Imagine waking up one morning to discover that cybercriminals were holding a $22 million ransom on your personal information. Sounds like a script from a Hollywood blockbuster, right? Well, this was a bleak reality for Change Healthcare, a subsidiary of UnitedHealth Group, in late February of this year.
Now, both organizations are being investigated by the Department of Health over concerns of massive amounts of breached patient data. They will also undergo an assessment to determine if the companies’ compliance with health privacy laws is valid.
One class action lawsuit filed in response to the incident points to failed security measures. It claims Change Healthcare failed to provide reasonable security and protect its patients’ confidential PII. According to Gibbs Law Group, which represents the class action lawsuit, it “is one of the most significant data breaches impacting the U.S. healthcare system.”
Per sources on Forbes and Reuters, UnitedHealth Group apparently paid the $22 million ransom in Bitcoin to release all the patient data. A certain conglomerate of hackers dubbed Blackcat is thought to be responsible for carrying out the cyberattack.
Analysis of the $22 Million Cyberattack
The attack on Change Healthcare was a well-executed ransomware campaign. Hackers utilized Blackcat, a known ransomware group, which is notorious for deploying highly evasive tactics. The group leveraged advanced techniques such as double extortion, first encrypting the data and then threatening to release sensitive patient information publicly unless the ransom was paid. This dual threat makes ransomware attacks extra damaging in industries like healthcare.
The attack details show that Blackcat took advantage of weak spots in Change Healthcare’s unpatched systems, letting them access sensitive data and patient records. The ransomware spread quickly through the network, likely because of security gaps in devices and a lack of proper monitoring. The hackers also used phishing emails and social engineering tactics to gain initial access.
The ransom demand, made in Bitcoin, highlights the group’s preference for untraceable transactions, and the decision by UnitedHealth Group to pay $22 million suggests that the company feared the long-term consequences of having sensitive health data leaked. This breach is just one example of how cybersecurity threats continue to evolve and escalate, with healthcare organizations being prime targets.
For more detailed updates on this cyberattack, you can read official reports and news articles on Forbes and Reuters.
Unknown Factors Remain at Play
However, even given the extent of the healthcare data breach, there’s still more to uncover. The exact extent of the cyberattack on Change Healthcare is unknown. How will their patients be affected in the long run? Change Healthcare will likely face continued backlash over this event, from a patient perspective, as well as extended scrutiny by the Department of Health.
In many cases, situations like this arise when healthcare organizations fail to conduct appropriate risk assessments. HIPAA compliance violations are also likely. The repercussions extend far beyond their organization into dozens of interconnected healthcare companies and into the lives of millions of people.
What We Do Know
If this incident has taught healthcare providers anything, it’s that cybersecurity is of the utmost importance. Not even the big dogs are invincible. This event pokes at the vulnerability of America’s healthcare system and reminds us that so much goes on beyond the clinic doors. Is our personally identifiable information ever truly secure?
While we can’t answer that question, we can offer some solace: cybersecurity is constantly improving. The more these instances occur, the more we uncover, and the more we can tailor our cybersecurity solutions to stay one step ahead of wannabe hackers.
Organizations across all sectors — not just healthcare — should use this as a push to tighten the reigns of their cybersecurity. As our digital world evolves, so must your strategies and security protocols.
ICS works deeply with healthcare providers and large medical organizations across the South. From vulnerability management to EHR support, we are your go-to touchpoint for every aspect of IT.
We don’t want you to become another Change Healthcare case. Do your part to keep your patients’ personal information under lock and key through proactive cybersecurity policies, 24/7 monitoring, and expert action.
Learn more about ICS by scheduling a call today to receive a free quote for IT and cybersecurity solutions.
How ICS Can Prevent Similar Incidents
ICS can help organizations strengthen their cybersecurity posture to avoid incidents like this one. Our services include:
- Proactive vulnerability management to identify and fix potential security flaws before they can be exploited.
- Continuous network monitoring to detect and respond to suspicious activity in real-time, preventing ransomware from spreading.
- Employee training to recognize phishing attempts and social engineering tactics, which are often the entry point for these attacks.
- Data encryption and secure backup solutions to ensure that sensitive information is protected and can be recovered if attacked.
- Compliance consultation to ensure healthcare providers meet HIPAA requirements and avoid costly fines due to non-compliance.



