A ransomware assault earlier this yr on UnitedHealth-owned well being tech firm Change Healthcare seemingly stands as one of many largest knowledge breaches of U.S. well being and medical knowledge in historical past.
Months after the February knowledge breach, a “substantial proportion of people living in America” are receiving discover by mail that their private and well being info was stolen by cybercriminals throughout the cyberattack on Change Healthcare.
Change Healthcare processes billing and insurance coverage for tons of of 1000’s of hospitals, pharmacies and medical practices throughout the U.S. healthcare sector. As such, it collects and shops huge quantities of extremely delicate medical knowledge on sufferers in the US. By a sequence of mergers and acquisitions, Change turned one of many largest processors of U.S. well being knowledge, dealing with between one-third and one-half of all U.S. well being transactions.
Right here’s what has occurred for the reason that ransomware assault started.
February 21, 2024
First report of outages as safety incident emerges
It appeared like an atypical Wednesday afternoon, till it wasn’t. The outage was sudden. On February 21, billing programs at medical doctors places of work and healthcare practices stopped working, and insurance coverage claims stopped processing. The standing web page on Change Healthcare’s web site was flooded with outage notifications affecting each a part of its enterprise, and later that day the corporate confirmed it was “experiencing a network interruption related to a cyber security issue.” Clearly one thing had gone very fallacious.
It seems that Change Healthcare invoked its safety protocols and shut down its whole community to isolate intruders it present in its programs. That meant sudden and widespread outages throughout the healthcare sector that depends on a handful of firms — like Change Healthcare — to deal with healthcare insurance coverage and billing claims for huge swathes of the US. It was later decided that the hackers initially broke into the corporate’s programs over per week earlier, on or round February 12.
February 29, 2024
UnitedHealth confirms it was hit by ransomware gang
After initially (and incorrectly) attributing the intrusion to hackers working for a authorities or nation-state, UnitedHealth later stated on February 29 that the cyberattack was in truth the work of a ransomware gang. UnitedHealth stated the gang “represented itself to us as ALPHV/BlackCat,” an organization spokesperson advised TechCrunch on the time. A darkish internet leak website related to the ALPHV/BlackCat gang additionally took credit score for the assault, claiming to have stolen hundreds of thousands of Individuals’ delicate well being and affected person info, giving the primary indication of what number of people this incident had affected.
ALPHV (aka BlackCat) is a recognized Russian-speaking ransomware-as-a-service gang. Its associates — contractors who work for the gang — break into sufferer networks and deploy malware developed by ALPHV/BlackCat’s leaders, who take a reduce of the earnings collected from the ransoms collected from victims to get their information again.
Figuring out that the breach was attributable to a ransomware gang modified the equation of the assault from the form of hacking that governments do — generally to ship a message to a different authorities as a substitute of publishing hundreds of thousands of individuals’s non-public info — to a breach attributable to financially motivated cybercriminals, who’re prone to make use of a wholly totally different playbook to get their payday.
March 3-5, 2024
UnitedHealth pays a ransom of $22 million to hackers, who then disappear
In early March, the ALPHV ransomware gang vanished. The gang’s leak website on the darkish internet, which weeks earlier took credit score for the cyberattack, was changed with a seizure discover claiming that U.Okay. and U.S. regulation enforcement took down the gang’s website. However each the FBI and U.Okay. authorities denied taking down the ransomware gang as they’d tried months earlier. All indicators pointed to ALPHV operating off with the ransom and pulling an “exit scam.”
In a posting, the ALPHV affiliate who carried out the hack on Change Healthcare claimed that the ALPHV management stole $22 million paid as a ransom and included a hyperlink to a single bitcoin transaction on March 3 as proof of their declare. However regardless of shedding their share of the ransom fee, the affiliate stated the stolen knowledge is “still with us.” UnitedHealth had paid a ransom to hackers who left the information behind and disappeared.
March 13, 2024
Widespread disruption throughout U.S. healthcare amid fears of information breach
In the meantime, weeks into the cyberattack, outages have been nonetheless ongoing with many unable to get their prescriptions stuffed or having to pay money out of pocket. Army medical health insurance supplier TriCare stated “all military pharmacies worldwide” have been affected as effectively.
The American Medical Affiliation was saying there was little info from UnitedHealth and Change Healthcare in regards to the ongoing outages, inflicting huge disruption that continued to ripple throughout the healthcare sector.
By March 13, Change Healthcare had acquired a “safe” copy of the stolen knowledge that it had simply days earlier paid $22 million for. This allowed Change to start the method of poring by way of the dataset to find out whose info was stolen within the cyberattack, with the purpose of notifying as many affected people as attainable.
