (healthcare breaches, 2024), 73m at&t customers (ssns, 2019 breach), 57m uber users/drivers (2016), 339m marriott guests (2018), Pii, phi, payment data, credentials, military/civilian records

Systems Affected: Healthcare (Change Healthcare, Ascension)Telecom (AT&T)Retail (M&S, Co-op, Harrods)Government/Military (Pentagon 2015)IoT Devices (124% attack increase)Cloud Infrastructure (Cryptojacking)

Downtime: ['Change Healthcare: Weeks (prescription/insurance disruptions)', 'Ascension: Days (emergency care diversions)', 'M&S/Co-op/Harrods: Hours-Days (system shutdowns)', 'Average Ransomware Downtime: 22 days (2024)']

Operational Impact: Supply chain disruptions (healthcare, retail)Regulatory scrutiny (SEC filings, GDPR violations)Customer churn (trust erosion)Increased insurance premiumsIncident response resource drain

Revenue Loss: ['United Healthcare: $370B revenue (Change Healthcare subsidiary)', 'Retailers: Undisclosed (sales disruption during peak periods)']

Customer Complaints: ['Prescription delays (Change Healthcare)', 'Identity theft fears (AT&T SSN exposure)', 'Login resets (M&S/Co-op/Harrods)']

Brand Reputation Impact: Healthcare: Erosion of patient trustTelecom: Long-term credibility damage (AT&T)Retail: Short-term sales declines (M&S, Harrods)

Legal Liabilities: SEC 8-K filings (Change Healthcare)GDPR/CCPA violations (AT&T, healthcare breaches)Class-action lawsuits (data breach victims)Regulatory fines (e.g., $4.99M for insider threats)

Identity Theft Risk: ['High (AT&T SSNs, healthcare PII)', 'Moderate (retail payment data, masked)']

Payment Information Risk: ['M&S: Masked card data (low risk)', 'AT&T: SSNs (high risk)', 'Healthcare: PHI + insurance data (critical risk)']

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Data Compromised: Sensitive business information, Credentials (via data-stealing malware), Potential pii/phi (in healthcare attacks)

Systems Affected: End-user devices (via fake updates)Legitimate websites (compromised for distribution)Healthcare systems (e.g., Change Healthcare, Rite Aid)

Operational Impact: Disruption of healthcare services (e.g., Change Healthcare)Loss of trust in software update mechanismsIncreased incident response costs for affected organizations

Brand Reputation Impact: Erosion of trust in legitimate software vendorsReputational damage to compromised websites (e.g., WordPress hosts)

Identity Theft Risk: High (via stolen credentials and PII)

Incident : Data Breach CHA1032510111225

Financial Loss: Millions (Ransom Paid + Operational Costs)

Data Compromised: Health records, Patient data

Systems Affected: Active DirectoryDomain ControllersHybrid Cloud Infrastructure (Azure AD)Patient Care Systems

Downtime: Extended (Patient Care Disruption)

Operational Impact: Severe (Halt in Patient Services, Administrative Paralysis)

Customer Complaints: High (Patients and Healthcare Providers)

Brand Reputation Impact: Significant (Loss of Trust in Healthcare Data Security)

Identity Theft Risk: High (Exposed Health Records)

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $827.73 million.

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Medical Information, , Phone Numbers, Addresses, Financial Information, Health Records, Diagnoses, Prescriptions, Treatment Details, , Sensitive data, Sensitive healthcare data, Personal Information, Health Information, , Names, Addresses, Dates Of Birth, Health Insurance Data, Social Security Numbers, , Patient information, Personal Health Information (Phi), Patient Records, , Personally Identifiable Information (Pii), Healthcare Records, Financial Data, Corporate Secrets, , Pii (E.G., Medibank, Patelco Credit Union), Medical Records (E.G., Commonspirit, Healthcorps), Payment Information (E.G., Spanish Tax Agency), Corporate Secrets (E.G., Apple Blueprints Via Quanta), Government Data (E.G., Washington Dc Police, Costa Rica), Student/Employee Data (E.G., Munster Technological University), Customer Data (E.G., Christie’S, Marks & Spencer), , Protected Health Information (Phi), Personally Identifiable Information (Pii), Medical Device Operational Data, , Personal Information (Names, Dates Of Birth), Social Security Numbers (Ssns), Driver’S License/State Id Numbers, Medical Record Numbers, Medical Treatment Information, Health Insurance Information, Financial Account Information (Limited Subset At Mab), , Personally Identifiable Information (Pii), Protected Health Information (Phi), Social Security Numbers (Ssns), Payment Card Data (Masked/Unmasked), Credentials (Usernames, Passwords), Military/Civilian Personnel Records (Pentagon 2015), Corporate Espionage Data, , Credentials, Sensitive Business Data, Potentially Pii/Phi (In Healthcare Attacks), , Health Records, Patient Data, Potentially Administrative Credentials and .

Which entities were affected by each incident ?

Incident : Cyber-Attack CHA412050824

Entity Name: Change Healthcare

Entity Type: Healthcare Provider

Industry: Healthcare

Location: United States

Customers Affected: Approximately one-third of US patients

Incident : Ransomware Attack CHA424070124

Entity Name: Change Healthcare

Entity Type: Healthcare Service Provider

Industry: Healthcare

Location: United States

Customers Affected: Medicare providers, including hospitals and pharmacies

Incident : Ransomware CHA508070624

Entity Name: UnitedHealth Group

Entity Type: Healthcare

Industry: Healthcare

Incident : Cyber Incident CHA1011070724

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare

Incident : Cyberattack CHA1012070724

Entity Name: Change Healthcare

Entity Type: Organization

Industry: Healthcare

Customers Affected: Over 1,850 hospitals, 250,000 physicians

Incident : Cyberattack CHA000082724

Entity Name: Change Healthcare

Entity Type: Healthcare Service Provider

Industry: Healthcare

Incident : Ransomware Attack CHA004101724

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare

Incident : Ransomware Attack CHA004101724

Entity Name: Healthcare Providers

Entity Type: Organizations

Industry: Healthcare

Incident : Ransomware Attack CHA004101724

Entity Name: Patients

Entity Type: Individuals

Incident : Data Breach CHA000102624

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare

Location: US

Customers Affected: Over 100 million individuals

Incident : Ransomware Attack CHA000122724

Entity Name: Change Healthcare

Entity Type: Medical Billing Processor

Industry: Healthcare

Location: US

Customers Affected: Over 100 million people

Incident : Data Breach, Ransomware CHA002011725

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare

Incident : Cyberattack CHA123030725

Entity Name: Change Healthcare

Entity Type: Organization

Industry: Healthcare

Location: United States

Incident : Data Breach, Ransomware CHA000031825

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare Payment Processing

Customers Affected: 190 million individuals

Incident : Ransomware CHA004031825

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare

Incident : Ransomware CHA001032225

Entity Name: Change Healthcare

Entity Type: Healthcare

Industry: Healthcare

Customers Affected: thousands of healthcare providers

Incident : Cyberattack CHA002032225

Entity Name: Change Healthcare

Entity Type: Organization

Industry: Healthcare

Location: United States

Customers Affected: Hundreds of health systems

Incident : Ransomware Attack CHA003032225

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare

Incident : Data Breach, Ransomware CHA000032325

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare payment processing

Location: US

Customers Affected: 190 million individuals

Incident : Ransomware Attack CHA002032325

Entity Name: Change Healthcare

Entity Type: Company

Industry: Healthcare

Customers Affected: Providers relying on Change Healthcare's services

Incident : Ransomware Attack CHA002040125

Entity Name: Change Healthcare/Optum

Entity Type: Healthcare Industry

Industry: Healthcare

Location: U.S.

Incident : Data Breach CHA507072725

Entity Name: Change Healthcare Inc.

Entity Type: Company

Industry: Healthcare

Customers Affected: 3,175,442

Incident : Data Breach CHA950080425

Entity Name: Change Healthcare Inc.

Entity Type: Company

Industry: Healthcare

Incident : Ransomware CHA541081125

Entity Name: Change Healthcare

Entity Type: Healthcare

Industry: Healthcare

Location: U.S.

Incident : ransomware CHA734082825

Entity Name: Change Healthcare

Entity Type: Healthcare technology and payment processing company

Industry: Healthcare

Location: United States

Customers Affected: 100 million+ individuals (PHI compromised)

Incident : ransomware CHA734082825

Entity Name: Healthcare payers and providers (indirectly affected)

Entity Type: insurance companies, hospitals, clinics, contractors

Industry: Healthcare

Location: United States (primarily)

Incident : Ransomware Proliferation CHA630082925

Entity Name: Change Healthcare

Entity Type: Healthcare Technology

Industry: Healthcare

Location: United States

Incident : Ransomware Proliferation CHA630082925

Entity Name: Multiple unnamed victims of 60+ active ransomware gangs

Entity Type: Corporations, Government Agencies, Critical Infrastructure

Location: Global

Incident : ransomware CHA455090325

Entity Name: Change Healthcare (UnitedHealth Group)

Entity Type: healthcare

Industry: healthcare IT

Location: USA

Size: large (100M+ people affected)

Customers Affected: 100M+

Incident : ransomware CHA455090325

Entity Name: CDK Global

Entity Type: corporation

Industry: automotive retail

Location: USA, Canada

Size: large

Customers Affected: thousands of dealerships

Incident : ransomware CHA455090325

Entity Name: Colonial Pipeline

Entity Type: corporation

Industry: energy/oil

Location: USA

Size: large

Customers Affected: US East Coast fuel supply

Incident : ransomware CHA455090325

Entity Name: JBS S.A.

Entity Type: corporation

Industry: food/agriculture

Location: global (HQ: Brazil)

Size: large

Customers Affected: global meat supply chain

Incident : ransomware CHA455090325

Entity Name: MOVEit (Progress Software)

Entity Type: corporation

Industry: software/IT

Location: global

Size: large

Customers Affected: 2,700+ organizations, 93.3M individuals

Incident : ransomware CHA455090325

Entity Name: Marks & Spencer

Entity Type: corporation

Industry: retail

Location: UK

Size: large

Incident : ransomware CHA455090325

Entity Name: CommonSpirit Health

Entity Type: healthcare

Industry: healthcare

Location: USA

Size: large

Incident : ransomware CHA455090325

Entity Name: Medibank Private

Entity Type: healthcare

Industry: health insurance

Location: Australia

Size: large

Customers Affected: 9.7M

Incident : ransomware CHA455090325

Entity Name: Cognizant

Entity Type: corporation

Industry: IT services

Location: global (HQ: USA)

Size: large

Incident : ransomware CHA455090325

Entity Name: Baltimore City Government

Entity Type: government

Industry: public administration

Location: USA (Maryland)

Size: municipal

Customers Affected: residents

Incident : ransomware CHA455090325

Entity Name: University Hospital Center Zagreb

Entity Type: healthcare

Industry: healthcare

Location: Croatia

Size: large (largest in Croatia)

Incident : ransomware CHA455090325

Entity Name: Kadokawa Corporation

Entity Type: corporation

Industry: publishing/media

Location: Japan

Size: large

Customers Affected: 254K users (Niconico)

Incident : ransomware CHA455090325

Entity Name: Patelco Credit Union

Entity Type: financial

Industry: banking

Location: USA

Size: medium

Customers Affected: 726K

Incident : ransomware CHA455090325

Entity Name: Spanish Tax Agency (Agencia Tributaria)

Entity Type: government

Industry: public administration

Location: Spain

Size: large

Incident : ransomware CHA455090325

Entity Name: Port of Nagoya

Entity Type: infrastructure

Industry: logistics/trade

Location: Japan

Size: large (10% of Japan’s trade)

Incident : ransomware CHA455090325

Entity Name: British Library

Entity Type: public institution

Industry: education/culture

Location: UK

Size: large

Incident : ransomware CHA455090325

Entity Name: Sensata Technologies

Entity Type: corporation

Industry: technology/manufacturing

Location: USA

Size: large

Incident : ransomware CHA455090325

Entity Name: Christie’s

Entity Type: corporation

Industry: auction/art

Location: global (HQ: UK)

Size: large

Customers Affected: 500K clients

Incident : Cyberattack Trend Analysis CHA0555405090425

Entity Name: Change Healthcare

Entity Type: Healthcare IT Company

Industry: Healthcare

Location: U.S.

Customers Affected: 192.7 million individuals

Incident : Cyberattack Trend Analysis CHA0555405090425

Entity Name: U.S. Healthcare Providers (HHS Investigations)

Entity Type: Hospitals, Clinics, Diagnostic Centers

Industry: Healthcare

Location: U.S.

