
Optum Company Cyber Security Posture
optum.comWeโre evolving health care so everyone can have the opportunity to live their healthiest life. Itโs why we put your unique needs at the heart of everything we do, making it easy and affordable to manage health and well-being. We are delivering the right care how and when itโs needed; providing support to make smarter and healthier choices; and making prescription services easier, while helping you save money along the way. Itโs everything health care should be. Together, for better health. Optum is part of UnitedHealth Group (NYSE: UNH).
Optum Company Details
optum
91223 employees
1108805.0
62
Hospitals and Health Care
optum.com
Scan still pending
OPT_2870801
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Optum Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Optum Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
UnitedHealthcare | Breach | 100 | 4 | 08/2022 | UNI1211161222 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The company experienced a data breach after filing official documents with the Attorney General of Texas. The breach resulted in the names, addresses, health insurance information, and medical information being compromised. Leaked healthcare data was indeed protected healthcare information. They had sufficient information about a patient to carry out healthcare identity fraud. | |||||||
UnitedHealth Group Inc. | Breach | 100 | 5 | 4/2024 | UNI457070524 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: UnitedHealth Group Inc. experienced a substantial cybersecurity breach at its Change Healthcare unit, leading to significant financial repercussions. The breach resulted in immediate response costs and broader business disruption, totaling approximately $872 million in the first quarter, with projections of the total pre-tax cost reaching between $1.35 billion and $1.6 billion. Additionally, UnitedHealth is allocating $800 million as claims reserves, to address potential claims from providers due to interrupted services since the breach was reported on February 21. The breach has affected both the network security of Change Healthcare and the continuity of services to providers and partners. | |||||||
UnitedHealth Group | Breach | 100 | 5 | 7/2024 | UNI000072624 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: UnitedHealth Group, a health insurance company, reported significant financial implications due to the Change Healthcare cyberattack, with estimated costs between $2.3 and $2.45 billion for 2024. This cyberattack has not only led to direct response costs but also necessitated substantial financial support for healthcare providers. Despite the breach, UnitedHealth managed revenue growth, signaling resilience amidst the cyber incident. | |||||||
UnitedHealthcare | Breach | 100 | 5 | 12/2024 | UNI000121024 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: The CEO of UnitedHealthcare, Brian Thompson, was tragically shot and killed in New York City. The suspected shooter, Luigi Mangione, was arrested shortly thereafter. Police found evidence suggesting motivations related to healthcare system criticisms. Bullet casings at the scene had words inscribed that imply dissatisfaction with health insurance coverage processes. Authorities also found a manifesto carried by Mangione that condemned healthcare companies for prioritizing profits over care. This event has led to a significant impact on UnitedHealthcareโs reputation, with potential financial implications due to the loss of its CEO and the adverse publicity surrounding the circumstances of his death. | |||||||
UnitedHealth Group | Breach | 100 | 4 | 1/2025 | UNI000013125 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: UnitedHealth Group, parent company of Change Healthcare, reported a cyber-attack affecting 190 million individuals, an increase of 90 million from initial reports. As one of the largest healthcare payment processors, this incident is the most severe healthcare data breach of 2024. The breach, perpetrated by ransomware group ALPHV/Blackcat, led to substantial financial consequences with costs reaching $3.1 billion, according to the company's financial results. This breach has not only compromised the personal information of millions but also resulted in multiple lawsuits against UnitedHealth Group. | |||||||
UnitedHealthcare | Breach | 60 | 4 | 12/2022 | UNI543072525 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The California Office of the Attorney General reported that UnitedHealthcare experienced a data breach affecting individuals' health information. The breach was detected on December 29, 2022, and it involved unauthorized access to the UHC broker portal, affecting information from December 1, 2022, to January 25, 2023. The breach potentially exposed first and last names, member ID numbers, plan effective dates, and other plan-related information, but not Social Security numbers or financial account information. | |||||||
OptumRx | Breach | 50 | 2 | 3/2016 | OPT846072525 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: The California Office of the Attorney General reported a data breach incident involving OptumRx on April 8, 2016. The breach occurred on March 16, 2016, when an unencrypted laptop belonging to a vendor was stolen in Indianapolis, Indiana, potentially exposing names, addresses, health plan information, prescription drug details, and in some cases, dates of birth. Approximately UNKN individuals were affected, and no financial information was compromised. | |||||||
UnitedHealthcare | Breach | 85 | 4 | 9/2012 | UNI532072725 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: On January 28, 2013, the California Office of the Attorney General reported a data breach involving RR Donnelley, which included the theft of an unencrypted computer containing personal information of UnitedHealthcare members. The specific date of the breach is unknown, but it occurred sometime between the second half of September and the end of November 2012. The information potentially compromised includes names, addresses, and Social Security numbers, and approximately 2003 health benefit plan members were affected. | |||||||
UnitedHealthcare | Breach | 85 | 4 | 6/2011 | UNI146072825 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The California Office of the Attorney General reported a data breach involving UnitedHealth Group on March 30, 2012. The breach occurred from June 28, 2011 to December 12, 2011, potentially affecting personal information such as names, Social Security Numbers, and Medicare Healthcare Insurance Numbers, although the total number of individuals affected is unknown. | |||||||
UnitedHealth Group | Cyber Attack | 100 | 4 | 03/2023 | UNI315051324 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: In late February, UnitedHealth Group's subsidiary Change Healthcare suffered a notable cyber incident, causing considerable disruptions within the healthcare system. This breach has impeded healthcare operations nationwide, most critically affecting the ability to submit claims and receive payments. The incident has drawn significant concern from various stakeholders within the healthcare community, raising cash flow issues among hospitals, doctors, pharmacies, and others. To mitigate the impact, the Centers for Medicare & Medicaid Services (CMS) have enacted several immediate measures to assist providers and ensure continued service to patients. The incident emphasizes the critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem and has prompted the Department of Health and Human Services (HHS) to actively engage with federal bodies to provide threat intelligence to the industry and ensure a transparent, effective response to the cyberattack. | |||||||
