In fact, ransomware attacks on health care targets were on the rise even before the Change Healthcare attack, which crippled the United Healthcare subsidiary’s ability to process insurance payments on behalf of its health care provider clients starting in February of this year. Recorded Future’s Liska points out that every month of 2024 has seen more health care ransomware attacks than the same month in any previous year that he’s tracked. (While this May’s 32 health care attacks is lower than May 2023’s 33, Liska says he expects the more recent number to rise as other incidents continue to come to light.)
Yet Liska still points to the April spike visible in Recorded Future’s data in particular as a likely follow-on effect of Change’s debacleânot only the outsize ransom that Change paid to AlphV, but also the highly visible disruption that the attack caused. âBecause these attacks are so impactful, other ransomware groups see an opportunity,â Liska says. He also notes that health care ransomware attacks have continued to grow even compared to overall ransomware incidents, which stayed relatively flat or fell overall: April, for instance, saw 1,153 incidents compared to 1,179 in the same month of 2023.
When WIRED reached out to United Healthcare for comment, a spokesperson for the company pointed to the overall rise in health care ransomware attacks beginning in 2022, suggesting that the overall trend predated Change’s incident. The spokesperson also quoted from testimony United Healthcare CEO Andrew Witty gave in a congressional hearing about the Change Healthcare ransomware attack last month. âAs we have addressed the many challenges in responding to this attack, including dealing with the demand for ransom, I have been guided by the overriding priority to do everything possible to protect peoplesâ personal health information,â Witty told the hearing. “As chief executive officer, the decision to pay a ransom was mine. This was one of the hardest decisions Iâve ever had to make. And I wouldnât wish it on anyone.â
Change Healthcare’s deeply messy ransomware situation was complicated furtherâand made even more attention-grabbing for the ransomware hacker underworldâby the fact that AlphV appears to have taken Change’s $22 million extortion fee and jilted its hacker partners, disappearing without giving those affiliates their cut of the profits. That led to a highly unusual situation where the affiliates then offered the data to a different group, RansomHub, which demanded a second ransom from Change while threatening to leak the data on its dark web site.
That second extortion threat later inexplicably disappeared from RansomHub’s site. United Healthcare has declined to answer WIRED’s questions about that second incident or to answer whether it paid a second ransom.
Many ransomware hackers nonetheless widely believe that Change Healthcare actually paid two ransoms, says Jon DiMaggio, a security researcher with cybersecurity firm Analyst1 who frequently talks to members of ransomware gangs to gather intelligence. âEveryone was talking about the double ransom,â DiMaggio says. âIf the people Iâm talking to are excited about this, itâs not a leap to think that other hackers are as well.â
The noise that situation created, as well as the scale of disruption to health care providers from Change Healthcare’s downtime and its hefty ransom, served as the perfect advertisement for the lucrative potential of hacking fragile, high-stakes health care victims, DiMaggio says. âHealth care has always had so much to lose, itâs just something the adversary has realized now because of Change,â he says. âThey just had so much leverage.â
As those attacks snowballâand some health care victims have likely forked over their own ransoms to control the damage to their life-saving systemsâthe attacks aren’t likely to stop. âItâs always looked like an easy target,â DiMaggio notes. âNow it looks like an easy target thatâs willing to pay.â
+ There are no comments
Add yours