Customers Affected: 23M+ individuals (H1 2025 breaches)

Incident : Cyberattack Trend Analysis CHA0555405090425

Entity Name: Global Medical Device Manufacturers

Entity Type: Medical Device OEMs

Industry: Healthcare/Manufacturing

Location: Global

Incident : Ransomware CHA2962029091225

Entity Name: CDK Global

Entity Type: Vendor/Third-Party

Industry: Automotive Retail Software

Location: United States

Customers Affected: Industry-wide (automotive dealerships)

Incident : Ransomware CHA2962029091225

Entity Name: Change Healthcare

Entity Type: Vendor/Third-Party

Industry: Healthcare Technology

Location: United States

Customers Affected: Healthcare providers, insurers

Incident : Ransomware CHA2962029091225

Entity Name: Unspecified Organizations (Resilience Portfolio)

Entity Type: Diverse

Industry: Multiple Sectors

Location: Global

Incident : Data Breach CHA0892008100325

Entity Name: Goshen Medical Center

Entity Type: Healthcare Provider

Industry: Healthcare

Location: North Carolina, USA

Customers Affected: 456385

Incident : Data Breach CHA0892008100325

Entity Name: Retina Group of Florida

Entity Type: Healthcare Provider

Industry: Healthcare (Ophthalmology)

Location: Florida, USA (22 locations across east, west, and gulf coasts)

Customers Affected: 153429

Incident : Data Breach CHA0892008100325

Entity Name: Medical Associates of Brevard (MAB)

Entity Type: Healthcare Provider

Industry: Healthcare

Location: Brevard, Florida, USA

Customers Affected: 246711

Incident : Data Breach CHA4702047101025

Entity Name: Change Healthcare (United Healthcare)

Entity Type: Healthcare

Industry: Healthcare IT/Payment Processing

Location: USA

Size: Enterprise ($370B revenue)

Customers Affected: 15B annual transactions (US military included)

Incident : Data Breach CHA4702047101025

Entity Name: AT&T

Entity Type: Telecommunications

Industry: Telecom

Location: USA

Size: Enterprise

Customers Affected: 73M (7.6M current + 65.4M former)

Incident : Data Breach CHA4702047101025

Entity Name: Ascension

Entity Type: Healthcare Provider

Industry: Healthcare

Location: USA

Size: Large (multi-hospital system)

Customers Affected: Undisclosed (data theft confirmed)

Incident : Data Breach CHA4702047101025

Entity Name: Marks & Spencer (M&S)

Entity Type: Retailer

Industry: Retail

Location: UK

Size: Enterprise

Customers Affected: Undisclosed (payment data risk)

Incident : Data Breach CHA4702047101025

Entity Name: Co-op

Entity Type: Retailer

Industry: Retail/Grocery

Location: UK

Size: Large

Customers Affected: Undisclosed (system shutdowns)

Incident : Data Breach CHA4702047101025

Entity Name: Harrods

Entity Type: Luxury Retailer

Industry: Retail

Location: UK

Size: Enterprise

Customers Affected: Undisclosed (ransomware attempt)

Incident : Data Breach CHA4702047101025

Entity Name: General Businesses (Global)

Entity Type: Cross-Industry

Industry: All Sectors

Location: Worldwide

Size: SMB to Enterprise

Customers Affected: 59% hit by ransomware (2024)

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Entity Name: Change Healthcare

Entity Type: Healthcare Organization

Industry: Healthcare

Location: USA

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Entity Name: Rite Aid

Entity Type: Pharmacy Retail Chain

Industry: Healthcare/Retail

Location: USA

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Entity Name: Kaiser Permanente (impersonated via malicious ads)

Entity Type: Healthcare Provider

Industry: Healthcare

Location: USA

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Entity Name: Various WordPress Website Owners

Entity Type: Legitimate Businesses/Website Operators

Industry: Multiple

Location: Global

Incident : Data Breach CHA1032510111225

Entity Name: Change Healthcare

Entity Type: Healthcare Technology Company

Industry: Healthcare

Location: United States

Size: Large (Fortune 1000)

Customers Affected: Patients and Healthcare Providers (Exact Number Undisclosed)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Cyber-Attack CHA412050824

Containment Measures: Disconnecting its systems

Incident : Ransomware Attack CHA004101724

Recovery Measures: Ongoing restoration efforts

Incident : Ransomware Attack CHA003032225

Recovery Measures: CMS launched CHOPD program

Incident : Ransomware Attack CHA002040125

Recovery Measures: CMS initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems

Incident : ransomware CHA734082825

Incident Response Plan Activated: True

Incident : Ransomware Proliferation CHA630082925

Incident Response Plan Activated: Law enforcement takedowns (e.g., LockBit, AlphV, Hive)

Third Party Assistance: Malwarebytes, Flashpoint, Recorded Future, Trellix.

Containment Measures: Infrastructure disruption (e.g., LockBit takedown)International Ransomware Task Force operations

Communication Strategy: Public reports by cybersecurity firmsMedia coverage of gang fragmentation

Incident : ransomware CHA455090325

Incident Response Plan Activated: ['Change Healthcare (2024, UnitedHealth Group)', 'CDK Global (2024, $25M ransom paid)', 'Colonial Pipeline (2021, $4.4M ransom paid)', 'JBS (2021, $11M ransom paid)', 'Cognizant (2020, $50M–$70M losses)', 'Baltimore (2019, $18M recovery cost)', 'CommonSpirit Health (2022, $160M losses)', 'Medibank (2022, 9.7M records at risk)']

Third Party Assistance: Cybersecurity Firms (E.G., For Colonial Pipeline, Change Healthcare), Doj/Europol (Qakbot Takedown, 2025), Insurance Providers (E.G., Syracuse City School District, 2019).

Law Enforcement Notified: Colonial Pipeline (FBI recovered $2.3M in Bitcoin), Qakbot (DOJ seized $24M, 2025), DanaBot (16 Russian nationals indicted, 2025), Washington DC Police (Babuk leak, 2021),

Containment Measures: network isolation (e.g., Change Healthcare, CDK Global)system shutdowns (e.g., Baltimore, 2019)disabling RDP access (common in SMBs)patching zero-days (e.g., MOVEit, 2023)

Remediation Measures: data recovery from backups (e.g., Sky Lakes Medical Center, 7 months)decryption tools (e.g., WannaCry kill switch, 2017)rebuilding systems (e.g., Garmin, 2020)credential resets (e.g., after stolen credentials used)

Recovery Measures: immutable backups (4x faster recovery, 50% less likely to pay ransom)cyber insurance claims (58% of large-value claims in H1 2024)manual processes (e.g., University Hospital Center Zagreb, 2024)third-party forensic investigations

Communication Strategy: public disclosures (e.g., Colonial Pipeline, Change Healthcare)customer notifications (e.g., Patelco Credit Union, Healthcorps)regulatory filings (e.g., Sensata Technologies, SEC)press releases (e.g., British Library, 2023)

Network Segmentation: ['recommended in mitigation strategies']

Enhanced Monitoring: recommended post-incident

Incident : Cyberattack Trend Analysis CHA0555405090425

Third Party Assistance: Cybersecurity Firms (E.G., Integrity Security Services, Health Catalyst), Regulatory Bodies (Hhs, Fda, Eu Agencies).

Containment Measures: Deployment of AI-based threat detection (e.g., BluePrint Protect™)Network segmentation for IoMT devicesEndpoint security upgrades

Remediation Measures: Patch management for vulnerable medical devicesEnhanced IAM and encryption solutionsDark web monitoring for stolen data

Communication Strategy: Public disclosures (e.g., HHS breach reports)Patient notification campaigns (where applicable)

Network Segmentation: Prioritized for IoMT ecosystems

Enhanced Monitoring: AI-driven real-time threat analysis

Incident : Ransomware CHA2962029091225

Third Party Assistance: Cyber Insurance Providers (E.G., Resilience), Threat Intelligence Sharing.

Containment Measures: Isolation of compromised vendor systemsDisabling affected accounts (post-phishing)

Remediation Measures: Restoration from backups (ransomware)MFA reinforcementVendor security audits

Recovery Measures: Tested recovery plans (reduced ransom payments to 14% in H1 2025)Supply chain diversification

Communication Strategy: Stakeholder advisories on vendor risksEmployee training on AI-powered phishing

Adaptive Behavioral WAF: Recommended

Network Segmentation: Recommended (Zero Trust for vendors)

Enhanced Monitoring: Behavioral anomaly detectionAI-powered threat detection for social engineering

Incident : Data Breach CHA0892008100325

Incident Response Plan Activated: True

Remediation Measures: Credit monitoring and identity protection services offered to all 855,787 affected individuals

Communication Strategy: Breach notification letters to affected individualsPublic disclosures (e.g., Retina Group’s report to state AGs and HHS)PDF letter posted on MAB’s website

Incident : Data Breach CHA4702047101025

Incident Response Plan Activated: ['Change Healthcare: SEC 8-K filing, ransom payment', 'Ascension: Emergency care diversions, forensic investigation', 'M&S/Co-op/Harrods: System shutdowns, customer notifications', 'AT&T: Dark web monitoring, credit protection offers']

Third Party Assistance: Cybersecurity Firms (Forensics, Recovery), Legal Counsel (Regulatory Compliance), Pr Agencies (Crisis Communications).

Law Enforcement Notified: FBI (BlackCat/AlphV, Scattered Spider), UK National Cyber Security Centre (M&S/Co-op/Harrods), Interpol/Europol (cross-border attacks),

Containment Measures: Network isolation (Ascension, retailers)Endpoint detection/response (EDR) deploymentDark web monitoring (AT&T)Password resets (M&S customers)

Remediation Measures: Patch management (IoT, zero-day vulnerabilities)Credential rotation (compromised accounts)Data encryption enhancementsLegacy system upgrades

Recovery Measures: Backup restoration (ransomware victims)Customer compensation (credit monitoring)Operational continuity planning

Communication Strategy: Public disclosures (SEC filings, press releases)Customer advisories (AT&T, M&S)Transparency reports (healthcare breaches)

Network Segmentation: ['Implemented post-breach (Ascension, retailers)']

Enhanced Monitoring: SIEM upgrades (Change Healthcare)Threat intelligence feeds (AT&T)

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Third Party Assistance: Trustwave Spiderlabs (Research/Threat Intelligence).

Incident : Data Breach CHA1032510111225

Incident Response Plan Activated: Likely (Given Scale of Breach)

Remediation Measures: Ransom Payment (Millions)Patch Deployment for Domain Controllers (Post-Breach)Potential Review of AD Security Posture

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Law enforcement takedowns (e.g., LockBit, AlphV, Hive), Change Healthcare (2024, UnitedHealth Group), CDK Global (2024, $25M ransom paid), Colonial Pipeline (2021, $4.4M ransom paid), JBS (2021, $11M ransom paid), Cognizant (2020, $50M–$70M losses), Baltimore (2019, $18M recovery cost), CommonSpirit Health (2022, $160M losses), Medibank (2022, 9.7M records at risk), , , Change Healthcare: SEC 8-K filing, ransom payment, Ascension: Emergency care diversions, forensic investigation, M&S/Co-op/Harrods: System shutdowns, customer notifications, AT&T: Dark web monitoring, credit protection offers, , Likely (Given Scale of Breach).

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through MalwareBytes, Flashpoint, Recorded Future, Trellix, , cybersecurity firms (e.g., for Colonial Pipeline, Change Healthcare), DOJ/Europol (Qakbot takedown, 2025), insurance providers (e.g., Syracuse City School District, 2019), , Cybersecurity firms (e.g., INTEGRITY Security Services, Health Catalyst), Regulatory bodies (HHS, FDA, EU agencies), , Cyber insurance providers (e.g., Resilience), Threat intelligence sharing, , Cybersecurity firms (forensics, recovery), Legal counsel (regulatory compliance), PR agencies (crisis communications), , Trustwave SpiderLabs (research/threat intelligence), .

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach CHA000102624

Type of Data Compromised: Personal information, Medical information

Number of Records Exposed: Over 100 million

Sensitivity of Data: High

Personally Identifiable Information: NamesSocial Security numbers

Incident : Ransomware Attack CHA000122724

Type of Data Compromised: Phone numbers, Addresses, Financial information, Health records, Diagnoses, Prescriptions, Treatment details

Number of Records Exposed: Over 100 million

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : Data Breach, Ransomware CHA000031825

Type of Data Compromised: Sensitive data

Number of Records Exposed: 190 million

Incident : Data Breach, Ransomware CHA000032325

Type of Data Compromised: Sensitive healthcare data

Number of Records Exposed: 190 million

Sensitivity of Data: High

Incident : Data Breach CHA507072725

Type of Data Compromised: Personal information, Health information

Number of Records Exposed: 3,175,442

Incident : Data Breach CHA950080425

Type of Data Compromised: Names, Addresses, Dates of birth, Health insurance data, Social security numbers

Incident : Ransomware CHA541081125

Type of Data Compromised: Patient information

Number of Records Exposed: 190 million

Sensitivity of Data: High

Personally Identifiable Information: Yes

Incident : ransomware CHA734082825

Type of Data Compromised: Personal health information (phi), Patient records

Number of Records Exposed: 100 million+

Sensitivity of Data: High (includes protected health information)

Incident : Ransomware Proliferation CHA630082925

Type of Data Compromised: Personally identifiable information (pii), Healthcare records, Financial data, Corporate secrets

Sensitivity of Data: High (includes healthcare and financial data)

Data Encryption: True

Incident : ransomware CHA455090325

Type of Data Compromised: Pii (e.g., medibank, patelco credit union), Medical records (e.g., commonspirit, healthcorps), Payment information (e.g., spanish tax agency), Corporate secrets (e.g., apple blueprints via quanta), Government data (e.g., washington dc police, costa rica), Student/employee data (e.g., munster technological university), Customer data (e.g., christie’s, marks & spencer)

Number of Records Exposed: 93.3M (MOVEit, 2023), 9.7M (Medibank, 2022), 5.6M (Healthcorps, 2024), 726K (Patelco Credit Union, 2024), 254K (Kadokawa/Niconico, 2024), 500K (Christie’s, 2025), 1.4M (Lubbock County, 2019), 70K (Nvidia, 2022)