UnitedHealthcare | Cyber Attack | 60 | 2 | 12/2024 | UNI000121424 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: The CEO of UnitedHealthcare, Brian Thompson, was fatally shot in an incident involving Luigi Mangione, who was arrested in Pennsylvania. The shooter allegedly left behind bullet casings with words indicating a protest against healthcare insurance claim denials. The perpetrator carried a manifesto critical of healthcare companies' focus on profits over patient care. The case has drawn significant media attention, impacting the companyโs reputation and possibly causing a financial setback due to concerns over the safety of its executives, potential legal issues, and the necessity for increased security measures. | |||||||
UnitedHealth Group | Cyber Attack | 100 | 5 | 7/2024 | UNI003032225 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: UnitedHealth Group faced a cyberattack on Change Healthcare, resulting in substantial financial repercussions projected to cost between $2.3 to $2.45 billion in 2024. This estimate is significantly higher than previous estimates, reflecting increased direct response expenses, financial support initiatives for care providers, and expenses related to consumer notification. Despite the impact of the cyberattack, UnitedHealth's revenue grew to $98.9 billion, indicating resilience in their operational performance. | |||||||
UnitedHealth Group | Ransomware | 100 | 5 | 3/2024 | UNI1012070724 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: UnitedHealth Group experienced a ransomware attack on February 21, which disrupted their services including medical claim handling and revenue cycle services. This resulted in severe delays in processing claims, pushing healthcare providers towards financial distress, with some nearly facing bankruptcy. The attack by the group BlackCat forced UnitedHealth to rebuild services and affected providers have started filing lawsuits due to not maintaining adequate cybersecurity measures, with allegations of sensitive information leaks. UnitedHealth has paid over $2 billion to affected providers and the data compromised in the attack remains undisclosed. | |||||||
UnitedHealth Group | Ransomware | 100 | 5 | 7/2024 | UNI000072524 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: UnitedHealth Group, a Minnesota-based health insurance company, reported substantial financial implications due to the Change Healthcare cyberattack, with estimated costs between $2.3 billion to $2.45 billion for 2024. This figure significantly exceeds earlier estimates by over $1 billion. While UnitedHealth has restored most services and provided considerable financial aid to healthcare providers, the cyberattack's repercussions include increased direct response costs and support initiatives, contributing to an adjusted per share impact of $1.90 to $2.05 for the year. | |||||||
United Health Group | Ransomware | 100 | 5 | 7/2024 | UNI000092824 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: United Health Group encountered severe financial and operational disruptions due to the cyberattack on its subsidiary, Change Healthcare. The attack impaired medical billing and pre-authorization services, causing healthcare procedures to be delayed and prescriptions to be inaccessible. This led to delayed income for healthcare systems, impacting their ability to pay staff and potentially forcing some into financial turmoil. The resultant lack of care and delayed procedures may have affected patient health outcomes. | |||||||
Optum | Ransomware | 100 | 5 | 7/2024 | OPT001102824 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: The Optum incident exemplifies the risks of consolidating healthcare systems, where a cyberattack paralyzed medical billing and authorization services, resulting in patients experiencing delays in medical procedures and lack of access to prescription medications. Medical service providers could not bill insurance, leading to financial strain, missed salary payments, and some cases of severe financial difficulties. With a single point of failure due to consolidated services, a large portion of health systems and patient care became vulnerable to cyber threats. | |||||||
UnitedHealth Group | Ransomware | 100 | 5 | 5/2024 | UNI004032125 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: UnitedHealth Group, the parent company of Change Healthcare, was affected by a ransomware attack that resulted in substantial operational disruption across the healthcare sector. Costs associated with the breach are projected to reach $1.6 billion. This breach compelled healthcare organizations to seek clarifications on their reporting obligations under HIPAA. While the extent of the compromised personal health information (PHI) is still being assessed, the situation highlights the complex challenges involved in managing and securing sensitive healthcare information in the digital age, alongside navigating the intricacies of legal and regulatory compliance. | |||||||
UnitedHealth Group | Ransomware | 100 | 4 | 1/2025 | UNI000032225 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The Change Healthcare cyber-attack, acknowledged by parent company UnitedHealth Group, affected approximately 190 million individuals, marking a substantial increase from earlier reports. As one of the largest healthcare payment processing entities in the U.S., Change Healthcare's security breach, with losses totaling $3.1 billion, is considered the most severe healthcare data breach recorded in 2024. Behind this damaging cybersecurity incident is the ALPHV/Blackcat ransomware group, leading to multiple lawsuits against UnitedHealth Group. | |||||||
UnitedHealth Group | Ransomware | 100 | 4 | 5/2024 | UNI002033125 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The ransomware attack on Change Healthcare, a component of UnitedHealth Group, reported on February 21, has been notably disruptive within the healthcare industry. This cyberattack is projected to result in financial damages approximating $1.6 billion. The incident has caused considerable perturbation amid providers contending with its extensive repercussions. Recovery efforts are hampered by the lack of clear communication from United Health and Change Healthcare, as providers await definitive instructions from the OCR regarding their reporting duties under HIPAA for this breach. | |||||||
UnitedHealth | Ransomware | 100 | 5 | 6/2025 | UNI721060625 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: UnitedHealth faced a significant ransomware attack where its subsidiary, Change Healthcare, was compromised. The attack disrupted pharmacy operations, leading to chaos and a desperate need to fill prescriptions. UnitedHealth ultimately paid $22 million in bitcoin to the ALPHV/BlackCat gang to restore services quickly. | |||||||
UnitedHealthcare | Ransomware | 100 | 4 | 3/2023 | UNI648080525 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The Washington State Office of the Attorney General reported a data breach involving UnitedHealthcare on August 25, 2023. The breach, which was a ransomware attack discovered on April 17, 2023, affected approximately 1,025 Washington residents and involved compromised information including names, Social Security numbers, dates of birth, health insurance information, and medical information. |
Optum Company Subsidiaries

