Think Like a Hacker: Knowing What to Look for So You Can Prevent It
To view the recording of our Tuesday Tech Talk, click HERE. Cybersecurity incidents continue to make the news. Here is the Five Nines’ take on...
Five Nines Team : Apr 24, 2024 2:49:08 PM
3 min read
The Change Healthcare attack shows how one missing safeguard — MFA on a remote-access tool — helped open the door to a billion‑dollar breach and weeks of disruption.
Healthcare is a prime target, so basics like MFA, security awareness, and tested business continuity/disaster recovery plans are now non‑negotiable, not “nice to have.”
Reducing human error, hardening remote access, and preparing to operate through an incident are the clearest lessons for any healthcare organization from this breach.
After the ransomware-related outage brought crucial healthcare reimbursement systems to a halt for providers across the country in late February 2024, all eyes were trained on the high-stakes investigation that followed.
The outage, which left providers and pharmacies unable to use their claims processing and reimbursement platform for more than three weeks in February and March, has been traced to an attack by BlackCat/ALPHV Ransomware Group. The attackers crippled Change Healthcare's systems, demanding a multi-million dollar ransom in exchange for the safe return of files and the restoration of system access.
Between the lengthy system outage impacting millions of transactions, incident response and recovery costs, and a ransom payment, Change Healthcare's parent company UnitedHealth Group has admitted that the cost of the attack will likely exceed $1 Billion. In further reports, UHG revealed the first quarter total impact reached $870 Million, with approximately $595 Million being direct costs from the system outage & restoration period (WSJ Cybersecurity).
CSO Online reports that cryptocurrency transaction evidence reveals UHG paid the $22 Million ransom, but UnitedHealth Group admitted on April 22 that Protected Health Information (PHI) and Personally Identifiable Information (PII) were still exposed in the attack.
Apart from the direct costs to UnitedHealth Group, the impact to individuals is significant. UHG reports that the exposed files containing PHI & PII "could cover a substantial proportion of people in America", and that it will likely take several months before impacted individuals can be identified and notified of their exposed data.
As the US Department of Health & Human Services (DHHS) investigated the breach, Congressional hearings began in April with calls to mandate baseline security standards for organizations within the healthcare sector as a result of the national security risk posed by breaches of far-reaching, interconnected healthcare systems like that of Change Healthcare.
Breach investigation reports now reveal that Multi-Factor Authentication protocols were absent on the remote access application in use within Change Healthcare's systems. Compromised user credentials, paired with the absence of a second authentication method, allowed attackers to use the remote access tool and quietly enter Change Healthcare's network undetected for more than a week before deploying the Ransomware attack.
"Deploying MFA is non-negotiable. It’s the front line in ensuring that users are who they claim to be.”
MFA is not a silver bullet, and it's not the only cybersecurity tool that should be in use protecting your business network. Still, with 74% of all security breaches being traceable to a human element (including credential exposure), added security at the login level is becoming more than just a security best practice – it's a security necessity.
You've heard it before, we're sure, but it's true – healthcare is a top target for cyberattacks, whether you're a small, rural facility or a national provider.
In 2022, Healthcare was identified as the most-breached industry by Kroll's Data Breach Outlook report. The reason? Not only is the payout lucrative for attackers if they succeed at obtaining PHI & PII, but the attack execution can often be easy. Kroll's 2023 report revealed that 28% of healthcare organizations still only invest in basic security protections, like monitoring. That makes for an easy breach from an attacker's perspective.
Three takeaways from the Change Healthcare attack and industry vulnerabilities it revealed include:
The risks are high and the impact can be devastating if your organization falls victim to a large attack. If you need help prioritizing security within your healthcare IT strategy, Five Nines can help. Contact us today to collaborate with one of our experts.
Attackers used stolen user credentials to access a remote‑access application that did not have multi‑factor authentication (MFA) enabled, which allowed them into Change Healthcare’s network and ultimately led to a ransomware deployment that took critical systems offline for weeks. Once inside, they were able to encrypt systems, disrupt claims processing, and exfiltrate sensitive data before the breach was contained.
UnitedHealth Group estimates that the total cost of the attack will exceed one billion dollars when combining direct outage and recovery costs, ransom payment, and broader business disruption. Beyond the financial hit to the company, the outage stalled reimbursement and claims services nationwide and exposed protected health information (PHI) and personally identifiable information (PII) for a potentially huge portion of the U.S. population.
Without MFA, stolen or guessed passwords are often enough for an attacker to log in through remote access tools or cloud services. In this case, compromised credentials combined with the absence of MFA allowed the threat actor to access internal systems undetected for days. MFA is not a cure‑all, but it blocks many attacks that rely on credential theft, especially in environments where remote access is required for normal operations.
The core lesson applies regardless of size: healthcare is one of the most targeted industries, and many organizations still rely mainly on basic protections, which makes them attractive, “easy” targets. Smaller facilities face the same types of threats but often have fewer resources, so focusing on fundamentals like MFA, security awareness training, strong backups, and a clear continuity plan is critical to reduce the impact of an incident when — not if — it happens.
Immediate priorities include enforcing MFA on everything exposed externally (especially remote access and cloud services), tightening security awareness training to reduce credential theft, and ensuring you have robust, tested business continuity and disaster recovery plans so you can keep operating if key systems go down. From there, expanding your security program with better monitoring, documented inventories of systems, and regular risk assessments will further strengthen your overall resilience.
To view the recording of our Tuesday Tech Talk, click HERE. Cybersecurity incidents continue to make the news. Here is the Five Nines’ take on...
It's likely you have insurance plans for all of the unforeseen circumstances in life: apartment fires, cell phone accidents and even getting sick....
AI, with its immense potential, is reshaping the realm of cybersecurity. The integration of AI into the already overwhelming list of today’s cyber...