Sensitivity of Data: high (PII, medical, financial, corporate secrets)

Data Exfiltration: MOVEit (Clop gang, 2023)BlackCat/ALPHV (Change Healthcare, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, 2022)Babuk (Washington DC Police, 2021)Rhysida (British Library, 2023)

Data Encryption: ['WannaCry (2017, 300K+ computers)', 'Colonial Pipeline (2021)', 'CDK Global (2024)', 'Change Healthcare (2024)', 'Port of Nagoya (2023)']

File Types Exposed: databases (e.g., patient records, customer data)documents (e.g., corporate secrets, legal files)emails (e.g., phishing lures, credentials)source code (e.g., Samsung, Nvidia)financial records (e.g., Spanish Tax Agency)

Personally Identifiable Information: names, addresses, SSNs (e.g., Patelco Credit Union)medical histories (e.g., Medibank, Healthcorps)payment card data (e.g., retail breaches)biometric data (e.g., healthcare breaches)

Incident : Cyberattack Trend Analysis CHA0555405090425

Type of Data Compromised: Protected health information (phi), Personally identifiable information (pii), Medical device operational data

Number of Records Exposed: 215.7M+ (aggregated from 2024–2025 incidents)

Sensitivity of Data: High (health records, financial data, biometric data)

Data Exfiltration: Confirmed in ransomware attacks (e.g., Change Healthcare)

Data Encryption: Lack of encryption cited as a vulnerability in breaches

File Types Exposed: EHRsDiagnostic imagesBilling recordsDevice logs

Personally Identifiable Information: Yes (names, SSNs, medical histories)

Incident : Ransomware CHA2962029091225

Data Exfiltration: Reported in double extortion ransomware cases

Data Encryption: Ransomware encryption (systems locked)

Incident : Data Breach CHA0892008100325

Type of Data Compromised: Personal information (names, dates of birth), Social security numbers (ssns), Driver’s license/state id numbers, Medical record numbers, Medical treatment information, Health insurance information, Financial account information (limited subset at mab)

Number of Records Exposed: 855787

Sensitivity of Data: High (PII, PHI, financial data)

Incident : Data Breach CHA4702047101025

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi), Social security numbers (ssns), Payment card data (masked/unmasked), Credentials (usernames, passwords), Military/civilian personnel records (pentagon 2015), Corporate espionage data

Number of Records Exposed: 3B+ (Yahoo 2013), 198M (US healthcare 2024), 73M (AT&T 2019), 57M (Uber 2016), 339M (Marriott 2018)

Sensitivity of Data: Critical (PHI, SSNs, military data)High (PII, financial records)Moderate (masked payment data)

Data Exfiltration: Confirmed (Change Healthcare, Ascension, AT&T)Attempted (M&S/Co-op/Harrods)

Data Encryption: ['Lack of encryption (AT&T 2019 breach)', 'Post-breach encryption upgrades (healthcare)']

File Types Exposed: Databases (PII/PHI)Documents (contracts, military records)Emails (BEC scams)Transaction logs (Change Healthcare)

Personally Identifiable Information: Names, addresses, SSNs (AT&T)Medical histories (Change Healthcare)Login credentials (M&S)

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Type of Data Compromised: Credentials, Sensitive business data, Potentially pii/phi (in healthcare attacks)

Sensitivity of Data: High

Data Exfiltration: Likely (via data-stealing malware payloads)

Personally Identifiable Information: Likely (in healthcare-related attacks)

Incident : Data Breach CHA1032510111225

Type of Data Compromised: Health records, Patient data, Potentially administrative credentials

Sensitivity of Data: High (Protected Health Information - PHI)

Data Exfiltration: Confirmed (Health Records)

Data Encryption: Likely (Ransomware Encryption)

Personally Identifiable Information: Yes (Patient Identities)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: data recovery from backups (e.g., Sky Lakes Medical Center, 7 months), decryption tools (e.g., WannaCry kill switch, 2017), rebuilding systems (e.g., Garmin, 2020), credential resets (e.g., after stolen credentials used), , Patch management for vulnerable medical devices, Enhanced IAM and encryption solutions, Dark web monitoring for stolen data, , Restoration from backups (ransomware), MFA reinforcement, Vendor security audits, , Credit monitoring and identity protection services offered to all 855,787 affected individuals, , Patch management (IoT, zero-day vulnerabilities), Credential rotation (compromised accounts), Data encryption enhancements, Legacy system upgrades, , Ransom Payment (Millions), Patch Deployment for Domain Controllers (Post-Breach), Potential Review of AD Security Posture, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disconnecting its systems, infrastructure disruption (e.g., lockbit takedown), international ransomware task force operations, , network isolation (e.g., change healthcare, cdk global), system shutdowns (e.g., baltimore, 2019), disabling rdp access (common in smbs), patching zero-days (e.g., moveit, 2023), , deployment of ai-based threat detection (e.g., blueprint protect™), network segmentation for iomt devices, endpoint security upgrades, , isolation of compromised vendor systems, disabling affected accounts (post-phishing), , network isolation (ascension, retailers), endpoint detection/response (edr) deployment, dark web monitoring (at&t), password resets (m&s customers) and .

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware Attack CHA000122724

Ransom Demanded: 22 million USD

Ransom Paid: 22 million USD

Ransomware Strain: ALPHV/BlackCat

Incident : Data Breach, Ransomware CHA000031825

Ransomware Strain: ALPHV/Blackcat

Incident : Ransomware CHA001032225

Ransom Paid: hefty ransom payment allegedly made

Incident : Data Breach, Ransomware CHA000032325

Ransomware Strain: ALPHV/Blackcat

Incident : Ransomware CHA541081125

Ransom Demanded: $4 million

Incident : ransomware CHA734082825

Data Encryption: True

Data Exfiltration: True

Incident : Ransomware Proliferation CHA630082925

Ransomware Strain: SafePay (LockBit-derived)QilinAkiraRansomHubOther rebranded/leaked-code variants

Data Encryption: True

Data Exfiltration: True

Incident : ransomware CHA455090325

Ransom Demanded: ['$4.4M (Colonial Pipeline, 2021)', '$11M (JBS, 2021)', '$50M (Acer, Quanta, 2021)', '$40M (CNA Financial, 2021)', '$22M (Change Healthcare, 2024)', '$25M (CDK Global, 2024)', '$38M (Spanish Tax Agency, 2024)', '$50M (Apple supplier Quanta, 2021)', '$42M (Grubman Shire Meislas, 2020)', '$1.14M (UCSF, 2020)', '$400K–$600K (Florida municipalities, 2019)']

Ransom Paid: $4.4M (Colonial Pipeline, 2021)$11M (JBS, 2021)$40M (CNA Financial, 2021)$22M (Change Healthcare, 2024)$25M (CDK Global, 2024)$5M (Rackspace, 2022)$1.14M (UCSF, 2020)$2.3M (Travelex, 2020)$460K (Lake City, FL, 2019)$600K (Rivera Beach, FL, 2019)$400K (Jackson County, GA, 2019)

Ransomware Strain: WannaCry (2017)LockBit (2025, $91M in payments)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)Clop (MOVEit, 2023)REvil (JBS, Kaseya, 2021)Maze (Cognizant, Canon, 2020)Ryuk (Onslow Water, 2019)NetWalker (UCSF, 2020)Sodinokibi (Travelex, 2020)Babuk (Washington DC Police, 2021)Lapsus$ (Nvidia, Samsung, 2022)Rhysida (British Library, 2023)NoEscape (University of Hawaii, 2023)

Data Encryption: ['widespread across most attacks']

Data Exfiltration: ['common in double/triple extortion (e.g., Clop, BlackCat)']

Incident : Cyberattack Trend Analysis CHA0555405090425

Data Encryption: Used in Change Healthcare attack (Feb 2024)

Data Exfiltration: Double extortion tactic observed

Incident : Ransomware CHA2962029091225

Ransom Paid: 14% of ransomware claims (H1 2025, down from 22% in 2024)

Data Encryption: Widespread

Data Exfiltration: Double extortion cases

Incident : Data Breach CHA0892008100325

Data Exfiltration: True

Incident : Data Breach CHA4702047101025

Ransom Demanded: ['$22M (Change Healthcare, paid)', 'Undisclosed (M&S/Co-op/Harrods, attempted)']

Ransom Paid: $22M (Change Healthcare to BlackCat/AlphV)

Ransomware Strain: BlackCat/AlphV (Change Healthcare)Scattered Spider (UK retailers, failed)

Data Encryption: ['Full encryption (Change Healthcare)', 'Partial encryption (Ascension)']

Data Exfiltration: ['Double extortion (Change Healthcare: data stolen + encrypted)']

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Ransomware Strain: LockBitRansomHub

Data Encryption: Yes (via ransomware payloads)

Data Exfiltration: Yes (double extortion model likely)

Incident : Data Breach CHA1032510111225

Ransom Paid: Millions (Exact Amount Undisclosed)

Data Encryption: Yes (Systems Locked)

Data Exfiltration: Yes (Double Extortion)

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Ongoing restoration efforts, , CMS launched CHOPD program, CMS initiated the Accelerated and Advance Payment (AAP) Program (CHOPD) to mitigate cash flow problems, immutable backups (4x faster recovery, 50% less likely to pay ransom), cyber insurance claims (58% of large-value claims in H1 2024), manual processes (e.g., University Hospital Center Zagreb, 2024), third-party forensic investigations, , Tested recovery plans (reduced ransom payments to 14% in H1 2025), Supply chain diversification, , Backup restoration (ransomware victims), Customer compensation (credit monitoring), Operational continuity planning, .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Ransomware CHA508070624

Legal Actions: Lawsuits for cybersecurity negligence,

Incident : Ransomware Attack CHA004101724

Legal Actions: Class action lawsuits,

Incident : Ransomware Attack CHA000122724

Legal Actions: Lawsuits

Incident : Data Breach, Ransomware CHA002011725

Regulations Violated: HIPAA,

Incident : Data Breach, Ransomware CHA000031825

Legal Actions: Multiple lawsuits

Incident : Ransomware CHA004031825

Regulatory Notifications: HIPAA breach reporting requirements

Incident : Data Breach, Ransomware CHA000032325

Legal Actions: Multiple lawsuits

Incident : ransomware CHA734082825

Regulations Violated: HIPAA (likely), State data breach notification laws,

Legal Actions: Investigation by U.S. Department of Health and Human Services (HHS)

Incident : Ransomware Proliferation CHA630082925

Legal Actions: International Ransomware Task Force operations, Infrastructure seizures,

Incident : ransomware CHA455090325

Regulations Violated: GDPR (e.g., European data breaches), HIPAA (e.g., healthcare breaches like Medibank, Change Healthcare), state data breach laws (e.g., California, New York), SEC disclosure rules (e.g., Sensata Technologies, 2025),

Legal Actions: lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims),

Regulatory Notifications: HHS Office for Civil Rights (healthcare breaches)FBI IC3 (cybercrime reporting)SEC filings (public companies)GDPR notifications (EU breaches)

Incident : Cyberattack Trend Analysis CHA0555405090425

Regulations Violated: HIPAA (U.S.), GDPR (EU), FDA medical device cybersecurity guidelines,

Legal Actions: HHS investigations into 307 breaches (H1 2025), Potential class-action lawsuits,

Regulatory Notifications: Mandatory breach reporting under HIPAA/GDPRFDA pre-market cybersecurity submissions for new devices

Incident : Data Breach CHA0892008100325

Regulations Violated: Potential HIPAA violations (PHI exposure),

Legal Actions: Investigation by law firms (e.g., Levi & Korsinsky for Retina Group of Florida),

Regulatory Notifications: State attorneys generalDepartment of Health and Human Services (HHS)

Incident : Data Breach CHA4702047101025

Regulations Violated: HIPAA (Change Healthcare, Ascension), GDPR (AT&T, UK retailers), SEC Disclosure Rules (Change Healthcare 8-K), CCPA (AT&T, if CA residents affected),

Fines Imposed: ['Potential: $4.99M (insider threat average)', 'Undisclosed (ongoing investigations)']

Legal Actions: Class-action lawsuits (AT&T, healthcare breaches), Regulatory probes (SEC, ICO UK),

Regulatory Notifications: SEC (Change Healthcare)ICO (UK retailers)HHS (healthcare breaches)

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Regulations Violated: Potential HIPAA violations (healthcare data breaches), GDPR (if EU citizen data affected),

Incident : Data Breach CHA1032510111225

Regulations Violated: HIPAA (Health Insurance Portability and Accountability Act),

Regulatory Notifications: Likely (HHS Breach Reporting Requirements)

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuits for cybersecurity negligence, , Class action lawsuits, , Lawsuits, Multiple lawsuits, Multiple lawsuits, Investigation by U.S. Department of Health and Human Services (HHS), International Ransomware Task Force operations, Infrastructure seizures, , lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims), , HHS investigations into 307 breaches (H1 2025), Potential class-action lawsuits, , Investigation by law firms (e.g., Levi & Korsinsky for Retina Group of Florida), , Class-action lawsuits (AT&T, healthcare breaches), Regulatory probes (SEC, ICO UK), .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Cyber Incident CHA1011070724

Lessons Learned: Without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.

Incident : Cyberattack CHA000082724

Lessons Learned: The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.

