Huge US healthcare provider Change Healthcare has a “cybersecurity incident” going on for 15 hours and has shut down systems. https://techcrunch.com/2024/02/21/change-healthcare-cyberattack/
US health tech giant Change Healthcare hit by cyberattack | TechCrunch

A cyberattack is ongoing at Change Healthcare, a health tech giant that claims its technology touches one-in-three U.S. patient records.

TechCrunch
For the first 7 hours they claimed it was just a network issue. Incident tracker: https://status.changehealthcare.com/incidents/hqpjz25fn3n7
Update: Some applications are experiencing connectivity issues.

Optum Solutions's Status Page - Update: Some applications are experiencing connectivity issues..

As spotted by @zackwhittaker, Change Healthcare outage (still ongoing) is listed as suspected nation state threat actor in their 8-K filing.

In my experience it’s *extremely* rare to isolate the whole production network for nation state and espionage.. I don’t know what happened to trigger that here.

It’s over 48 hours since the Change Healthcare outage over a “cyber security issue” began.

I have heard they may have been deliberately wiped.

Reuters reports the Change Healthcare outage, which is still ongoing almost a week later, was not caused by a “nation state” as claimed by the victim - but it’s an AlphV ransomware incident. https://www.reuters.com/technology/cybersecurity/cyber-security-outage-change-healthcare-continues-sixth-straight-day-2024-02-26/

#threatintel

AlphV ransomware group have claimed the ongoing Change Healthcare incident which is causing problems across the US. #threatintel

The Change Healthcare incident is rumbling on. They’ve now acknowledged it is AlphV ransomware group, not a nation state as they prior claimed. https://techcrunch.com/2024/02/29/unitedhealth-change-healthcare-ransomware-alphv-blackcat-pharmacy-outages/

#threatintel

UnitedHealth confirms ransomware gang behind Change Healthcare hack amid ongoing pharmacy outages | TechCrunch

A Russia-based ransomware gang took credit for the ongoing cyberattack at the UnitedHealth Group health tech subsidiary.

TechCrunch

Since the Change Healthcare ransomware incident started several weeks ago, they've had a status page saying the incident will continue for 'the next day'.

Their COO has privately briefed orgs that will be "weeks" longer.

HT @brett for link

https://www.statnews.com/2024/02/29/change-healthcare-cyber-attack-outage-will-last-for-weeks/

Change Healthcare cyber attack outage could persist for weeks, UnitedHealth Group executive implies

Change Healthcare cyber attack outage could persist for weeks, UnitedHealth Group executive implies

STAT

AlphV ransomware group has received a $22m ransom payment, reportedly from Change Healthcare.

Rumours are AlphV has now scammed the ransomware affiliate and Change Healthcare, by stealing the ransom and exit scamming.

Downstream hospitals say they are losing around $100m a week due to the ongoing service outage.
https://www.wired.com/story/alphv-change-healthcare-ransomware-payment/

Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment

The transaction, visible on Bitcoin's blockchain, suggests the victim of one of the worst ransomware attacks in years may have paid a very large ransom.

WIRED
AlphV’s new portal now says it has been seized by law enforcement - but it’s unclear if that’s actually true or if they’ve rug pulled.

Some good reporting here - the NCA, who are listed on the AlphV portal as being involved in a takedown - say they were not involved in a takedown.

We’ll see what the FBI says, but it looks like AlphV may well have done rug pull aka exit scam — stole their operator and affiliate’s money and left their victims without decryption.

https://www.reuters.com/technology/cybersecurity/blackcat-ransomware-site-claims-it-was-seized-uk-law-enforcement-denies-being-2024-03-05/

For anybody wondering on the financial impact of the ongoing Change Healthcare ransomware incident (yes, obviously there’s also a big patient impact too):

https://therecord.media/cash-flow-disruptions-hospitals-change-healthcare

The bad news is I think ransomware groups will cause much bigger problems further down the line as they’re basically teenagers with rocket launchers inside critical infrastructure, blindly firing. They know governments worldwide are impotent.

$100 million a day? Cash flow disruptions roil healthcare industry after cyberattack

The economic impact of the Change Healthcare cyberattack continues to come into focus, with experts saying some large industry players — such as hospital and pharmacy networks — are facing disruptions costing upwards of $100 million a day.

Btw if anybody is wondering how Change Healthcare got breached, I have a draft IR report for their incident as somebody put it on a public sandbox - it’s just a standard ransomware incident. EquiLend’s IOCs are also publicly uploaded, same story.

International law enforcement all deny being behind the claimed AlphV takedown. So, exit scam confirmed.