Weโre evolving health care so everyone can have the opportunity to live their healthiest life. Itโs why we put your unique needs at the heart of everything we do, making it easy and affordable to manage health and well-being. We are delivering the right care how and when itโs needed; providing support to make smarter and healthier choices; and making prescription services easier, while helping you save money along the way. Itโs everything health care should be. Together, for better health. Optum is part of UnitedHealth Group (NYSE: UNH).
Access Data Using Our API

Get company history
.png)
Optum Cyber Security News
AMA urges Optum to take an individualized approach to seeking repayment for Change hack loans
The American Medical Association (AMA) is seeking answers from Optum after reports from physicians indicated that the company is putting pressure on them toย ...
Number of Americans impacted by Change Healthcare breach nears 200M
The attack was confirmed to involve the deployment of ransomware onto the company's network. Change Healthcare confirmed it paid a ransom, butย ...
UnitedHealth Group names new CISO 8 months after massive ransomware attack
Longtime security leader Tim McKnight joins the beleaguered healthcare giant, succeeding Steven Martin, who was appointed chief restorationย ...
More than 5 million affected by data breach at healthcare tech firm Episource
A tech firm providing services to the healthcare industry said hackers stole information on millions of people in an incident discovered in early February.
UnitedHealth's Optum left an AI chatbot, used by employees to ask questions about claims, exposed to the internet
The federal lawsuit accuses UnitedHealthcare of using an AI model with a 90% error rate โin place of real medical professionals to wrongfullyย ...
The complete story of the 2024 ransomware attack on UnitedHealth
About a year ago, UnitedHealth Group, the U.S. health-insurance giant, was targeted in one of the largest ransomware attacks ever.
UnitedHealth Groupโs year of DOJ probes, layoffs and backlash
UnitedHealth Group has faced an unprecedented past year, navigating events that have tested its finances, operations and reputation.
UnitedHealth Bumps Change Hack Cost Estimate to Nearly $2.9B
Executives say providers are returning to the payment platformโbut not bringing back all their business.
UnitedHealth Group: A Cyberattack Timeline
MSSP Alert has created this comprehensive timeline of events for the UnitedHealth Group cyberattack.

Optum Similar Companies

University Hospitals
Founded in 1866, University Hospitals serves the needs of patients through an integrated network of 23 hospitals (including 5 joint ventures), more than 50 health centers and outpatient facilities, and over 200 physician offices in 16 counties throughout northern Ohio. The systemโs flagship quaterna

Ardent Health
Ardent Health is a leading provider of healthcare in communities across the country. With a focus on consumer-friendly processes and investments in innovative services and technologies, Ardent is passionate about making healthcare better and easier to access. Through its subsidiaries, Ardent owns an

Michigan Medicine
Michigan Medicine, based in Ann Arbor, Michigan, is part of one of the worldโs leading universities. Michigan Medicine is a premier, highly ranked academic medical center and award-winning health care system with state-of-the-art facilities. Our vision is to create the future of health care throu

Inova Health
Inova is Northern Virginiaโs leading nonprofit healthcare provider, offering world-class clinical excellence to everyone in our communities with a warm, human touch. Our 22,000+ team members collaborate to achieve individual and group health goals in partnership with every one of the 2M+ individuals

Inova Health
We are Inova, Northern Virginia and the Washington, DC, metropolitan areaโs leading nonprofit healthcare provider. With expertise and compassion, we partner with our patients to help them stay healthy. We treat illness, heal injury and look at a patientโs whole health to help them flourish. Through