Incident : Ransomware CHA004031825

Lessons Learned: The need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.

Incident : Ransomware Attack CHA003032225

Lessons Learned: Potential financial and operational impacts of ransomware on the healthcare sector

Incident : Ransomware CHA541081125

Lessons Learned: The incident underscores the need for better third-party vendor oversight, proactive IT risk assessments, and regular testing of incident response plans.

Incident : ransomware CHA734082825

Lessons Learned: The incident highlights the critical need for multi-factor authentication (MFA) on all exposed servers, especially in healthcare where consolidated data repositories create high-value targets. Proactive cybersecurity measures, including AI-driven threat detection and vulnerability prioritization, are essential to mitigate risks in an industry facing escalating attacks. The breach also underscores the systemic risks posed by third-party vendors in the healthcare ecosystem.

Incident : Ransomware Proliferation CHA630082925

Lessons Learned: Law enforcement takedowns disrupt but do not eliminate threat actors, who rebrand or form new groups., Leaked ransomware code and commoditized tools lower the barrier to entry for new gangs., Distrust and infighting among affiliates weaken large RaaS operations, leading to fragmentation., Initial access brokers and open-source tools enable smaller, independent ransomware operations., Volatility in the ransomware ecosystem requires adaptive defense strategies.

Incident : ransomware CHA455090325

Lessons Learned: RaaS and affiliate models enable rapid scaling of attacks., Triple extortion (encryption + data theft + DDoS) increases pressure to pay., Supply chain attacks (e.g., MOVEit, Kaseya) amplify impact., Unpatched vulnerabilities remain a top entry point., AI and phishing lures are evolving faster than defenses., Immutable backups and segmentation reduce ransom payments., Cyber insurance is critical but increasingly expensive., Public-sector targets (e.g., municipalities, healthcare) face severe operational disruptions., Regulatory fines and legal liabilities extend financial impact beyond ransoms., Collaboration with law enforcement (e.g., Qakbot takedown) can disrupt threat actors.

Incident : Cyberattack Trend Analysis CHA0555405090425

Lessons Learned: IoMT devices require built-in security by design, not bolt-on solutions., AI-driven attacks necessitate AI-powered defense mechanisms., Legacy medical devices are high-risk targets; segmentation is critical., Regulatory compliance is a minimum baseline, not a substitute for proactive security.

Incident : Ransomware CHA2962029091225

Lessons Learned: Vendor risk management must be dynamic and continuous, not a one-time assessment., AI amplifies traditional social engineering, requiring reinforced fundamentals (e.g., red-teaming, behavioral baselines)., Strong backups and tested recovery plans significantly reduce ransomware payments., Single points of failure in supply chains can disrupt entire industries., Proactive vendor resilience investments (e.g., Zero Trust, insider threat monitoring) mitigate cascading impacts.

Incident : Data Breach CHA0892008100325

Lessons Learned: Healthcare sector remains a prime target for cybercriminals due to high-value data., Delayed detection (e.g., Goshen’s 1-month gap) exacerbates exposure risks., Proactive monitoring and rapid response are critical to mitigating impact., Credit monitoring is now standard but insufficient for long-term trust restoration.

Incident : Data Breach CHA4702047101025

Lessons Learned: Legacy systems are prime targets (AT&T 2019 breach resurfaced), Third-party risks extend attack surfaces (Change Healthcare), Human error remains a critical vector (Ascension malware download), Ransomware payments fund further attacks (BlackCat/AlphV), Encrypted threats bypass traditional firewalls (93% increase in 2024), IoT devices require dedicated security (124% attack surge), AI-driven attacks (vishing +442%) demand adaptive defenses

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Lessons Learned: Legitimate software update mechanisms are high-value targets for malware distribution., Domain Shadowing and compromised websites can bypass traditional security controls., Traffic Distribution Systems (TDS) enable targeted malware delivery., Initial Access Brokers (IABs) like SocGholish lower the barrier for cybercriminals to launch attacks., State-sponsored actors may leverage cybercriminal infrastructure for plausible deniability.

Incident : Data Breach CHA1032510111225

Lessons Learned: Active Directory is the 'holy grail' for attackers; compromising it grants full network control., Hybrid environments (on-premises + cloud) introduce complex attack surfaces (e.g., Azure AD Connect, OAuth tokens, NTLM)., Legacy protocols (NTLM) and fragmented security tools create visibility gaps exploited by attackers., Weak passwords, stale service accounts, and cached credentials are top entry points., Privileged access management (PAM) and zero-trust principles are critical to limiting lateral movement., Continuous monitoring for AD changes (e.g., group modifications, replication anomalies) can detect attacks early., Rapid patching of domain controllers is essential to close privilege escalation paths., Password policies must evolve: block breached credentials, enforce MFA, and use dynamic feedback for users.

What recommendations were made to prevent future incidents ?

Incident : Cyberattack CHA1012070724

Recommendations: Reassess cybersecurity measures in the healthcare industry

Incident : Ransomware CHA541081125

Recommendations: Include all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditionsInclude all critical data types in tested backup strategies, Treat insurance policies as sensitive documents, Train staff on phishing, social engineering, and safe data handling, Monitor third-party vendors continuously, Quantify cyber risk in financial terms to guide investment, Regularly test incident response plans under realistic conditions

Incident : ransomware CHA734082825

Recommendations: Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.Implement MFA across all critical systems, especially those handling PHI., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Enhance third-party risk management for vendors handling sensitive data., Conduct regular penetration testing and red team exercises to identify weak points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Develop and test incident response plans specifically tailored to ransomware scenarios., Segment networks to limit lateral movement by attackers., Monitor dark web for signs of stolen data or credential sales.

Incident : Ransomware Proliferation CHA630082925

Recommendations: Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor dark web forums for leaked ransomware code and initial access broker activities., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups.

Incident : ransomware CHA455090325

Recommendations: Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.

Incident : Cyberattack Trend Analysis CHA0555405090425

Recommendations: Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.Adopt zero-trust architectures for medical device networks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Prioritize encryption for data at rest and in transit in medical devices., Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing.

Incident : Ransomware CHA2962029091225

Recommendations: Strategic Investments: Advanced threat detection for AI-powered attacks., Insider threat monitoring via behavioral analysis., Supply chain security assessments with financial risk modeling., Strategic Investments: Advanced threat detection for AI-powered attacks., Insider threat monitoring via behavioral analysis., Supply chain security assessments with financial risk modeling., Strategic Investments: Advanced threat detection for AI-powered attacks., Insider threat monitoring via behavioral analysis., Supply chain security assessments with financial risk modeling., Strategic Investments: Advanced threat detection for AI-powered attacks., Insider threat monitoring via behavioral analysis., Supply chain security assessments with financial risk modeling..

Incident : Data Breach CHA0892008100325

Recommendations: Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.Enhance intrusion detection systems to reduce dwell time., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Conduct regular third-party security audits to identify vulnerabilities., Develop incident response playbooks tailored to healthcare-specific threats., Invest in employee training to recognize phishing/social engineering attacks.

Incident : Data Breach CHA4702047101025

Recommendations: Compliance: Align with NIS2 (EU), CIS Controls, MITRE ATT&CK, Automate compliance reporting (GDPR, HIPAA), Conduct annual penetration tests, Compliance: Align with NIS2 (EU), CIS Controls, MITRE ATT&CK, Automate compliance reporting (GDPR, HIPAA), Conduct annual penetration tests, Compliance: Align with NIS2 (EU), CIS Controls, MITRE ATT&CK, Automate compliance reporting (GDPR, HIPAA), Conduct annual penetration tests, Compliance: Align with NIS2 (EU), CIS Controls, MITRE ATT&CK, Automate compliance reporting (GDPR, HIPAA), Conduct annual penetration tests.

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Recommendations: Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.Monitor and secure website subdomains to prevent Domain Shadowing., Implement strict access controls for WordPress admin panels and other CMS platforms., Educate users on verifying software update sources before execution., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Assume breach posture: segment networks to limit lateral movement post-infection., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish.

Incident : Data Breach CHA1032510111225

Recommendations: Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks., Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks., Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks., Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks., Category: Detection & Response, Actions: Deploy **SIEM/XDR solutions** with AD-specific detection rules (e.g., Golden Ticket, DCSync)., Conduct **regular red team exercises** to test AD defenses., Train staff on **phishing resistance** and **credential hygiene**., Establish an **incident response plan** with AD-specific playbooks..

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Without rigorous testing, proactive strategy, and proper investment in security, the fast-paced adoption of technologies like AI and the reliance on insufficient security measures can lead to substantial losses and threats to data integrity and system reliability.The over-reliance on a consolidated service provider highlighted the risk of single points of failure in the healthcare sector, exacerbated by inadequate investment in cybersecurity resiliency within the industry.The need for clear communication and responsibility assignment in the aftermath of cyberattacks within the healthcare industry.Potential financial and operational impacts of ransomware on the healthcare sectorThe incident underscores the need for better third-party vendor oversight, proactive IT risk assessments, and regular testing of incident response plans.The incident highlights the critical need for multi-factor authentication (MFA) on all exposed servers, especially in healthcare where consolidated data repositories create high-value targets. Proactive cybersecurity measures, including AI-driven threat detection and vulnerability prioritization, are essential to mitigate risks in an industry facing escalating attacks. The breach also underscores the systemic risks posed by third-party vendors in the healthcare ecosystem.Law enforcement takedowns disrupt but do not eliminate threat actors, who rebrand or form new groups.,Leaked ransomware code and commoditized tools lower the barrier to entry for new gangs.,Distrust and infighting among affiliates weaken large RaaS operations, leading to fragmentation.,Initial access brokers and open-source tools enable smaller, independent ransomware operations.,Volatility in the ransomware ecosystem requires adaptive defense strategies.RaaS and affiliate models enable rapid scaling of attacks.,Triple extortion (encryption + data theft + DDoS) increases pressure to pay.,Supply chain attacks (e.g., MOVEit, Kaseya) amplify impact.,Unpatched vulnerabilities remain a top entry point.,AI and phishing lures are evolving faster than defenses.,Immutable backups and segmentation reduce ransom payments.,Cyber insurance is critical but increasingly expensive.,Public-sector targets (e.g., municipalities, healthcare) face severe operational disruptions.,Regulatory fines and legal liabilities extend financial impact beyond ransoms.,Collaboration with law enforcement (e.g., Qakbot takedown) can disrupt threat actors.IoMT devices require built-in security by design, not bolt-on solutions.,AI-driven attacks necessitate AI-powered defense mechanisms.,Legacy medical devices are high-risk targets; segmentation is critical.,Regulatory compliance is a minimum baseline, not a substitute for proactive security.Vendor risk management must be dynamic and continuous, not a one-time assessment.,AI amplifies traditional social engineering, requiring reinforced fundamentals (e.g., red-teaming, behavioral baselines).,Strong backups and tested recovery plans significantly reduce ransomware payments.,Single points of failure in supply chains can disrupt entire industries.,Proactive vendor resilience investments (e.g., Zero Trust, insider threat monitoring) mitigate cascading impacts.Healthcare sector remains a prime target for cybercriminals due to high-value data.,Delayed detection (e.g., Goshen’s 1-month gap) exacerbates exposure risks.,Proactive monitoring and rapid response are critical to mitigating impact.,Credit monitoring is now standard but insufficient for long-term trust restoration.Legacy systems are prime targets (AT&T 2019 breach resurfaced),Third-party risks extend attack surfaces (Change Healthcare),Human error remains a critical vector (Ascension malware download),Ransomware payments fund further attacks (BlackCat/AlphV),Encrypted threats bypass traditional firewalls (93% increase in 2024),IoT devices require dedicated security (124% attack surge),AI-driven attacks (vishing +442%) demand adaptive defensesLegitimate software update mechanisms are high-value targets for malware distribution.,Domain Shadowing and compromised websites can bypass traditional security controls.,Traffic Distribution Systems (TDS) enable targeted malware delivery.,Initial Access Brokers (IABs) like SocGholish lower the barrier for cybercriminals to launch attacks.,State-sponsored actors may leverage cybercriminal infrastructure for plausible deniability.Active Directory is the 'holy grail' for attackers; compromising it grants full network control.,Hybrid environments (on-premises + cloud) introduce complex attack surfaces (e.g., Azure AD Connect, OAuth tokens, NTLM).,Legacy protocols (NTLM) and fragmented security tools create visibility gaps exploited by attackers.,Weak passwords, stale service accounts, and cached credentials are top entry points.,Privileged access management (PAM) and zero-trust principles are critical to limiting lateral movement.,Continuous monitoring for AD changes (e.g., group modifications, replication anomalies) can detect attacks early.,Rapid patching of domain controllers is essential to close privilege escalation paths.,Password policies must evolve: block breached credentials, enforce MFA, and use dynamic feedback for users.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Prioritize encryption for data at rest and in transit in medical devices., Adopt zero-trust architectures for medical device networks., Category: Active Directory Hardening, , Category: Hybrid Environment Security, , Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Reassess cybersecurity measures in the healthcare industry, Invest in employee training to counter AI-generated phishing attacks., Collaborate with cybersecurity firms for continuous threat intelligence sharing., Category: Credential Security, , Category: Detection & Response, , Category: Privileged Access Management (PAM) and .

References

Where can I find more information about each incident ?

