Article Details
Scrape Timestamp (UTC): 2024-10-25 04:06:19.449
Original Article Text
Click to Toggle View
UnitedHealth says data of 100 million stolen in Change Healthcare breach. UnitedHealth has confirmed for the first time that over 100 million people had their personal information and healthcare data stolen in the Change Healthcare ransomware attack, marking this as the largest healthcare data breach in recent years. In May, UnitedHealth CEO Andrew Witty warned during a congressional hearing that "maybe a third" of all American's health data was exposed in the attack. A month later, Change Healthcare published a data breach notification warning that the February ransomware attack on Change Healthcare exposed a "substantial quantity of data" for a "substantial proportion of people in America." Today, the U.S. Department of Health and Human Services Office for Civil Rights data breach portal updated the total number of impacted people to 100 million, making it the first time UnitedHealth, the parent company of Change Healthcare, put an official number to the breach. "On October 22, 2024, Change Healthcare notified OCR that approximately 100 million individual notices have been sent regarding this breach," reads an updated FAQ on the OCR website. Data breach notifications sent by Change Healthcare since June state that a massive amount of sensitive information was stolen during the February ransomware attack, including: The information may be different for each individual, and not everyone's medical history was exposed. The Change Healthcare ransomware attack This data breach was caused by a February ransomware attack on UnitedHealth subsidiary Change Healthcare, which led to widespread outages in the U.S. healthcare system. The disruption to the company's IT systems prevented doctors and pharmacies from filing claims and prevented pharmacies from accepting discount prescription cards, causing patients to pay full price for medications. The BlackCat ransomware gang, aka ALPHV, conducted the attack, using stolen credentials to breach the company's Citrix remote access service, which did not have multi-factor authentication enabled. During the attack, the threat actors stole 6 TB of data and ultimately encrypted computers on the network, causing the company to shut down IT systems to prevent the spread of the attack. The UnitedHealth Group admitted to paying a ransom demand to receive a decryptor and for the threat actors to delete the stolen data. The ransom payment was allegedly $22 million, according to the BlackCat ransomware affiliate who conducted the attack. This ransom payment was supposed to be split between the affiliate and the ransomware operation, but the BlackCat suddenly shut down, stealing the entire payment for themselves and pulling an exit scam. However, this wasn't the end of Change Healthcare's problems, as the affiliate claimed they still had the company's data and did not delete it as promised. The affiliate partnered with a new ransomware operation named RansomHub and began leaking some of the stolen data, demanding an additional payment for the data not to be released. The entry for Change Healthcare entry on RansomHub's data leak site mysteriously disappeared a few days later, possibly indicating that United Health paid a second ransom demand. UnitedHealth said in April that the Change Healthcare ransomware attack caused $872 million in losses, which increased as part of the Q3 2024 earnings to an expected $2.45 billion for the nine months to September 30, 2024,
Daily Brief Summary
UnitedHealth confirmed that over 100 million individuals had their personal and healthcare information stolen during the Change Healthcare ransomware attack.
This incident, declared the largest healthcare data breach in recent years, was first acknowledged by UnitedHealth CEO Andrew Witty during a congressional hearing.
The breach was caused by the BlackCat ransomware gang using stolen credentials to access Change Healthcare's Citrix remote service.
The impact of the attack was severe, causing significant disruptions in the U.S. healthcare system, including the inability for doctors and pharmacies to process claims and accept discount prescription cards.
The attackers stole 6 TB of data and demanded a ransom, which UnitedHealth paid but led to complexities such as the ransomware group conducting an exit scam.
Despite the ransom payment, data leaks have continued, with UnitedHealth potentially making a second payment to prevent further data disclosure.
The financial implications for UnitedHealth are substantial, with estimated losses due to the attack nearing $2.45 billion for the first nine months of 2024.