Ascension
Ascension is one of the nationโs leading non-profit and Catholic health systems, with a Mission of delivering compassionate, personalized care to all with special attention to persons living in poverty and those most vulnerable. In FY2024, Ascension provided $2.1 billion in care of persons living in

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Optum CyberSecurity History Information
How many cyber incidents has Optum faced?
Total Incidents: According to Rankiteo, Optum has faced 21 incidents in the past.
What types of cybersecurity incidents have occurred at Optum?
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Cyber Attack and Breach.
What was the total financial impact of these incidents on Optum?
Total Financial Loss: The total financial loss from these incidents is estimated to be $27.87 billion.
How does Optum detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with wipe systems clean, restore from backups, thoroughly check for remaining threats and and and third party assistance with centers for medicare & medicaid services (cms), department of health and human services (hhs).
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: UnitedHealthcare Data Breach
Description: The Washington State Office of the Attorney General reported a data breach involving UnitedHealthcare on August 25, 2023. The breach, which was a ransomware attack discovered on April 17, 2023, affected approximately 1,025 Washington residents and involved compromised information including names, Social Security numbers, dates of birth, health insurance information, and medical information.
Date Detected: 2023-04-17
Date Publicly Disclosed: 2023-08-25
Type: Data Breach
Attack Vector: Ransomware

Incident : Data Breach
Title: UnitedHealth Group Data Breach
Description: The California Office of the Attorney General reported a data breach involving UnitedHealth Group on March 30, 2012. The breach occurred from June 28, 2011 to December 12, 2011, potentially affecting personal information such as names, Social Security Numbers, and Medicare Healthcare Insurance Numbers, although the total number of individuals affected is unknown.
Date Detected: 2012-03-30
Date Publicly Disclosed: 2012-03-30
Type: Data Breach

Incident : Data Breach
Title: RR Donnelley Data Breach
Description: Theft of an unencrypted computer containing personal information of UnitedHealthcare members.
Date Detected: 2013-01-28
Date Publicly Disclosed: 2013-01-28
Type: Data Breach
Attack Vector: Theft of Physical Device
Vulnerability Exploited: Unencrypted Data

Incident : Data Breach
Title: OptumRx Data Breach
Description: A data breach incident involving OptumRx where an unencrypted laptop belonging to a vendor was stolen, potentially exposing personal and health information.
Date Detected: 2016-03-16
Date Publicly Disclosed: 2016-04-08
Type: Data Breach
Attack Vector: Physical Theft
Vulnerability Exploited: Unencrypted Laptop
Threat Actor: Unknown
Motivation: Unknown

Incident : Data Breach
Title: UnitedHealthcare Data Breach
Description: Unauthorized access to the UHC broker portal, potentially exposing personal and plan-related information.
Date Detected: 2022-12-29
Type: Data Breach
Attack Vector: Unauthorized Access

Incident : Ransomware
Title: Ransomware Incident Analysis
Description: Computer screens all over your org are flashing up a warning that you've been infected by ransomware, or you've got a message that someone's been stealing information from your server. There's a growing market of firms that advise extortion victims on how to handle the situation, but that just adds another invoice to the injury, and some still prefer to go it alone. In the end, while a few companies do ignore ransom demands outright, all at least assess their options before deciding whether to negotiate, restore from backups, or pay up.
Type: Ransomware
Threat Actor: ALPHV/BlackCat gang, LockBit
Motivation: Financial Gain

Incident : Ransomware
Title: Ransomware Attack on Change Healthcare
Description: The ransomware attack on Change Healthcare, a component of UnitedHealth Group, reported on February 21, has been notably disruptive within the healthcare industry. This cyberattack is projected to result in financial damages approximating $1.6 billion. The incident has caused considerable perturbation amid providers contending with its extensive repercussions. Recovery efforts are hampered by the lack of clear communication from United Health and Change Healthcare, as providers await definitive instructions from the OCR regarding their reporting duties under HIPAA for this breach.
Date Detected: 2023-02-21
Type: Ransomware

Incident : Cyberattack
Title: Cyberattack on Change Healthcare
Description: UnitedHealth Group faced a cyberattack on Change Healthcare, resulting in substantial financial repercussions projected to cost between $2.3 to $2.45 billion in 2024. This estimate is significantly higher than previous estimates, reflecting increased direct response expenses, financial support initiatives for care providers, and expenses related to consumer notification. Despite the impact of the cyberattack, UnitedHealth's revenue grew to $98.9 billion, indicating resilience in their operational performance.
Type: Cyberattack

Incident : Ransomware
Title: Change Healthcare Cyber-Attack
Description: The Change Healthcare cyber-attack, acknowledged by parent company UnitedHealth Group, affected approximately 190 million individuals, marking a substantial increase from earlier reports. As one of the largest healthcare payment processing entities in the U.S., Change Healthcare's security breach, with losses totaling $3.1 billion, is considered the most severe healthcare data breach recorded in 2024. Behind this damaging cybersecurity incident is the ALPHV/Blackcat ransomware group, leading to multiple lawsuits against UnitedHealth Group.
Type: Ransomware
Threat Actor: ALPHV/Blackcat ransomware group