Incident : Data Breach CHA507072725

Source: Washington Attorney General's Office

Date Accessed: 2025-04-18

Incident : Data Breach CHA950080425

Source: California Attorney General

Date Accessed: 2024-08-03

Incident : Ransomware CHA541081125

Source: Resilience

Incident : ransomware CHA734082825

Source: Article on Change Healthcare ransomware attack and healthcare cybersecurity trends

Incident : ransomware CHA734082825

Source: U.S. Department of Health and Human Services (HHS) investigation reports (referenced)

Incident : ransomware CHA734082825

Source: Google's acquisition of Wiz (contextual reference)

Incident : Ransomware Proliferation CHA630082925

Source: MalwareBytes

URL: https://www.malwarebytes.com

Date Accessed: 2025-06-30

Incident : Ransomware Proliferation CHA630082925

Source: Flashpoint

URL: https://www.flashpoint.io

Date Accessed: 2025-06-30

Incident : Ransomware Proliferation CHA630082925

Source: Recorded Future (The Record)

URL: https://therecord.media

Date Accessed: 2025-06-30

Incident : Ransomware Proliferation CHA630082925

Source: Trellix

URL: https://www.trellix.com

Date Accessed: 2025-06-30

Incident : ransomware CHA455090325

Source: Statista

URL: https://www.statista.com

Incident : ransomware CHA455090325

Source: Sophos State of Ransomware 2024

URL: https://www.sophos.com/en-us/state-of-ransomware

Incident : ransomware CHA455090325

Source: IBM Security X-Force Threat Intelligence

URL: https://www.ibm.com/security

Incident : ransomware CHA455090325

Source: Chainalysis 2025 Crypto Crime Report

URL: https://www.chainalysis.com

Incident : ransomware CHA455090325

Source: Verizon 2025 Data Breach Investigations Report (DBIR)

URL: https://www.verizon.com/business/resources/reports/dbir/

Incident : ransomware CHA455090325

Source: CISA Known Exploited Vulnerabilities (KEV) Catalog

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Incident : ransomware CHA455090325

Source: FBI Internet Crime Complaint Center (IC3)

URL: https://www.ic3.gov

Incident : ransomware CHA455090325

Source: The Business Research Company (Ransomware Market Report)

URL: https://www.thebusinessresearchcompany.com

Incident : ransomware CHA455090325

Source: PurpleSec Ransomware Statistics 2025

URL: https://purplesec.us/ransomware-statistics/

Incident : ransomware CHA455090325

Source: DOJ Press Release: Qakbot Takedown (2025)

URL: https://www.justice.gov

Incident : ransomware CHA455090325

Source: Cybersecurity Dive

URL: https://www.cybersecuritydive.com

Incident : ransomware CHA455090325

Source: BlackKite Ransomware Report 2025

URL: https://www.blackkite.com

Incident : Cyberattack Trend Analysis CHA0555405090425

Source: Coherent Market Insights (CMI)

URL: https://www.coherentmarketinsights.com/insight/request-sample/8415

Date Accessed: 2025-09-04

Incident : Cyberattack Trend Analysis CHA0555405090425

Source: U.S. Department of Health and Human Services (HHS)

URL: https://www.hhs.gov

Incident : Cyberattack Trend Analysis CHA0555405090425

Source: Health Catalyst Press Release (AI Cyber Protection Solution)

Date Accessed: 2024-11-01

Incident : Ransomware CHA2962029091225

Source: Resilience Midyear 2025 Cyber Risk Landscape Report

Incident : Ransomware CHA2962029091225

Source: Help Net Security Interview with Judson Dressler (Resilience)

Incident : Data Breach CHA0892008100325

Source: The Register

Incident : Data Breach CHA0892008100325

Source: Goshen Medical Center Breach Notice

Incident : Data Breach CHA0892008100325

Source: Retina Group of Florida HHS Filing

Date Accessed: 2024-09-16

Incident : Data Breach CHA0892008100325

Source: Medical Associates of Brevard Breach Letter (PDF)

Incident : Data Breach CHA0892008100325

Source: Levi & Korsinsky Law Firm Investigation

Incident : Data Breach CHA4702047101025

Source: ITRC Annual Data Breach Report 2024

URL: https://www.idtheftcenter.org

Date Accessed: 2024

Incident : Data Breach CHA4702047101025

Source: Sophos: The State of Ransomware 2024

URL: https://www.sophos.com

Date Accessed: 2024

Incident : Data Breach CHA4702047101025

Source: Verizon 2025 Data Breach Investigations Report

URL: https://www.verizon.com/business/resources/reports/dbir/

Date Accessed: 2025

Incident : Data Breach CHA4702047101025

Source: SonicWall Cyber Threat Report 2024

URL: https://www.sonicwall.com/threat-report/

Date Accessed: 2024

Incident : Data Breach CHA4702047101025

Source: IBM Cost of a Data Breach Report 2024

URL: https://www.ibm.com/reports/data-breach

Date Accessed: 2024

Incident : Data Breach CHA4702047101025

Source: UK Government Cyber Security Breaches Survey 2024

URL: https://www.gov.uk/government/statistics

Date Accessed: 2024

Incident : Data Breach CHA4702047101025

Source: SEC Filing: Change Healthcare 8-K (February 2024)

URL: https://www.sec.gov/edgar/browse/

Date Accessed: 2024

Incident : Data Breach CHA4702047101025

Source: BBC: M&S, Co-op, Harrods Cyberattacks (April 2025)

URL: https://www.bbc.com/news

Date Accessed: 2025

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Source: Trustwave SpiderLabs Research (via Hackread.com)

Date Accessed: 2025

Incident : Data Breach CHA1032510111225

Source: Verizon Data Breach Investigations Report (DBIR)

URL: https://www.verizon.com/business/resources/reports/dbir/

Incident : Data Breach CHA1032510111225

Source: Specops Software - Active Directory Security

URL: https://specopssoft.com/

Incident : Data Breach CHA1032510111225

Source: Microsoft Security Guidance for Active Directory

URL: https://learn.microsoft.com/en-us/security/

Incident : Data Breach CHA1032510111225

Source: Change Healthcare Ransomware Attack Coverage (Various News Outlets)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington Attorney General's OfficeDate Accessed: 2025-04-18, and Source: California Attorney GeneralDate Accessed: 2024-08-03, and Source: Resilience, and Source: Article on Change Healthcare ransomware attack and healthcare cybersecurity trends, and Source: U.S. Department of Health and Human Services (HHS) investigation reports (referenced), and Source: Google's acquisition of Wiz (contextual reference), and Source: MalwareBytesUrl: https://www.malwarebytes.comDate Accessed: 2025-06-30, and Source: FlashpointUrl: https://www.flashpoint.ioDate Accessed: 2025-06-30, and Source: Recorded Future (The Record)Url: https://therecord.mediaDate Accessed: 2025-06-30, and Source: TrellixUrl: https://www.trellix.comDate Accessed: 2025-06-30, and Source: StatistaUrl: https://www.statista.com, and Source: Sophos State of Ransomware 2024Url: https://www.sophos.com/en-us/state-of-ransomware, and Source: IBM Security X-Force Threat IntelligenceUrl: https://www.ibm.com/security, and Source: Chainalysis 2025 Crypto Crime ReportUrl: https://www.chainalysis.com, and Source: Verizon 2025 Data Breach Investigations Report (DBIR)Url: https://www.verizon.com/business/resources/reports/dbir/, and Source: CISA Known Exploited Vulnerabilities (KEV) CatalogUrl: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, and Source: FBI Internet Crime Complaint Center (IC3)Url: https://www.ic3.gov, and Source: The Business Research Company (Ransomware Market Report)Url: https://www.thebusinessresearchcompany.com, and Source: PurpleSec Ransomware Statistics 2025Url: https://purplesec.us/ransomware-statistics/, and Source: DOJ Press Release: Qakbot Takedown (2025)Url: https://www.justice.gov, and Source: Cybersecurity DiveUrl: https://www.cybersecuritydive.com, and Source: BlackKite Ransomware Report 2025Url: https://www.blackkite.com, and Source: Coherent Market Insights (CMI)Url: https://www.coherentmarketinsights.com/insight/request-sample/8415Date Accessed: 2025-09-04, and Source: U.S. Department of Health and Human Services (HHS)Url: https://www.hhs.gov, and Source: Health Catalyst Press Release (AI Cyber Protection Solution)Date Accessed: 2024-11-01, and Source: Resilience Midyear 2025 Cyber Risk Landscape Report, and Source: Help Net Security Interview with Judson Dressler (Resilience), and Source: The Register, and Source: Goshen Medical Center Breach Notice, and Source: Retina Group of Florida HHS FilingDate Accessed: 2024-09-16, and Source: Medical Associates of Brevard Breach Letter (PDF), and Source: Levi & Korsinsky Law Firm Investigation, and Source: ITRC Annual Data Breach Report 2024Url: https://www.idtheftcenter.orgDate Accessed: 2024, and Source: Sophos: The State of Ransomware 2024Url: https://www.sophos.comDate Accessed: 2024, and Source: Verizon 2025 Data Breach Investigations ReportUrl: https://www.verizon.com/business/resources/reports/dbir/Date Accessed: 2025, and Source: SonicWall Cyber Threat Report 2024Url: https://www.sonicwall.com/threat-report/Date Accessed: 2024, and Source: IBM Cost of a Data Breach Report 2024Url: https://www.ibm.com/reports/data-breachDate Accessed: 2024, and Source: UK Government Cyber Security Breaches Survey 2024Url: https://www.gov.uk/government/statisticsDate Accessed: 2024, and Source: SEC Filing: Change Healthcare 8-K (February 2024)Url: https://www.sec.gov/edgar/browse/Date Accessed: 2024, and Source: BBC: M&S, Co-op, Harrods Cyberattacks (April 2025)Url: https://www.bbc.com/newsDate Accessed: 2025, and Source: Trustwave SpiderLabs Research (via Hackread.com)Date Accessed: 2025, and Source: Verizon Data Breach Investigations Report (DBIR)Url: https://www.verizon.com/business/resources/reports/dbir/, and Source: Specops Software - Active Directory SecurityUrl: https://specopssoft.com/, and Source: Microsoft Security Guidance for Active DirectoryUrl: https://learn.microsoft.com/en-us/security/, and Source: Change Healthcare Ransomware Attack Coverage (Various News Outlets).

Investigation Status

What is the current status of the investigation for each incident ?

Incident : ransomware CHA734082825

Investigation Status: Ongoing (HHS investigation as of 2024)

Incident : Ransomware Proliferation CHA630082925

Investigation Status: Ongoing (tracked by cybersecurity firms and law enforcement)

Incident : ransomware CHA455090325

Investigation Status: ['Ongoing for recent attacks (e.g., Change Healthcare, CDK Global)', 'Resolved for older cases (e.g., WannaCry, NotPetya)', 'Law enforcement actions (e.g., Qakbot, DanaBot takedowns)', 'Private forensic investigations (e.g., CommonSpirit, Medibank)']

Incident : Cyberattack Trend Analysis CHA0555405090425

Investigation Status: Ongoing (HHS investigations into 2025 breaches; market trends analysis)

Incident : Ransomware CHA2962029091225

Investigation Status: Ongoing (trend analysis based on H1 2025 cyber insurance claims)

Incident : Data Breach CHA0892008100325

Investigation Status: ['Ongoing (e.g., Retina Group of Florida under legal scrutiny)']

Incident : Data Breach CHA4702047101025

Investigation Status: [{'incident': 'Change Healthcare', 'status': 'Ongoing (ransom paid, forensic analysis)'}, {'incident': 'AT&T', 'status': 'Ongoing (2019 breach, dark web monitoring)'}, {'incident': 'Ascension', 'status': 'Ongoing (data theft confirmed, recovery phase)'}, {'incident': 'M&S/Co-op/Harrods', 'status': 'Contained (failed ransomware, systems restored)'}, {'incident': 'General Trends', 'status': 'Continuous (industry-wide threat intelligence)'}]

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Investigation Status: Ongoing (active since 2017, with recent 2025 campaigns)

Incident : Data Breach CHA1032510111225

Investigation Status: Likely Ongoing (2024–2025)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Reports By Cybersecurity Firms, Media Coverage Of Gang Fragmentation, Public Disclosures (E.G., Colonial Pipeline, Change Healthcare), Customer Notifications (E.G., Patelco Credit Union, Healthcorps), Regulatory Filings (E.G., Sensata Technologies, Sec), Press Releases (E.G., British Library, 2023), Public Disclosures (E.G., Hhs Breach Reports), Patient Notification Campaigns (Where Applicable), Stakeholder Advisories On Vendor Risks, Employee Training On Ai-Powered Phishing, Breach Notification Letters To Affected Individuals, Public Disclosures (E.G., Retina Group’S Report To State Ags And Hhs), Pdf Letter Posted On Mab’S Website, Public Disclosures (Sec Filings, Press Releases), Customer Advisories (At&T, M&S) and Transparency Reports (Healthcare Breaches).

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : ransomware CHA455090325

Stakeholder Advisories: Unitedhealth Group (Change Healthcare Breach Updates), Cdk Global Customer Notifications (2024), Hhs Advisories For Healthcare Sector (2024–2025), Cisa Alerts On Ransomware Trends (E.G., #Stopransomware), Fbi Warnings On Raas And Phishing (2025).