March 28, 2024
U.S. authorities ups its bounty to $10 million for info resulting in ALPHV seize
By late March, the U.S. authorities stated it was upping its bounty for info on key management of ALPHV/BlackCat and its associates.
By providing $10 million to anybody who can determine or find the people behind the gang, the U.S. authorities appeared to hope that one of many gang’s insiders would activate their former leaders. It additionally may very well be seen because the U.S. realizing the specter of having a big variety of Individuals’ well being info doubtlessly printed on-line.
April 15, 2024
Contractor types new ransom gang and publishes some stolen well being knowledge
After which there have been two — ransoms, that’s. By mid-April, the aggrieved affiliate arrange a brand new extortion racket referred to as RansomHub, and because it nonetheless had the information that it stole from Change Healthcare, it demanded a second ransom from UnitedHealth. In doing so, RansomHub printed a portion of the stolen information containing what gave the impression to be non-public and delicate affected person information as proof of their risk.
Ransomware gangs don’t simply encrypt information; in addition they steal as a lot knowledge as attainable and threaten to publish the information if a ransom isn’t paid. This is named “double extortion.” In some circumstances when the sufferer pays, the ransomware gang can extort the sufferer once more — or, in others, extort the sufferer’s clients, often known as “triple extortion.”
Now that UnitedHealth was keen to pay one ransom, there was a danger that the healthcare large can be extorted once more. It’s why regulation enforcement have lengthy advocated in opposition to paying a ransom that enables criminals to revenue from cyberattacks.
April 22, 2024
UnitedHealth says ransomware hackers stole well being knowledge on a “substantial proportion of people in America”
For the primary time, UnitedHealth confirmed on April 22 — greater than two months after the ransomware assault started — that there was an information breach and that it seemingly impacts a “substantial proportion of people in America,” with out saying what number of hundreds of thousands of folks that entails. UnitedHealth additionally confirmed it paid a ransom for the information however wouldn’t say what number of ransoms it finally paid.
The corporate stated that the stolen knowledge consists of extremely delicate info, together with medical information and well being info, diagnoses, drugs, take a look at outcomes, imaging and care and therapy plans, and different private info.
Provided that Change Healthcare handles knowledge on about one-third of everybody residing in the US, the information breach is prone to have an effect on greater than 100 million folks at the least. When reached by TechCrunch, a UnitedHealth spokesperson didn’t dispute the seemingly affected quantity however stated that the corporate’s knowledge overview was ongoing.
Might 1, 2024
UnitedHealth Group chief govt testifies that Change wasn’t utilizing fundamental cybersecurity
Maybe unsurprisingly when your organization has had one of many largest knowledge breaches in latest historical past, its chief govt is sure to get referred to as to testify earlier than lawmakers.
That’s what occurred with UnitedHealth Group (UHG) chief govt Andrew Witty, who on Capitol Hill admitted that the hackers broke into Change Healthcare’s programs utilizing a single set password on a consumer account not protected with multi-factor authentication, a fundamental safety characteristic that may stop password reuse assaults by requiring a second code despatched to that account holder’s cellphone.
One among the most important knowledge breaches in U.S. historical past was solely preventable, was the important thing message. Witty stated that the information breach was prone to have an effect on about one-third of individuals residing in America — in step with the corporate’s earlier estimates that the breach impacts round as many individuals that Change Healthcare processes healthcare claims for.
June 20, 2024
UHG begins notifying affected hospitals and medical suppliers what knowledge was stolen
It took Change Healthcare till June 20 to start formally notifying affected people that their info was stolen, as legally required beneath a regulation generally often known as HIPAA, seemingly delayed partly by the sheer dimension of the stolen dataset.
The corporate printed a discover disclosing the information breach and stated that it will start notifying people it had recognized within the “safe” copy of the stolen knowledge. However Change stated it “cannot confirm exactly” what knowledge was stolen about every particular person and that the data could range from individual to individual. Change says it was posting the discover on its web site, because it “may not have sufficient addresses for all affected individuals.”
The incident was so massive and sophisticated that the U.S. Division of Well being and Human Providers stepped in and stated that affected healthcare suppliers, whose sufferers are finally affected by the breach, can ask UnitedHealth to inform affected sufferers on their behalf, an effort seen at lessening the burden on smaller suppliers whose funds have been hit amid the continued outage.
July 29, 2024
Change Healthcare begins notifying recognized affected people by letter
The well being tech large confirmed in late June that it will start notifying these whose healthcare knowledge was stolen in its ransomware assault on a rolling foundation. That course of started in late July.
The letters going out to affected people will most probably come from Change Healthcare, if not the precise healthcare supplier affected by the hack at Change. The letter confirms what varieties of information was stolen, together with medical knowledge and medical health insurance info, and claims and fee info, which Change stated consists of monetary and banking info.