Incident : Ransomware
Title: Ransomware Attack on UnitedHealth Group and Change Healthcare
Description: UnitedHealth Group, the parent company of Change Healthcare, was affected by a ransomware attack that resulted in substantial operational disruption across the healthcare sector. Costs associated with the breach are projected to reach $1.6 billion. This breach compelled healthcare organizations to seek clarifications on their reporting obligations under HIPAA. While the extent of the compromised personal health information (PHI) is still being assessed, the situation highlights the complex challenges involved in managing and securing sensitive healthcare information in the digital age, alongside navigating the intricacies of legal and regulatory compliance.
Type: Ransomware

Incident : Data Breach, Ransomware
Title: UnitedHealth Group Cyber-Attack
Description: UnitedHealth Group, parent company of Change Healthcare, reported a cyber-attack affecting 190 million individuals, an increase of 90 million from initial reports. As one of the largest healthcare payment processors, this incident is the most severe healthcare data breach of 2024. The breach, perpetrated by ransomware group ALPHV/Blackcat, led to substantial financial consequences with costs reaching $3.1 billion, according to the company's financial results. This breach has not only compromised the personal information of millions but also resulted in multiple lawsuits against UnitedHealth Group.
Type: Data Breach, Ransomware
Threat Actor: ALPHV/Blackcat

Incident : Physical Security Incident
Title: Fatal Shooting of UnitedHealthcare CEO
Description: The CEO of UnitedHealthcare, Brian Thompson, was fatally shot in an incident involving Luigi Mangione, who was arrested in Pennsylvania. The shooter allegedly left behind bullet casings with words indicating a protest against healthcare insurance claim denials. The perpetrator carried a manifesto critical of healthcare companies' focus on profits over patient care. The case has drawn significant media attention, impacting the companyโs reputation and possibly causing a financial setback due to concerns over the safety of its executives, potential legal issues, and the necessity for increased security measures.
Type: Physical Security Incident
Attack Vector: Physical Violence
Threat Actor: Luigi Mangione
Motivation: Protest against healthcare insurance claim denials, Criticism of healthcare companies' focus on profits over patient care

Incident : Physical Security Incident
Title: Assassination of UnitedHealthcare CEO Brian Thompson
Description: The CEO of UnitedHealthcare, Brian Thompson, was tragically shot and killed in New York City. The suspected shooter, Luigi Mangione, was arrested shortly thereafter. Police found evidence suggesting motivations related to healthcare system criticisms. Bullet casings at the scene had words inscribed that imply dissatisfaction with health insurance coverage processes. Authorities also found a manifesto carried by Mangione that condemned healthcare companies for prioritizing profits over care. This event has led to a significant impact on UnitedHealthcareโs reputation, with potential financial implications due to the loss of its CEO and the adverse publicity surrounding the circumstances of his death.
Type: Physical Security Incident
Attack Vector: Physical Assault
Threat Actor: Luigi Mangione
Motivation: Criticism of healthcare system, Dissatisfaction with health insurance coverage processes

Incident : Ransomware
Title: Optum Cyber Incident
Description: The Optum incident exemplifies the risks of consolidating healthcare systems, where a cyberattack paralyzed medical billing and authorization services, resulting in patients experiencing delays in medical procedures and lack of access to prescription medications. Medical service providers could not bill insurance, leading to financial strain, missed salary payments, and some cases of severe financial difficulties. With a single point of failure due to consolidated services, a large portion of health systems and patient care became vulnerable to cyber threats.
Type: Ransomware

Incident : Cyberattack
Title: Cyberattack on Change Healthcare
Description: United Health Group encountered severe financial and operational disruptions due to the cyberattack on its subsidiary, Change Healthcare. The attack impaired medical billing and pre-authorization services, causing healthcare procedures to be delayed and prescriptions to be inaccessible. This led to delayed income for healthcare systems, impacting their ability to pay staff and potentially forcing some into financial turmoil. The resultant lack of care and delayed procedures may have affected patient health outcomes.
Type: Cyberattack

Incident : Cyberattack
Title: Change Healthcare Cyberattack on UnitedHealth Group
Description: UnitedHealth Group, a health insurance company, reported significant financial implications due to the Change Healthcare cyberattack, with estimated costs between $2.3 and $2.45 billion for 2024. This cyberattack has not only led to direct response costs but also necessitated substantial financial support for healthcare providers. Despite the breach, UnitedHealth managed revenue growth, signaling resilience amidst the cyber incident.
Type: Cyberattack

Incident : Cyberattack
Title: Change Healthcare Cyberattack Impact on UnitedHealth Group
Description: UnitedHealth Group, a Minnesota-based health insurance company, reported substantial financial implications due to the Change Healthcare cyberattack, with estimated costs between $2.3 billion to $2.45 billion for 2024. This figure significantly exceeds earlier estimates by over $1 billion. While UnitedHealth has restored most services and provided considerable financial aid to healthcare providers, the cyberattack's repercussions include increased direct response costs and support initiatives, contributing to an adjusted per share impact of $1.90 to $2.05 for the year.
Type: Cyberattack