Customer Advisories: Credit monitoring for affected individuals (e.g., Patelco Credit Union, Healthcorps)Password reset recommendations (e.g., after credential leaks)Fraud alerts for financial data exposure (e.g., Spanish Tax Agency)Healthcare providers’ notifications to patients (e.g., Medibank, CommonSpirit)

Incident : Cyberattack Trend Analysis CHA0555405090425

Stakeholder Advisories: Fda Guidance On Medical Device Cybersecurity (2023), Hhs Cybersecurity Best Practices For Healthcare Providers.

Customer Advisories: Change Healthcare patient notification (2024)General alerts from affected healthcare providers

Incident : Ransomware CHA2962029091225

Stakeholder Advisories: Cisos Advised To Prioritize Dynamic Vendor Risk Management And Ai Threat Detection., Boards Urged To Allocate Budget For Supply Chain Resilience And Behavioral Security Tools..

Customer Advisories: Organizations using CDK Global or Change Healthcare services were likely notified of disruptions.General guidance issued on recognizing AI-powered phishing (e.g., voice synthesis, browser-based attacks).

Incident : Data Breach CHA0892008100325

Stakeholder Advisories: Breach Notifications To State Ags, Hhs, And Affected Individuals.

Customer Advisories: Credit monitoring services offeredBreach letters mailed to victims

Incident : Data Breach CHA4702047101025

Stakeholder Advisories: Healthcare: Hhs Bulletins On Ransomware Resilience, Retail: Pci Dss Updates For Payment Security, Telecom: Fcc Guidelines On Customer Data Protection, Smbs: Cisa Resources For Ransomware Readiness.

Customer Advisories: AT&T: Credit monitoring for affected customersM&S: Password reset prompts, transaction reviewsChange Healthcare: Prescription workflow updatesGeneral: FTC tips on phishing/vishing avoidance

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Unitedhealth Group (Change Healthcare Breach Updates), Cdk Global Customer Notifications (2024), Hhs Advisories For Healthcare Sector (2024–2025), Cisa Alerts On Ransomware Trends (E.G., #Stopransomware), Fbi Warnings On Raas And Phishing (2025), Credit Monitoring For Affected Individuals (E.G., Patelco Credit Union, Healthcorps), Password Reset Recommendations (E.G., After Credential Leaks), Fraud Alerts For Financial Data Exposure (E.G., Spanish Tax Agency), Healthcare Providers’ Notifications To Patients (E.G., Medibank, Commonspirit), , Fda Guidance On Medical Device Cybersecurity (2023), Hhs Cybersecurity Best Practices For Healthcare Providers, Change Healthcare Patient Notification (2024), General Alerts From Affected Healthcare Providers, , Cisos Advised To Prioritize Dynamic Vendor Risk Management And Ai Threat Detection., Boards Urged To Allocate Budget For Supply Chain Resilience And Behavioral Security Tools., Organizations Using Cdk Global Or Change Healthcare Services Were Likely Notified Of Disruptions., General Guidance Issued On Recognizing Ai-Powered Phishing (E.G., Voice Synthesis, Browser-Based Attacks)., , Breach Notifications To State Ags, Hhs, And Affected Individuals, Credit Monitoring Services Offered, Breach Letters Mailed To Victims, , Healthcare: Hhs Bulletins On Ransomware Resilience, Retail: Pci Dss Updates For Payment Security, Telecom: Fcc Guidelines On Customer Data Protection, Smbs: Cisa Resources For Ransomware Readiness, At&T: Credit Monitoring For Affected Customers, M&S: Password Reset Prompts, Transaction Reviews, Change Healthcare: Prescription Workflow Updates, General: Ftc Tips On Phishing/Vishing Avoidance and .

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : ransomware CHA734082825

Entry Point: Server lacking multi-factor authentication (MFA)

High Value Targets: Patient Health Records, Payment Processing Systems,

Data Sold on Dark Web: Patient Health Records, Payment Processing Systems,

Incident : Ransomware Proliferation CHA630082925

Entry Point: Vpn Exploits, Phishing, Stolen Credentials, Unpatched Vulnerabilities,

Backdoors Established: True

High Value Targets: Healthcare (E.G., Change Healthcare), Financial Institutions, Critical Infrastructure,

Data Sold on Dark Web: Healthcare (E.G., Change Healthcare), Financial Institutions, Critical Infrastructure,

Incident : ransomware CHA455090325

Entry Point: Phishing Emails (67% Of Attacks), Unpatched Vulnerabilities (32%), Rdp Compromise (30% In Smbs), Stolen Credentials (29%), Third-Party Software (25%), Malicious Ads/Websites (E.G., Fake Chrome Updates For Spora), Botnets (E.G., Necurs For Locky, Qakbot For Ransomware Delivery),

Reconnaissance Period: ['weeks to months (e.g., APT-style attacks)', 'rapid exploitation (e.g., zero-days like MOVEit)']

Backdoors Established: ['common in RaaS attacks (e.g., LockBit, BlackCat)', 'persistent access via RDP or VPN flaws']

High Value Targets: Healthcare (E.G., Change Healthcare, Medibank), Critical Infrastructure (E.G., Colonial Pipeline, Port Of Nagoya), Supply Chain Providers (E.G., Moveit, Kaseya), Municipalities (E.G., Baltimore, Lake City),

Data Sold on Dark Web: Healthcare (E.G., Change Healthcare, Medibank), Critical Infrastructure (E.G., Colonial Pipeline, Port Of Nagoya), Supply Chain Providers (E.G., Moveit, Kaseya), Municipalities (E.G., Baltimore, Lake City),

Incident : Cyberattack Trend Analysis CHA0555405090425

Entry Point: Exploited Vulnerabilities In Unpatched Medical Devices, Phishing Emails Targeting Healthcare Employees, Compromised Third-Party Vendors (E.G., It Service Providers),

Backdoors Established: Likely in long-term campaigns (e.g., ransomware groups)

High Value Targets: Ehr Systems, Diagnostic Imaging Devices, Insulin Pumps/Pacemakers (Life-Critical Devices),

Data Sold on Dark Web: Ehr Systems, Diagnostic Imaging Devices, Insulin Pumps/Pacemakers (Life-Critical Devices),

Incident : Ransomware CHA2962029091225

Entry Point: Compromised Vendor Systems (E.G., Cdk Global, Change Healthcare), Phishing/Impersonation (Ai-Enhanced),

High Value Targets: It Helpdesks (For Credential Harvesting), Vendor Portals With Supply Chain Access,

Data Sold on Dark Web: It Helpdesks (For Credential Harvesting), Vendor Portals With Supply Chain Access,

Incident : Data Breach CHA0892008100325

Reconnaissance Period: ['~1 month (Goshen: Feb 15–Mar 4 detection)']

High Value Targets: Pii, Phi, Financial Data,

Data Sold on Dark Web: Pii, Phi, Financial Data,

Incident : Data Breach CHA4702047101025

Entry Point: Phishing Emails (Ascension Malware Download), Exploited Vulnerabilities (Change Healthcare), Compromised Credentials (At&T 2019 Breach), Third-Party Vendors (Supply Chain Attacks), Unpatched Iot Devices (Lateral Movement),

Reconnaissance Period: ['Weeks-Months (APT groups)', 'Days (opportunistic ransomware)']

Backdoors Established: ['Persistent access (BlackCat/AlphV)', 'Web shells (Ascension)']

High Value Targets: Healthcare (Phi, Insurance Data), Financial (Payment Systems, Bec), Government (Military Personnel Records),

Data Sold on Dark Web: Healthcare (Phi, Insurance Data), Financial (Payment Systems, Bec), Government (Military Personnel Records),

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Entry Point: Compromised Wordpress Sites (Wp-Admin Exploits), Domain Shadowing (Malicious Subdomains), Malvertising (E.G., Google Ads Impersonating Hr Portals),

Backdoors Established: Likely (for persistent access)

High Value Targets: Healthcare Organizations (E.G., Change Healthcare, Rite Aid), Enterprises With Valuable Data,

Data Sold on Dark Web: Healthcare Organizations (E.G., Change Healthcare, Rite Aid), Enterprises With Valuable Data,

Incident : Data Breach CHA1032510111225

Entry Point: Server Without MFA

Backdoors Established: Likely (Persistent AD Access via Golden Ticket/DCSync)

High Value Targets: Active Directory, Domain Controllers, Health Records Databases,

Data Sold on Dark Web: Active Directory, Domain Controllers, Health Records Databases,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Cyber Incident CHA1011070724

Root Causes: Lack of preparedness in evolving and securing AI technologies

Incident : Ransomware CHA541081125

Root Causes: Third-party vendor compromise, human error, poor vendor oversight, failed disaster recovery tests, untested backups

Incident : ransomware CHA734082825

Root Causes: Lack Of Multi-Factor Authentication (Mfa) On Critical Server, Inadequate Segmentation Of High-Value Data Repositories, Failure To Detect Or Prevent Lateral Movement By Attackers, Potential Insider Threat Or Credential Compromise (Unconfirmed),

Corrective Actions: Mandatory Mfa Implementation Across All Systems, Enhanced Network Segmentation And Zero-Trust Architecture, Increased Investment In Ai-Driven Threat Detection And Response, Third-Party Security Audits For All Vendors Handling Phi, Regulatory Push For Stricter Cybersecurity Standards In Healthcare,

Incident : Ransomware Proliferation CHA630082925

Root Causes: Law Enforcement Takedowns Scattering Affiliates Without Arrests, Leaked Ransomware Source Code (E.G., Lockbit, Conti), Commoditization Of Malware Tools And Ai Lowering Entry Barriers, Distrust Among Affiliates Due To Infiltrations (E.G., Lockbit, Hive), Financial Disputes And Underpayment In Large Raas Groups,

Corrective Actions: Targeted Arrests Of Threat Actors, Not Just Infrastructure Disruption, Dark Web Monitoring For Leaked Code And Initial Access Sales, Public-Private Partnerships To Share Threat Intelligence, Adaptive Defenses Against Fragmented, Smaller Ransomware Groups,

Incident : ransomware CHA455090325

Root Causes: Unpatched Vulnerabilities (E.G., Eternalblue, Moveit), Lack Of Mfa (E.G., Rdp Compromises), Poor Segmentation (E.G., Lateral Movement In Colonial Pipeline), Inadequate Backups (E.G., Baltimore’S $18M Recovery), Third-Party Risks (E.G., Supply Chain Attacks), Human Error (E.G., Phishing Clicks), Insufficient Employee Training (E.G., Recognizing Phishing),

Corrective Actions: Mandatory **Mfa** Implementation, Accelerated **Patch Management** For Kev Vulnerabilities, **Network Segmentation** To Limit Blast Radius, **Immutable Backups** With Offline Storage, **Incident Response Drills** Quarterly, **Threat Hunting** For Early Detection, **Vendor Risk Assessments** For Third Parties, **Dark Web Monitoring** For Leaked Credentials, **Ai-Driven Anomaly Detection** (E.G., For Phishing), **Cyber Insurance** Policy Reviews,

Incident : Cyberattack Trend Analysis CHA0555405090425

Root Causes: Inadequate Security-By-Design In Iomt Devices, Delayed Patch Management For Known Vulnerabilities, Over-Reliance On Perimeter Security Without Segmentation, Lack Of Ai-Driven Threat Detection In Legacy Systems,

Corrective Actions: Fda’S 2023 Cybersecurity Requirements For New Medical Devices, Adoption Of Iss Secure Platform For Medical (Iss-Spm) By Manufacturers, Healthcare Provider Investments In Ai-Based Security (E.G., Blueprint Protect™),

Incident : Ransomware CHA2962029091225

Root Causes: Over-Reliance On Static Vendor Assessments., Inadequate Protections Against Ai-Amplified Social Engineering., Lack Of Segmented Backups Enabling Ransomware Spread., Single Points Of Failure In Critical Supply Chains.,

Corrective Actions: Shift To Continuous Vendor Monitoring With Financial Risk Modeling., Integration Of Behavioral Baselines Into Anomaly Detection., Mandatory Zero Trust Adoption For High-Risk Vendors., Expanded Red-Teaming For Ai Threat Scenarios.,

Incident : Data Breach CHA0892008100325

Root Causes: Inadequate Intrusion Detection (Delayed Breach Discovery), Likely Exploitation Of Unpatched Vulnerabilities Or Phishing, Insufficient Segmentation Of Sensitive Data,

Corrective Actions: Mandatory Credit Monitoring For Victims, Regulatory Filings And Legal Disclosures, Potential Litigation-Driven Security Overhauls (E.G., Retina Group Of Florida),

Incident : Data Breach CHA4702047101025

Root Causes: Inadequate Patch Management (At&T, Iot), Lack Of Mfa (Ascension, Phishing), Over-Reliance On Legacy Firewalls (Encrypted Threats), Third-Party Risk Blindness (Change Healthcare), Insider Threat Neglect (Malicious/Accidental), Poor Iot Security Hygiene (Default Credentials),

Corrective Actions: Technical: ['Deploy EDR/XDR solutions', 'Implement network micro-segmentation', 'Upgrade to next-gen firewalls (NGFW)', 'Enforce least-privilege access'], Process: ['Mandate security awareness training (quarterly)', 'Conduct tabletop exercises (ransomware scenarios)', 'Automate threat intelligence sharing', 'Integrate threat hunting into SOC operations'], Governance: ['Appoint dedicated CISO/DSO roles', 'Align cybersecurity with business risk appetite', 'Increase board-level oversight', 'Adopt cybersecurity frameworks (NIST, ISO 27001)'],

