Article Details
Scrape Timestamp (UTC): 2024-05-08 03:00:45.675
Source: https://www.theregister.com/2024/05/08/unitedhealths_egregious_negligence/
Original Article Text
Click to Toggle View
UnitedHealth's 'egregious negligence' led to Change Healthcare infection. 'I'm blown away by the fact that they weren't using MFA'. Interview The cybersecurity practices that led up to the stunning Change Healthcare ransomware infection indicate "egregious negligence" on the part of parent company UnitedHealth, according to Tom Kellermann, SVP of cyber strategy at Contrast Security. During the attack, ALPHV aka BlackCat criminals made it into the medical corporation's IT systems, stole a ton of protected health data, and then brought hospitals and pharmacies' prescription and billing services to a standstill, preventing patients from receiving medications and treatment as expected. Kellermann spoke to The Register about the snafu after UnitedHealth CEO Andrew Witty testified to US lawmakers about how ALPHV's affiliates used stolen credentials to remotely access a Citrix portal that didn't have multi-factor authentication enabled. You can replay our chat below. Youtube Video "I'm blown away by the fact that they weren't using multi-factor authentication," Kellermann told The Register. "I'm blown away that the networks weren't segmented. And I'm blown away that they didn't conduct threat hunting robustly into that environment knowing that they had been compromised. I think it's egregious negligence, frankly." UnitedHealth paid a ransom as Witty confirmed in his testimony. This cost the healthcare giant $22 million – and then more ransomware fiends reportedly started leaking sensitive data and extorting UnitedHealth for even more money. Paying the ransom demand "was a massive mistake," according to Kellermann, who added that the US government should ban ransom payments altogether. He likened paying extortion demands to "sanctions evasion." In addition to funding criminal activities, it also doesn't guarantee that stolen data won't be leaked, which UnitedHealth found out the hard way. "CEOs should realize that, if you pay, they're going to come back for more as evidenced here," Kellermann said.
Daily Brief Summary
UnitedHealth's Change Healthcare experienced a significant ransomware attack by ALPHV aka BlackCat, leading to compromised patient services.
The attack exploited insufficient cybersecurity measures, namely the absence of multi-factor authentication and lack of network segmentation.
Tom Kellermann, SVP at Contrast Security, highlighted the company's failures in threat hunting and robust cybersecurity practices.
Sensitive health data was stolen, and the attackers demanded a $22 million ransom, which UnitedHealth paid.
Despite the ransom payment, additional threats and data leaks occurred, exacerbating the situation.
Kellermann criticized the decision to pay the ransom and suggested the U.S. government should prohibit such payments to deter future attacks.
The breach not only resulted in financial loss but also disrupted essential medical services, affecting pharmacies and hospitals.