Incident : Ransomware
Title: UnitedHealth Group Ransomware Attack
Description: UnitedHealth Group experienced a ransomware attack on February 21, which disrupted their services including medical claim handling and revenue cycle services. This resulted in severe delays in processing claims, pushing healthcare providers towards financial distress, with some nearly facing bankruptcy. The attack by the group BlackCat forced UnitedHealth to rebuild services and affected providers have started filing lawsuits due to not maintaining adequate cybersecurity measures, with allegations of sensitive information leaks. UnitedHealth has paid over $2 billion to affected providers and the data compromised in the attack remains undisclosed.
Date Detected: 2023-02-21
Type: Ransomware
Attack Vector: Ransomware
Threat Actor: BlackCat
Motivation: Financial Gain

Incident : Cybersecurity Breach
Title: Cybersecurity Breach at Change Healthcare Unit of UnitedHealth Group Inc.
Description: UnitedHealth Group Inc. experienced a substantial cybersecurity breach at its Change Healthcare unit, leading to significant financial repercussions. The breach resulted in immediate response costs and broader business disruption, totaling approximately $872 million in the first quarter, with projections of the total pre-tax cost reaching between $1.35 billion and $1.6 billion. Additionally, UnitedHealth is allocating $800 million as claims reserves, to address potential claims from providers due to interrupted services since the breach was reported on February 21. The breach has affected both the network security of Change Healthcare and the continuity of services to providers and partners.
Date Detected: 2023-02-21
Type: Cybersecurity Breach

Incident : Cyber Incident
Title: Cyber Incident at Change Healthcare
Description: In late February, UnitedHealth Group's subsidiary Change Healthcare suffered a notable cyber incident, causing considerable disruptions within the healthcare system. This breach has impeded healthcare operations nationwide, most critically affecting the ability to submit claims and receive payments. The incident has drawn significant concern from various stakeholders within the healthcare community, raising cash flow issues among hospitals, doctors, pharmacies, and others. To mitigate the impact, the Centers for Medicare & Medicaid Services (CMS) have enacted several immediate measures to assist providers and ensure continued service to patients. The incident emphasizes the critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem and has prompted the Department of Health and Human Services (HHS) to actively engage with federal bodies to provide threat intelligence to the industry and ensure a transparent, effective response to the cyberattack.
Date Detected: Late February
Type: Cyber Incident

Incident : Data Breach
Title: Data Breach of Healthcare Information
Description: The company experienced a data breach after filing official documents with the Attorney General of Texas. The breach resulted in the names, addresses, health insurance information, and medical information being compromised. Leaked healthcare data was indeed protected healthcare information. They had sufficient information about a patient to carry out healthcare identity fraud.
Type: Data Breach
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
How does the company identify the attack vectors used in incidents?
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through UHC broker portal.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach UNI648080525
Data Compromised: names, Social Security numbers, dates of birth, health insurance information, medical information

Incident : Data Breach UNI146072825
Data Compromised: names, Social Security Numbers, Medicare Healthcare Insurance Numbers

Incident : Data Breach UNI532072725
Data Compromised: Names, Addresses, Social Security numbers

Incident : Data Breach OPT846072525
Data Compromised: Names, Addresses, Health Plan Information, Prescription Drug Details, Dates of Birth

Incident : Data Breach UNI543072525
Data Compromised: First and last names, Member ID numbers, Plan effective dates, Other plan-related information
Systems Affected: UHC broker portal

Incident : Ransomware UNI002033125
Financial Loss: $1.6 billion

Incident : Cyberattack UNI003032225
Financial Loss: $2.3 billion, $2.45 billion

Incident : Ransomware UNI004032125
Financial Loss: $1.6 billion
Data Compromised: Personal Health Information (PHI)
Operational Impact: Substantial operational disruption

Incident : Data Breach, Ransomware UNI000013125
Financial Loss: $3.1 billion
Data Compromised: Personal information of 190 million individuals
Legal Liabilities: Multiple lawsuits

Incident : Physical Security Incident UNI000121424
Financial Loss: Potential financial setback due to concerns over executive safety, potential legal issues, and increased security measures
Operational Impact: Impact on companyโs reputation
Brand Reputation Impact: Significant media attention impacting the companyโs reputation
Legal Liabilities: Potential legal issues

Incident : Physical Security Incident UNI000121024
Operational Impact: Loss of CEO
Brand Reputation Impact: Significant

Incident : Ransomware OPT001102824
Financial Loss: financial strain, missed salary payments, severe financial difficulties
Systems Affected: medical billing services, authorization services
Operational Impact: delays in medical procedures, lack of access to prescription medications

Incident : Cyberattack UNI000092824
Systems Affected: Medical billing, Pre-authorization services
Operational Impact: Delayed healthcare procedures, Inaccessible prescriptions, Delayed income for healthcare systems