Incident : Malware-as-a-Service (MaaS) CHA4192241102225

Root Causes: Over-Reliance On User Trust In Software Update Prompts., Inadequate Monitoring Of Website Subdomains (Enabling Domain Shadowing)., Lack Of Behavioral Detection For Malicious Scripts On Legitimate Sites., Profit-Driven Maas Model Lowering The Barrier For Cybercriminals.,

Incident : Data Breach CHA1032510111225

Root Causes: Lack Of Mfa On Critical Server (Initial Access Point)., Weak Password Policies (Reused/Breached Credentials)., Excessive Permissions For Service Accounts (Lateral Movement)., Unpatched Domain Controllers (Privilege Escalation Flaw)., Hybrid Environment Complexity (Azure Ad Connect Abuse)., Fragmented Security Tools (On-Premises Vs. Cloud Visibility Gaps).,

Corrective Actions: Mandated Mfa For All Privileged And Sync Accounts., Deployed **Specops Password Policy** To Block Compromised Credentials., Implemented **Just-In-Time (Jit) Access** For Administrative Tasks., Disabled **Ntlm** And Enforced Smb Signing., Unified **Siem/Xdr Monitoring** For Ad And Cloud Identities., Accelerated **Patch Management** For Domain Controllers., Conducted **Ad Security Assessment** And Red Team Exercises.,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Malwarebytes, Flashpoint, Recorded Future, Trellix, , Cybersecurity Firms (E.G., For Colonial Pipeline, Change Healthcare), Doj/Europol (Qakbot Takedown, 2025), Insurance Providers (E.G., Syracuse City School District, 2019), , Recommended Post-Incident, , Cybersecurity Firms (E.G., Integrity Security Services, Health Catalyst), Regulatory Bodies (Hhs, Fda, Eu Agencies), , AI-driven real-time threat analysis, Cyber Insurance Providers (E.G., Resilience), Threat Intelligence Sharing, , Behavioral Anomaly Detection, Ai-Powered Threat Detection For Social Engineering, , Cybersecurity Firms (Forensics, Recovery), Legal Counsel (Regulatory Compliance), Pr Agencies (Crisis Communications), , Siem Upgrades (Change Healthcare), Threat Intelligence Feeds (At&T), , Trustwave Spiderlabs (Research/Threat Intelligence), .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Mandatory Mfa Implementation Across All Systems, Enhanced Network Segmentation And Zero-Trust Architecture, Increased Investment In Ai-Driven Threat Detection And Response, Third-Party Security Audits For All Vendors Handling Phi, Regulatory Push For Stricter Cybersecurity Standards In Healthcare, , Targeted Arrests Of Threat Actors, Not Just Infrastructure Disruption, Dark Web Monitoring For Leaked Code And Initial Access Sales, Public-Private Partnerships To Share Threat Intelligence, Adaptive Defenses Against Fragmented, Smaller Ransomware Groups, , Mandatory **Mfa** Implementation, Accelerated **Patch Management** For Kev Vulnerabilities, **Network Segmentation** To Limit Blast Radius, **Immutable Backups** With Offline Storage, **Incident Response Drills** Quarterly, **Threat Hunting** For Early Detection, **Vendor Risk Assessments** For Third Parties, **Dark Web Monitoring** For Leaked Credentials, **Ai-Driven Anomaly Detection** (E.G., For Phishing), **Cyber Insurance** Policy Reviews, , Fda’S 2023 Cybersecurity Requirements For New Medical Devices, Adoption Of Iss Secure Platform For Medical (Iss-Spm) By Manufacturers, Healthcare Provider Investments In Ai-Based Security (E.G., Blueprint Protect™), , Shift To Continuous Vendor Monitoring With Financial Risk Modeling., Integration Of Behavioral Baselines Into Anomaly Detection., Mandatory Zero Trust Adoption For High-Risk Vendors., Expanded Red-Teaming For Ai Threat Scenarios., , Mandatory Credit Monitoring For Victims, Regulatory Filings And Legal Disclosures, Potential Litigation-Driven Security Overhauls (E.G., Retina Group Of Florida), , Technical: ['Deploy EDR/XDR solutions', 'Implement network micro-segmentation', 'Upgrade to next-gen firewalls (NGFW)', 'Enforce least-privilege access'], Process: ['Mandate security awareness training (quarterly)', 'Conduct tabletop exercises (ransomware scenarios)', 'Automate threat intelligence sharing', 'Integrate threat hunting into SOC operations'], Governance: ['Appoint dedicated CISO/DSO roles', 'Align cybersecurity with business risk appetite', 'Increase board-level oversight', 'Adopt cybersecurity frameworks (NIST, ISO 27001)'], , Mandated Mfa For All Privileged And Sync Accounts., Deployed **Specops Password Policy** To Block Compromised Credentials., Implemented **Just-In-Time (Jit) Access** For Administrative Tasks., Disabled **Ntlm** And Enforced Smb Signing., Unified **Siem/Xdr Monitoring** For Ad And Cloud Identities., Accelerated **Patch Management** For Domain Controllers., Conducted **Ad Security Assessment** And Red Team Exercises., .

Additional Questions

General Information

Has the company ever paid ransoms ?

Ransom Payment History: The company has Paid ransoms in the past.

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was 22 million USD.

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an BlackCat, BlackCat/ALPHVRansomHub, ALPHV/BlackCat gang, ALPHV/Blackcat, ALPHV/Blackcat ransomware group, BlackCatCl0pLockbitMedusaInterlock, Splintered LockBit affiliatesRebranded AlphV/BlackCat membersNew entrepreneurial ransomware groups (e.g., SafePay, Qilin, Akira, RansomHub)Initial Access Brokers (IABs)Former Conti/REvil affiliates, LockBit (most prolific in 2025, $91M in payments)RansomHub (most active in 2024–2025)Clop (MOVEit breach, 2023)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, Okta, 2022)Babuk (Washington DC Police, 2021)Scattered Spider (Marks & Spencer, 2025)Russian-linked groups (e.g., DanaBot, Qakbot)State-sponsored actors (e.g., 16 Russian nationals indicted for DanaBot), Cybercriminal groups leveraging AI tools (e.g., Claude Code)Ransomware operators targeting healthcare (e.g., Change Healthcare attackers)Initial Access Brokers (IABs) selling medical device access on dark web, BlackCat/AlphV (Ransomware Group, Nation-State Linked)Scattered Spider (Cybercrime Group)Unspecified APT Groups (Advanced Persistent Threats)Insider Threats (Malicious/Compromised)Opportunistic Cybercriminals (Phishing, BEC)Hacktivists (Data Leaks for Ideological Reasons), Name: TA569Type: Cybercriminal GroupMotivation: Financial (Malware-as-a-Service revenue)Affiliations: Evil Corp, Affiliations: Russian GRU Unit 29155 (state-sponsored link), Name: Evil CorpType: Russian Cybercrime SyndicateMotivation: Financial (ransomware, data theft)Affiliations: Russian intelligence services, Name: GRU Unit 29155Type: Russian Military IntelligenceMotivation: Espionage/State-Sponsored OperationsPayloads: Raspberry Robin worm and .

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023-02-21.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-02-00.

Impact of the Incidents

What was the highest financial loss from an incident ?

Highest Financial Loss: The highest financial loss from an incident was $6.3 billion.

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers, Treatment details, , phone numbers, addresses, financial information, health records, diagnoses, prescriptions, treatment details, , Sensitive data, Sensitive healthcare data, personal information, health information, , names, addresses, dates of birth, health insurance data, Social Security numbers, , 190 million records, Personal health information (PHI) of over 100 million individuals, Widespread (varies by group; e.g., Change Healthcare data leaked via multiple gangs), 93.3M individuals (MOVEit, 2023), 9.7M medical records (Medibank, 2022), 5.6M patient records (Healthcorps, 2024), 726K customers (Patelco Credit Union, 2024), 254K users (Kadokawa/Niconico, 2024), 500GB (Spanish Tax Agency, 2024), 1TB (Nvidia, 2022), 190GB (Samsung, 2022), 65GB (British Library, University of Hawaii, 2023), PII, payment info, medical records, corporate secrets (e.g., Apple blueprints via Quanta, 2021), , 215.7M+ records (Change Healthcare: 192.7M; H1 2025 breaches: 23M+), , 3B+ records (largest breach, Yahoo 2013), 198M Americans (healthcare breaches, 2024), 73M AT&T customers (SSNs, 2019 breach), 57M Uber users/drivers (2016), 339M Marriott guests (2018), PII, PHI, payment data, credentials, military/civilian records, , Sensitive business information, Credentials (via data-stealing malware), Potential PII/PHI (in healthcare attacks), , Health Records, Patient Data and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were Claims processingRevenue cycle services and AI technologies and and Medical billingPre-authorizations and Insurance eligibility checksPrior authorization requests and ApplicationsPharmaciesHealthcare providers and and electronic systemsinsurance verificationprior authorization processesclinical information exchangee-prescription services and Medical billing servicesPre-authorization services and network serversoperational systems and 300K+ computers (WannaCry, 150+ countries, 2017)650 servers + 150 apps (Sky Lakes Medical Center, 2021)800 servers (Costa Rica government, 2022)10TB data (Canon, 2020)740GB (Toshiba, 2021)1.4M patient records (Lubbock County, 2019)Port of Nagoya (10% of Japan’s trade disrupted, 2023)thousands of dealerships (CDK Global, 2024)US fuel supply (Colonial Pipeline, 2021)US meat supply (JBS, 2021) and IoT-enabled medical devices (wearables, implantables, diagnostic tools)Hospital networks and EHR systemsCloud-based healthcare platforms and Healthcare (Change Healthcare, Ascension)Telecom (AT&T)Retail (M&S, Co-op, Harrods)Government/Military (Pentagon 2015)IoT Devices (124% attack increase)Cloud Infrastructure (Cryptojacking) and End-user devices (via fake updates)Legitimate websites (compromised for distribution)Healthcare systems (e.g., Change Healthcare, Rite Aid) and Active DirectoryDomain ControllersHybrid Cloud Infrastructure (Azure AD)Patient Care Systems.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was malwarebytes, flashpoint, recorded future, trellix, , cybersecurity firms (e.g., for colonial pipeline, change healthcare), doj/europol (qakbot takedown, 2025), insurance providers (e.g., syracuse city school district, 2019), , cybersecurity firms (e.g., integrity security services, health catalyst), regulatory bodies (hhs, fda, eu agencies), , cyber insurance providers (e.g., resilience), threat intelligence sharing, , cybersecurity firms (forensics, recovery), legal counsel (regulatory compliance), pr agencies (crisis communications), , trustwave spiderlabs (research/threat intelligence), .

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Disconnecting its systems, Infrastructure disruption (e.g., LockBit takedown)International Ransomware Task Force operations, network isolation (e.g., Change Healthcare, CDK Global)system shutdowns (e.g., Baltimore, 2019)disabling RDP access (common in SMBs)patching zero-days (e.g., MOVEit, 2023), Deployment of AI-based threat detection (e.g., BluePrint Protect™)Network segmentation for IoMT devicesEndpoint security upgrades, Isolation of compromised vendor systemsDisabling affected accounts (post-phishing), Network isolation (Ascension and retailers)Endpoint detection/response (EDR) deploymentDark web monitoring (AT&T)Password resets (M&S customers).

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 339M Marriott guests (2018), dates of birth, personal information, 73M AT&T customers (SSNs, 2019 breach), 254K users (Kadokawa/Niconico, 2024), Health Records, 198M Americans (healthcare breaches, 2024), 215.7M+ records (Change Healthcare: 192.7M; H1 2025 breaches: 23M+), Potential PII/PHI (in healthcare attacks), phone numbers, health information, Sensitive data, Treatment details, 1TB (Nvidia, 2022), Credentials (via data-stealing malware), 3B+ records (largest breach, Yahoo 2013), health insurance data, prescriptions, names, Patient Data, addresses, Widespread (varies by group; e.g., Change Healthcare data leaked via multiple gangs), diagnoses, 500GB (Spanish Tax Agency, 2024), PII, payment info, medical records, corporate secrets (e.g., Apple blueprints via Quanta, 2021), 726K customers (Patelco Credit Union, 2024), 190 million records, financial information, treatment details, 5.6M patient records (Healthcorps, 2024), Sensitive healthcare data, PII, PHI, payment data, credentials, military/civilian records, 190GB (Samsung, 2022), Personal health information (PHI) of over 100 million individuals, Sensitive business information, 65GB (British Library, University of Hawaii, 2023), Names, health records, Social Security numbers, 93.3M individuals (MOVEit, 2023), 9.7M medical records (Medibank, 2022) and 57M Uber users/drivers (2016).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 873.2M.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $4 million.

Regulatory Compliance

What was the highest fine imposed for a regulatory violation ?

Highest Fine Imposed: The highest fine imposed for a regulatory violation was Potential: $4.99M (insider threat average), Undisclosed (ongoing investigations), .

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuits for cybersecurity negligence, , Class action lawsuits, , Lawsuits, Multiple lawsuits, Multiple lawsuits, Investigation by U.S. Department of Health and Human Services (HHS), International Ransomware Task Force operations, Infrastructure seizures, , lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims), , HHS investigations into 307 breaches (H1 2025), Potential class-action lawsuits, , Investigation by law firms (e.g., Levi & Korsinsky for Retina Group of Florida), , Class-action lawsuits (AT&T, healthcare breaches), Regulatory probes (SEC, ICO UK), .

