Home Security A Chronological Breakdown of the Ransomware Incident at Change Healthcare

A Chronological Breakdown of the Ransomware Incident at Change Healthcare

by admin

Earlier this year, a ransomware assault on Change Healthcare, a health tech enterprise under UnitedHealth, emerged as a potentially historic breach in U.S. health data security.

In the aftermath of the breach discovered in February, a significant number of U.S. residents have started to receive mailed notifications alerting them that their confidential health and personal information was compromised during the cyberattack on Change Healthcare.

Handling billing and insurance transactions for an extensive network of hospitals, pharmacies, and medical practices throughout the U.S. health system, Change Healthcare plays a critical role. The company, which became a major player through mergers and acquisitions, manages a considerable portion of U.S. health data transactions, making it a repository of sensitive patient information.

This is the sequence of events since the ransomware incident unfolded.

February 21, 2024

Initial indications of outages amid emerging security incident

What appeared to be a typical Wednesday afternoon quickly turned alarming as billing and insurance operations across healthcare practices halted abruptly due to an outage on February 21. The Change Healthcare website’s status page lit up with notifications of widespread disruptions. By the end of the day, the company acknowledged a network interruption due to a cybersecurity event, confirming the gravity of the situation.

Subsequently discovered was Change Healthcare’s immediate action to deactivate its network to block the cyber intruders, sparking widespread service disruptions within the U.S. healthcare infrastructure that depends on a few key entities for processing healthcare insurance and billing claims. Investigations revealed that hackers had infiltrated the system more than a week prior, approximately by February 12.

February 29, 2024

Confirmation by UnitedHealth of ransomware gang’s involvement

UnitedHealth initially misattributed the breach to state-backed hackers, but corrected its stance on February 29, identifying the incident as the handiwork of a ransomware group. Named ALPHV/BlackCat by a company spokesperson to TechCrunch, this group was also linked to claims on a dark web site of having exfiltrated a vast collection of Americans’ health records, offering a first glimpse into the breach’s scale.

ALPHV, also known as BlackCat, operates a Russian-speaking ransomware-as-a-service network. Its affiliates, essentially contractors, infiltrate networks to deploy the gang-developed malware, sharing a portion of the profits from ransom payments made to reclaim affected files.

The revelation that a ransomware gang was behind the attack shifted perceptions, differentiating it from state-sponsored hacking activities which often aim to convey geopolitical messages rather than exploit stolen data for financial gain.

March 3-5, 2024

UnitedHealth’s $22 million ransom payment followed by hackers’ disappearance

In the days following the ransom demand, ALPHV’s online presence, including their leak site which had previously admitted to the attack, was replaced by a law enforcement seizure notice – a claim both the FBI and UK authorities refuted. This led to speculation that ALPHV had executed an “exit scam” after securing the ransom. An ALPHV affiliate involved in the Change Healthcare operation disclosed via an online transaction record on March 3 that despite the ransom payment, the stolen data had not been relinquished, indicating UnitedHealth paid for data the hackers eventually abandoned.

a screenshot depicting a counterfeit law enforcement seizure notice on BlackCat's dark web leakage site following a $22 million ransom payment.
A fictitious law enforcement seizure notice appears on BlackCat’s dark web site after a $22 million ransom settlement was made.
Image Credits: TechCrunch (screenshot)

March 13, 2024

Continued upheaval in U.S. healthcare following data compromise fears

As the cyberattack persisted, the fallout continued with individuals struggling to access prescription services or facing out-of-pocket payments. The situation also impacted military health insurance provider TriCare, disrupting services globally. 

With scant details forthcoming from UnitedHealth and Change Healthcare, the American Medical Association voiced concerns over the protracted disruptions affecting healthcare delivery. By March 13, Change Healthcare was in possession of a “secure” version of the stolen data, enabling it to start identifying and notifying impacted parties with hopes to mitigate the breach’s effects. 

March 28, 2024

Government increases reward in pursuit of ALPHV/BlackCat leadership

In an effort to apprehend the culprits behind the ransomware group, the U.S. government raised the bounty to $10 million for information leading to the capture of key figures in ALPHV/BlackCat and its associates, signaling a significant push to address the threat posed by the exposure of Americans’ health data.

April 15, 2024

Formation of new ransom group and partial data publication by a contractor

An embittered affiliate established RansomHub, a new extortion scheme, and threatened UnitedHealth with the release of more stolen data unless another ransom was paid, demonstrating the persistent risk of data exposure even after a ransom had been settled. This act underscored the evolution of ransomware tactics to double or triple extortion methods, emphasizing why law enforcement advises against ransom payments.

April 22, 2024

UnitedHealth acknowledges significant data theft impacting U.S. individuals

UnitedHealth disclosed the extent of the breach on April 22, acknowledging the data theft as affecting a significant fraction of the U.S. population, without specifying the exact number. The compromised data encompassed an array of personal health information, from medical records to treatment plans, raising concerns about the breadth of the impact. A UnitedHealth spokesperson, while not confirming specific numbers, noted the company’s ongoing review of the data breach.

May 1, 2024

Testimony by UnitedHealth CEO highlights cybersecurity deficiencies at Change

Following the significant data breach, UnitedHealth Group CEO Andrew Witty was summoned to Capitol Hill, where he conceded that the intrusion into Change Healthcare’s network was facilitated by a singular password on an account lacking multi-factor authentication, a fundamental security measure. This revelation underscored the preventability of the breach, affecting a vast number of Americans.

UnitedHealth CEO Andrew Witty during Senate Finance committee testimony in Washington, D.C., on May 1, 2024.
UnitedHealth CEO Andrew Witty at the Senate Finance committee testimony in Washington, D.C., on May 1, 2024.
Image Credits: Kent Nishimura / Getty Images

June 20, 2024

Notification process commencement for affected hospitals and medical providers

By June 20, efforts commenced to officially inform those impacted, a step mandated by healthcare privacy laws. Change Healthcare issued a public notice of the breach, indicating the initiation of individual notifications. However, due to uncertainties regarding the specific details of stolen information, the company’s disclosures may be limited, acknowledging the challenge of accurately identifying all affected parties.

Amidst the concerted response to the breach, the U.S. Department of Health and Human Services intervened, offering guidance to healthcare providers on delegating patient notification responsibilities to UnitedHealth, aiming to alleviate the administrative load on providers already suffering from the fallout.

July 29, 2024

Initiation of direct notifications to identified victims by Change Healthcare

In late July, Change Healthcare began the process of sending notification letters to those identified as affected by the ransomware attack. These correspondences are likely to originate directly from Change Healthcare or the respective healthcare provider involved in the incident.

The communication aims to inform recipients about the nature of the data compromised, which includes a range of personal medical and health insurance details, emphasizing the extent of information exposure resulting from the cyberattack.

Compiled by Techarena.au.
Fanpage: TechArena.au
Watch more about AI – Artificial Intelligence

You may also like

About Us

Get the latest tech news, reviews, and analysis on AI, crypto, security, startups, apps, fintech, gadgets, hardware, venture capital, and more.

Latest Articles