Incident : Cyberattack UNI000072624
Financial Loss: $2.3 billion, $2.45 billion

Incident : Cyberattack UNI000072524
Financial Loss: $2.3 billion, $2.45 billion

Incident : Ransomware UNI1012070724
Financial Loss: $2 billion
Systems Affected: Medical claim handling, Revenue cycle services
Downtime: Severe delays in processing claims
Operational Impact: Rebuild services
Legal Liabilities: Lawsuits filed by affected providers

Incident : Cybersecurity Breach UNI457070524
Financial Loss: $872 million in the first quarter, $1.35 billion to $1.6 billion total pre-tax cost
Systems Affected: Network security of Change Healthcare, Continuity of services to providers and partners
Operational Impact: Interrupted services to providers

Incident : Cyber Incident UNI315051324
Systems Affected: Claim submission and payment systems
Operational Impact: Impeded healthcare operations nationwide, Cash flow issues among hospitals, doctors, pharmacies, and others

Incident : Data Breach UNI1211161222
Data Compromised: names, addresses, health insurance information, medical information
Identity Theft Risk: True
What is the average financial loss per incident?
Average Financial Loss: The average financial loss per incident is $1.33 billion.
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are names, Social Security numbers, dates of birth, health insurance information, medical information, names, Social Security Numbers, Medicare Healthcare Insurance Numbers, Personal Information, Names, Addresses, Health Plan Information, Prescription Drug Details, Dates of Birth, Personal Information, Plan-related Information, Personal Health Information (PHI), Personal information, Protected Healthcare Information and Personally Identifiable Information.
Which entities were affected by each incident?

Incident : Data Breach UNI648080525
Entity Type: Health Insurance Company
Industry: Healthcare
Location: Washington
Customers Affected: 1025

Incident : Data Breach UNI532072725
Entity Type: Company
Industry: Printing and Marketing Services
Customers Affected: 2003

Incident : Data Breach OPT846072525
Entity Type: Healthcare
Industry: Healthcare
Location: Indianapolis, Indiana
Customers Affected: UNKN

Incident : Ransomware UNI721060625
Entity Type: Organization

Incident : Ransomware UNI000032225
Entity Type: Company
Industry: Healthcare
Location: U.S.
Customers Affected: 190 million individuals

Incident : Data Breach, Ransomware UNI000013125
Entity Type: Parent Company
Industry: Healthcare
Size: Large
Customers Affected: 190 million individuals

Incident : Data Breach, Ransomware UNI000013125
Entity Type: Subsidiary
Industry: Healthcare
Size: Large

Incident : Physical Security Incident UNI000121424
Entity Type: Healthcare Company
Industry: Healthcare
Location: Pennsylvania

Incident : Physical Security Incident UNI000121024
Entity Type: Corporation
Industry: Healthcare
Location: New York City

Incident : Cyberattack UNI000072524
Entity Type: Health Insurance Company
Industry: Healthcare
Location: Minnesota

Incident : Cyber Incident UNI315051324
Entity Type: Subsidiary
Industry: Healthcare
Location: Nationwide
Customers Affected: Hospitals, Doctors, Pharmacies
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware UNI721060625
Third Party Assistance: True
Remediation Measures: Wipe systems clean, Restore from backups, Thoroughly check for remaining threats

Incident : Physical Security Incident UNI000121424
Law Enforcement Notified: Yes

Incident : Physical Security Incident UNI000121024
Law Enforcement Notified: Yes

Incident : Cyber Incident UNI315051324
Third Party Assistance: Centers for Medicare & Medicaid Services (CMS), Department of Health and Human Services (HHS)
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Centers for Medicare & Medicaid Services (CMS), Department of Health and Human Services (HHS).
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach UNI648080525
Type of Data Compromised: names, Social Security numbers, dates of birth, health insurance information, medical information
Number of Records Exposed: 1025
Sensitivity of Data: High
Personally Identifiable Information: True

Incident : Data Breach UNI146072825
Type of Data Compromised: names, Social Security Numbers, Medicare Healthcare Insurance Numbers
Sensitivity of Data: High
Personally Identifiable Information: True

Incident : Data Breach UNI532072725
Type of Data Compromised: Personal Information
Number of Records Exposed: 2003
Sensitivity of Data: High
Data Encryption: No
Personally Identifiable Information: Yes

Incident : Data Breach OPT846072525
Type of Data Compromised: Names, Addresses, Health Plan Information, Prescription Drug Details, Dates of Birth
Number of Records Exposed: UNKN
Sensitivity of Data: High
Data Encryption: No
Personally Identifiable Information: Yes

Incident : Data Breach UNI543072525
Type of Data Compromised: Personal Information, Plan-related Information
Sensitivity of Data: Medium
Personally Identifiable Information: First and last names, Member ID numbers

Incident : Ransomware UNI004032125
Type of Data Compromised: Personal Health Information (PHI)
Sensitivity of Data: High

Incident : Data Breach, Ransomware UNI000013125
Type of Data Compromised: Personal information
Number of Records Exposed: 190 million

Incident : Data Breach UNI1211161222
Type of Data Compromised: Protected Healthcare Information, Personally Identifiable Information
Sensitivity of Data: High
Data Exfiltration: True
Personally Identifiable Information: True
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Wipe systems clean, Restore from backups, Thoroughly check for remaining threats.
Ransomware Information
Was ransomware involved in any of the incidents?