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Password policies must evolve: block breached credentials, enforce MFA, and use dynamic feedback for users.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Prepare for **double/triple extortion** with data leak response plans., Develop and **test incident response plans** annually., Prioritize encryption for data at rest and in transit in medical devices., Evaluate **cyber insurance** coverage for ransomware scenarios., Enhance international cooperation to track and arrest threat actors, not just disrupt infrastructure., Monitor **dark web** for leaked credentials or data., Invest in **threat intelligence** to preempt zero-day exploits., Monitor dark web for signs of stolen data or credential sales., Category: Hybrid Environment Security, , Monitor dark web forums for leaked ransomware code and initial access broker activities., Prepare for decentralized attacks from smaller, entrepreneurial ransomware groups., Invest in employee training to recognize phishing/social engineering attacks., Treat insurance policies as sensitive documents, Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Implement **immutable backups** and test recovery processes regularly., Conduct regular third-party security audits to identify vulnerabilities., Deploy behavioral analysis tools to detect malicious scripts on legitimate sites., Implement strict access controls for WordPress admin panels and other CMS platforms., Isolate **third-party integrations** and vet vendors rigorously., Include all critical data types in tested backup strategies, Adopt zero-trust architectures for medical device networks., Quantify cyber risk in financial terms to guide investment, Block known malicious TDS (e.g., Keitaro, Parrot TDS) at the network level., Deploy **Multi-Factor Authentication (MFA)** across all access points., Invest in employee training to recognize and respond to phishing and social engineering attacks., Invest in employee training to counter AI-generated phishing attacks., Segment networks to limit lateral movement by attackers., Adopt AI-driven tools to prioritize and remediate vulnerabilities proactively., Monitor and secure website subdomains to prevent Domain Shadowing., Collaborate with cybersecurity firms for continuous threat intelligence sharing., Apply the **principle of least privilege** to minimize attack surfaces., Disable **RDP** where possible; use VPNs with MFA., Implement proactive threat hunting for emerging ransomware strains derived from leaked codebases (e.g., LockBit, Conti)., Category: Detection & Response, , Train staff on phishing, social engineering, and safe data handling, Segment networks to **limit lateral movement**., Category: Active Directory Hardening, , Engage **red team exercises** to simulate ransomware attacks., Implement AI-based anomaly detection (e.g., Health Catalyst’s BluePrint Protect™)., Reassess cybersecurity measures in the healthcare industry, Strengthen defenses against initial access vectors (e.g., VPN exploits, phishing)., Educate users on verifying software update sources before execution., Assume breach posture: segment networks to limit lateral movement post-infection., Implement MFA across all critical systems, especially those handling PHI., Collaborate with threat intelligence providers to track MaaS platforms like SocGholish., Category: Privileged Access Management (PAM), , Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Train employees on **phishing awareness** and social engineering., Monitor third-party vendors continuously, Develop and test incident response plans specifically tailored to ransomware scenarios., Implement stricter access controls for high-value data (e.g., SSNs, PHI)., Develop incident response playbooks tailored to healthcare-specific threats., Enhance intrusion detection systems to reduce dwell time., Conduct regular penetration testing and red team exercises to identify weak points., Category: Credential Security, , Regularly test incident response plans under realistic conditions and Enhance third-party risk management for vendors handling sensitive data..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are U.S. Department of Health and Human Services (HHS), Flashpoint, U.S. Department of Health and Human Services (HHS) investigation reports (referenced), Coherent Market Insights (CMI), Microsoft Security Guidance for Active Directory, The Register, Verizon 2025 Data Breach Investigations Report, IBM Cost of a Data Breach Report 2024, Levi & Korsinsky Law Firm Investigation, SonicWall Cyber Threat Report 2024, FBI Internet Crime Complaint Center (IC3), Medical Associates of Brevard Breach Letter (PDF), Sophos State of Ransomware 2024, MalwareBytes, BlackKite Ransomware Report 2025, Trustwave SpiderLabs Research (via Hackread.com), California Attorney General, Article on Change Healthcare ransomware attack and healthcare cybersecurity trends, PurpleSec Ransomware Statistics 2025, Cybersecurity Dive, ITRC Annual Data Breach Report 2024, Resilience Midyear 2025 Cyber Risk Landscape Report, Trellix, Health Catalyst Press Release (AI Cyber Protection Solution), Google's acquisition of Wiz (contextual reference), The Business Research Company (Ransomware Market Report), BBC: M&S, Co-op, Harrods Cyberattacks (April 2025), Sophos: The State of Ransomware 2024, IBM Security X-Force Threat Intelligence, Chainalysis 2025 Crypto Crime Report, Verizon 2025 Data Breach Investigations Report (DBIR), Retina Group of Florida HHS Filing, Washington Attorney General's Office, Specops Software - Active Directory Security, Recorded Future (The Record), Statista, UK Government Cyber Security Breaches Survey 2024, Change Healthcare Ransomware Attack Coverage (Various News Outlets), SEC Filing: Change Healthcare 8-K (February 2024), DOJ Press Release: Qakbot Takedown (2025), Goshen Medical Center Breach Notice, CISA Known Exploited Vulnerabilities (KEV) Catalog, Verizon Data Breach Investigations Report (DBIR), Resilience and Help Net Security Interview with Judson Dressler (Resilience).

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.malwarebytes.com, https://www.flashpoint.io, https://therecord.media, https://www.trellix.com, https://www.statista.com, https://www.sophos.com/en-us/state-of-ransomware, https://www.ibm.com/security, https://www.chainalysis.com, https://www.verizon.com/business/resources/reports/dbir/, https://www.cisa.gov/known-exploited-vulnerabilities-catalog, https://www.ic3.gov, https://www.thebusinessresearchcompany.com, https://purplesec.us/ransomware-statistics/, https://www.justice.gov, https://www.cybersecuritydive.com, https://www.blackkite.com, https://www.coherentmarketinsights.com/insight/request-sample/8415, https://www.hhs.gov, https://www.idtheftcenter.org, https://www.sophos.com, https://www.verizon.com/business/resources/reports/dbir/, https://www.sonicwall.com/threat-report/, https://www.ibm.com/reports/data-breach, https://www.gov.uk/government/statistics, https://www.sec.gov/edgar/browse/, https://www.bbc.com/news, https://www.verizon.com/business/resources/reports/dbir/, https://specopssoft.com/, https://learn.microsoft.com/en-us/security/ .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (HHS investigation as of 2024).

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was UnitedHealth Group (Change Healthcare breach updates), CDK Global customer notifications (2024), HHS advisories for healthcare sector (2024–2025), CISA alerts on ransomware trends (e.g., #StopRansomware), FBI warnings on RaaS and phishing (2025), FDA guidance on medical device cybersecurity (2023), HHS cybersecurity best practices for healthcare providers, CISOs advised to prioritize dynamic vendor risk management and AI threat detection., Boards urged to allocate budget for supply chain resilience and behavioral security tools., Breach notifications to state AGs, HHS, and affected individuals, Healthcare: HHS bulletins on ransomware resilience, Retail: PCI DSS updates for payment security, Telecom: FCC guidelines on customer data protection, SMBs: CISA resources for ransomware readiness, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Credit monitoring for affected individuals (e.g., Patelco Credit Union, Healthcorps)Password reset recommendations (e.g., after credential leaks)Fraud alerts for financial data exposure (e.g., Spanish Tax Agency)Healthcare providers’ notifications to patients (e.g., Medibank, CommonSpirit), Change Healthcare patient notification (2024)General alerts from affected healthcare providers, Organizations using CDK Global or Change Healthcare services were likely notified of disruptions.General guidance issued on recognizing AI-powered phishing (e.g., voice synthesis, browser-based attacks)., Credit monitoring services offeredBreach letters mailed to victims, AT&T: Credit monitoring for affected customersM&S: Password reset prompts and transaction reviewsChange Healthcare: Prescription workflow updatesGeneral: FTC tips on phishing/vishing avoidance.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Server Without MFA and Server lacking multi-factor authentication (MFA).

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was weeks to months (e.g., APT-style attacks)rapid exploitation (e.g., zero-days like MOVEit), ~1 month (Goshen: Feb 15–Mar 4 detection), Weeks-Months (APT groups)Days (opportunistic ransomware).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Lack of preparedness in evolving and securing AI technologies, Third-party vendor compromise, human error, poor vendor oversight, failed disaster recovery tests, untested backups, Lack of multi-factor authentication (MFA) on critical serverInadequate segmentation of high-value data repositoriesFailure to detect or prevent lateral movement by attackersPotential insider threat or credential compromise (unconfirmed), Law enforcement takedowns scattering affiliates without arrestsLeaked ransomware source code (e.g., LockBit, Conti)Commoditization of malware tools and AI lowering entry barriersDistrust among affiliates due to infiltrations (e.g., LockBit, Hive)Financial disputes and underpayment in large RaaS groups, unpatched vulnerabilities (e.g., EternalBlue, MOVEit)lack of MFA (e.g., RDP compromises)poor segmentation (e.g., lateral movement in Colonial Pipeline)inadequate backups (e.g., Baltimore’s $18M recovery)third-party risks (e.g., supply chain attacks)human error (e.g., phishing clicks)insufficient employee training (e.g., recognizing phishing), Inadequate security-by-design in IoMT devicesDelayed patch management for known vulnerabilitiesOver-reliance on perimeter security without segmentationLack of AI-driven threat detection in legacy systems, Over-reliance on static vendor assessments.Inadequate protections against AI-amplified social engineering.Lack of segmented backups enabling ransomware spread.Single points of failure in critical supply chains., Inadequate intrusion detection (delayed breach discovery)Likely exploitation of unpatched vulnerabilities or phishingInsufficient segmentation of sensitive data, Inadequate patch management (AT&T, IoT)Lack of MFA (Ascension, phishing)Over-reliance on legacy firewalls (encrypted threats)Third-party risk blindness (Change Healthcare)Insider threat neglect (malicious/accidental)Poor IoT security hygiene (default credentials), Over-reliance on user trust in software update prompts.Inadequate monitoring of website subdomains (enabling Domain Shadowing).Lack of behavioral detection for malicious scripts on legitimate sites.Profit-driven MaaS model lowering the barrier for cybercriminals., Lack of MFA on critical server (initial access point).Weak password policies (reused/breached credentials).Excessive permissions for service accounts (lateral movement).Unpatched domain controllers (privilege escalation flaw).Hybrid environment complexity (Azure AD Connect abuse).Fragmented security tools (on-premises vs. cloud visibility gaps)..

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Mandatory MFA implementation across all systemsEnhanced network segmentation and zero-trust architectureIncreased investment in AI-driven threat detection and responseThird-party security audits for all vendors handling PHIRegulatory push for stricter cybersecurity standards in healthcare, Targeted arrests of threat actors, not just infrastructure disruptionDark web monitoring for leaked code and initial access salesPublic-private partnerships to share threat intelligenceAdaptive defenses against fragmented, smaller ransomware groups, mandatory **MFA** implementationaccelerated **patch management** for KEV vulnerabilities**network segmentation** to limit blast radius**immutable backups** with offline storage**incident response drills** quarterly**threat hunting** for early detection**vendor risk assessments** for third parties**dark web monitoring** for leaked credentials**AI-driven anomaly detection** (e.g., for phishing)**cyber insurance** policy reviews, FDA’s 2023 cybersecurity requirements for new medical devicesAdoption of ISS Secure Platform for Medical (ISS-SPM) by manufacturersHealthcare provider investments in AI-based security (e.g., BluePrint Protect™), Shift to continuous vendor monitoring with financial risk modeling.Integration of behavioral baselines into anomaly detection.Mandatory Zero Trust adoption for high-risk vendors.Expanded red-teaming for AI threat scenarios., Mandatory credit monitoring for victimsRegulatory filings and legal disclosuresPotential litigation-driven security overhauls (e.g., Retina Group of Florida), technical: ['Deploy EDR/XDR solutions', 'Implement network micro-segmentation', 'Upgrade to next-gen firewalls (NGFW)', 'Enforce least-privilege access'], process: ['Mandate security awareness training (quarterly)', 'Conduct tabletop exercises (ransomware scenarios)', 'Automate threat intelligence sharing', 'Integrate threat hunting into SOC operations'], governance: ['Appoint dedicated CISO/DSO roles', 'Align cybersecurity with business risk appetite', 'Increase board-level oversight', 'Adopt cybersecurity frameworks (NIST, ISO 27001)'], , Mandated MFA for all privileged and sync accounts.Deployed **Specops Password Policy** to block compromised credentials.Implemented **just-in-time (JIT) access** for administrative tasks.Disabled **NTLM** and enforced SMB signing.Unified **SIEM/XDR monitoring** for AD and cloud identities.Accelerated **patch management** for domain controllers.Conducted **AD security assessment** and red team exercises..

cve

Latest Global CVEs (Not Company-Specific)

Description

Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Description

Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.

Risk Information
cvss4
Base: 8.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from 1.0.0 through 2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

Improper Privilege Management vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from v2.9.0 through v2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Description

File upload vulnerability in HCL Technologies Ltd. Unica 12.0.0.

Risk Information
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=change-healthcare' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge