Incident Score: Analysis & Impact (VIT1765275172)
The details regarding individual company incidents & reports gives you full view from every side.
Rankiteo Score Impact Analysis
Key Highlights From The Incident Analysis
- Timeline of VITAS Healthcare's Breach and lateral movement inside company's environment.
- Overview of affected data sets, including SSNs and PHI, and why they materially increase incident severity.
- How Rankiteo’s incident engine converts technical details into a normalized incident score.
- How this cyber incident impacts VITAS Healthcare Rankiteo cyber scoring and cyber rating.
- Rankiteo’s MITRE ATT&CK correlation analysis for this incident, with associated confidence level.
Full Incident Analysis Transcript
In this Rankiteo incident briefing, we review the VITAS Healthcare breach identified under incident ID VIT1765275172.
The analysis begins with a detailed overview of VITAS Healthcare's information like the linkedin page: https://www.linkedin.com/company/vitas-healthcare, the number of followers: 86938, the industry type: Hospitals and Health Care and the number of employees: 6906 employees
After the initial compromise, the video explains how Rankiteo's incident engine converts technical details into a normalized incident score. The incident score before the incident was 682 and after the incident was 610 with a difference of -72 which is could be a good indicator of the severity and impact of the incident.
In the next step of the video, we will analyze in more details the incident and the impact it had on VITAS Healthcare and their customers.
On 21 November 2023, Vitas Healthcare disclosed Data Breach issues under the banner "Vitas Healthcare Data Breach".
Vitas Healthcare, the largest for-profit hospice chain in the United States, experienced a cybersecurity incident where an attacker gained access to some of its systems using a compromised vendor account.
The disruption is felt across the environment, affecting Vitas Healthcare systems, and exposing Personal information of 319,177 individuals, with nearly 319,177 records at risk.
In response, and stakeholders are being briefed through Data breach notice posted on a dedicated website.
The case underscores how Ongoing, with advisories going out to stakeholders covering Data breach notice posted on a dedicated website.
Finally, we try to match the incident with the MITRE ATT&CK framework to see if there is any correlation between the incident and the MITRE ATT&CK framework.
The MITRE ATT&CK framework is a knowledge base of techniques and sub-techniques that are used to describe the tactics and procedures of cyber adversaries. It is a powerful tool for understanding the threat landscape and for developing effective defense strategies.
MITRE ATT&CK® Correlation Analysis
Rankiteo's analysis has identified several MITRE ATT&CK tactics and techniques associated with this incident, each with varying levels of confidence based on available evidence. Under the Initial Access tactic, the analysis identified Valid Accounts: Cloud Accounts (T1078.004) with moderate to high confidence (80%), supported by evidence indicating attackers infiltrated Vitas’ network using a compromised vendor account and Trusted Relationship (T1199) with high confidence (90%), supported by evidence indicating compromised vendor account used to gain access to Vitas systems. Under the Credential Access tactic, the analysis identified Compromise Accounts (T1586) with moderate to high confidence (80%), supported by evidence indicating compromised vendor account used as initial access vector. Under the Exfiltration tactic, the analysis identified Exfiltration Over C2 Channel (T1041) with high confidence (90%), supported by evidence indicating threat actor exfiltrated sensitive personal and medical data and Automated Exfiltration (T1020) with moderate to high confidence (70%), supported by evidence indicating data exfiltration occurred over a month-long intrusion period. Under the Impact tactic, the analysis identified Data Encrypted for Impact (T1486) with moderate confidence (50%), supported by evidence indicating incident bears hallmarks of a ransomware attack (unconfirmed) and Data Manipulation: Stored Data Manipulation (T1565.001) with lower confidence (30%), supported by evidence indicating no evidence of data manipulation, but exfiltration occurred. These correlations help security teams understand the attack chain and develop appropriate defensive measures based on the observed tactics and techniques.
Sources & References
- VITAS Healthcare Rankiteo Cyber Incident Details: https://www.rankiteo.com/company/vitas-healthcare/incident/VIT1765275172
- VITAS Healthcare CyberSecurity Rating page: https://www.rankiteo.com/company/vitas-healthcare
- VITAS Healthcare Rankiteo Cyber Incident Blog Article: https://blog.rankiteo.com/vit1765275172-vitas-healthcare-breach-november-2025/
- VITAS Healthcare CyberSecurity Score History: https://www.rankiteo.com/company/vitas-healthcare/history
- VITAS Healthcare CyberSecurity Incident Source: https://www.securityweek.com/over-300000-individuals-impacted-by-vitas-hospice-data-breach/
- Rankiteo A.I CyberSecurity Rating methodology: https://www.rankiteo.com/Images/rankiteo_algo.pdf
- Rankiteo TPRM Scoring methodology: https://static.rankiteo.com/model/rankiteo_tprm_methodology.pdf