Incident : Ransomware UNI721060625
Ransom Paid: $22 million in bitcoin
Ransomware Strain: ALPHV/BlackCat, LockBit

Incident : Ransomware UNI000032225
Ransomware Strain: ALPHV/Blackcat

Incident : Data Breach, Ransomware UNI000013125
Ransomware Strain: ALPHV/Blackcat

Incident : Ransomware UNI1012070724
Ransomware Strain: BlackCat
Regulatory Compliance
Were there any regulatory violations and fines imposed for each incident?

Incident : Ransomware UNI002033125
Regulatory Notifications: HIPAA

Incident : Ransomware UNI000032225
Legal Actions: multiple lawsuits

Incident : Ransomware UNI004032125
Regulations Violated: HIPAA

Incident : Data Breach, Ransomware UNI000013125
Legal Actions: Multiple lawsuits

Incident : Ransomware UNI1012070724
Legal Actions: Lawsuits filed by affected providers
How does the company ensure compliance with regulatory requirements?
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through multiple lawsuits, Multiple lawsuits, Lawsuits filed by affected providers.
Lessons Learned and Recommendations
What lessons were learned from each incident?

Incident : Cyber Incident UNI315051324
Lessons Learned: The critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem
What are the key lessons learned from past incidents?
Key Lessons Learned: The key lessons learned from past incidents are The critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem.
References
Where can I find more information about each incident?

Incident : Data Breach UNI648080525
Source: Washington State Office of the Attorney General
Date Accessed: 2023-08-25

Incident : Data Breach UNI146072825
Source: California Office of the Attorney General
Date Accessed: 2012-03-30

Incident : Data Breach UNI532072725
Source: California Office of the Attorney General
Date Accessed: 2013-01-28

Incident : Data Breach OPT846072525
Source: California Office of the Attorney General
Date Accessed: 2016-04-08

Incident : Data Breach UNI543072525
Source: California Office of the Attorney General
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2023-08-25, and Source: California Office of the Attorney GeneralDate Accessed: 2012-03-30, and Source: California Office of the Attorney GeneralDate Accessed: 2013-01-28, and Source: California Office of the Attorney GeneralDate Accessed: 2016-04-08, and Source: California Office of the Attorney General.
Investigation Status
What is the current status of the investigation for each incident?

Incident : Physical Security Incident UNI000121424
Investigation Status: Ongoing
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach UNI543072525
Entry Point: UHC broker portal
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Centers for Medicare & Medicaid Services (CMS), Department of Health and Human Services (HHS).
Additional Questions
General Information
Has the company ever paid ransoms?
Ransom Payment History: The company has Paid ransoms in the past.
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident were an Unknown, ALPHV/BlackCat gang, LockBit, ALPHV/Blackcat ransomware group, ALPHV/Blackcat, Luigi Mangione, Luigi Mangione and BlackCat.
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on 2023-04-17.
What was the most recent incident publicly disclosed?
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-08-25.
Impact of the Incidents
What was the highest financial loss from an incident?
Highest Financial Loss: The highest financial loss from an incident was $3.1 billion.
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, dates of birth, health insurance information, medical information, names, Social Security Numbers, Medicare Healthcare Insurance Numbers, Names, Addresses, Social Security numbers, Names, Addresses, Health Plan Information, Prescription Drug Details, Dates of Birth, First and last names, Member ID numbers, Plan effective dates, Other plan-related information, Personal Health Information (PHI), Personal information of 190 million individuals, names, addresses, health insurance information and medical information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident were UHC broker portal and medical billing services, authorization services and Medical billing, Pre-authorization services and Medical claim handling, Revenue cycle services and Network security of Change Healthcare, Continuity of services to providers and partners and Claim submission and payment systems.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Centers for Medicare & Medicaid Services (CMS), Department of Health and Human Services (HHS).
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names, Social Security numbers, dates of birth, health insurance information, medical information, names, Social Security Numbers, Medicare Healthcare Insurance Numbers, Names, Addresses, Social Security numbers, Names, Addresses, Health Plan Information, Prescription Drug Details, Dates of Birth, First and last names, Member ID numbers, Plan effective dates, Other plan-related information, Personal Health Information (PHI), Personal information of 190 million individuals, names, addresses, health insurance information and medical information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 190.0M.
Ransomware Information
What was the highest ransom paid in a ransomware incident?
Highest Ransom Paid: The highest ransom paid in a ransomware incident was ['$22 million in bitcoin'].
Regulatory Compliance
What was the most significant legal action taken for a regulatory violation?
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was multiple lawsuits, Multiple lawsuits, Lawsuits filed by affected providers.
Lessons Learned and Recommendations
What was the most significant lesson learned from past incidents?
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident are Washington State Office of the Attorney General, California Office of the Attorney General, California Office of the Attorney General, California Office of the Attorney General and California Office of the Attorney General.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Initial Access Broker
What was the most recent entry point used by an initial access broker?
Most Recent Entry Point: The most recent entry point used by an initial access broker was an UHC broker portal.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