One victim org has reached out to me asking how they contact AlphV as they still need to pay as part of claiming insurance. 💀

https://therecord.media/europol-doj-nca-deny-involvement-in-alphv-blackcat-ransomware-takedown

Europol, DOJ, NCA deny involvement in recent AlphV/BlackCat ‘shutdown’

Several of the law enforcement agencies involved in the takedown of one of the most prolific ransomware groups denied involvement in a new notice posted to the gang’s leak site — adding weight behind rumors from experts and cybercriminals that the group was attempting to carry out an elaborate exit scam.

The Change Heathcare ransomware incident is still going and is having profound implications for people and the healthcare industry across the US.

But for people who think this is an isolated incident, it isn’t - it’s been like this for several years where civil society is gradually being eroded by some gangs of often kids, from schools to councils to public services worldwide (except, er, Russia).

https://prospect.org/health/2024-03-11-change-unitedhealth-ransomware-pharmacies/

‘Return What You Stole and Be a Man With Dignity’

Doctors didn’t think it was possible to loathe the world’s biggest health care profiteer any more. Then came the hack that set half their bookkeeping systems on fire.

The American Prospect
The White House has met with the CEO of Change Healthcare’s parent company, around the ongoing ransomware incident. https://www.reuters.com/world/us/white-house-summons-unitedhealth-ceo-over-hack-washington-post-reports-2024-03-12/

HT to @zackwhittaker, the US department of health has opened an investigation into Change Healthcare around if data exfiltration occurred.

It’s typically very easy to find out if data exfil happened as a third party as you can see large volumes of data transfer to VPS providers or cloud storage providers in ISP logs (which are sold onwards).

The Change Healthcare ransomware situation is still going on, almost a month later, with at least one downstream healthcare provider saying they have run out of money to pay staff. https://www.berkshireeagle.com/news/local/cyberattack-change-healthcare-united-ransomware-medical-insurance-payments-berkshire-allergy-care/article_a5547ef2-e302-11ee-9162-2b0ff10b145f.html

HT @brett

A major cyberattack has caused a Pittsfield medical practice to run out of money. Staff are continuing to treat patients

“After this week’s payroll, we’re going to be broke.” Dr. Thomas B. Edwards of Berkshire Allergy Care on South Street, speaking of the cyberattack that has rattled doctors' offices around

The Berkshire Eagle

One of the largest nursing home operators in the U.S. has filed for bankruptcy citing the ongoing Change Healthcare ransomware incident as a cause.

They also got hit with ransomware themselves a few months prior.

https://www.reuters.com/legal/litigation/nursing-home-co-petersen-files-bankruptcy-after-cyberattacks-2024-03-21/

The US government are offering $10m for information on the AlphV ransomware operator who attacked Change Healthcare https://www.reuters.com/technology/cybersecurity/us-offers-10-million-bounty-info-blackcat-hackers-who-hit-unitedhealth-2024-03-27/

Worth noting that when the incident began, the company involved refused to say #ransomware and instead claimed it was a nation state attack.

Ransomhub #ransomware group are claiming AlphV stole their money for Change Healthcare (this is believed to be true btw), and the operator has given them the data. So now they’re extorting Change Healthcare again. #threatintel

Ransomhub have provided Wired journalists with files from Change Healthcare - meaning they’re being held to ransom again. https://www.wired.com/story/change-healthcare-ransomhub-threat/

#ransomware #threatintel

Change Healthcare Faces Another Ransomware Threat—and It Looks Credible

Change Healthcare ransomware hackers already received a $22 million payment. Now a second group is demanding money, and has sent WIRED samples of what they claim is the company's stolen data.

WIRED
Ransomhub have dumped what they claim is some Change Healthcare sample data on their portal. Includes some patient data. #ransomware #threatintel

Change Healthcare have told investors they have so far taken a $872 million hit in dealing with their ongoing ransomware incident in the first two months, with the cost expected to rise to between $1350m-$1600m through the calendar year.

Shareholders don't appear to care as the stock is up 5% since the update.

https://www.theregister.com/2024/04/16/change_healthcares_ransomware_attack_has/

Change Healthcare’s ransomware attack costs edge toward $1B so far

First glimpse at attack financials reveals huge pain

The Register
A Congress hearing about the Change Healthcare ransomware incident happened today - but nobody from the company bothered to attend. https://therecord.media/ransomware-unitedhealth-costs-billions-still-climbing
Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion

UnitedHealth Group's earnings call captured the financial fallout from the incident on the same day as a congressional hearing into the cyberattack.

Markets react to UnitedHealth taking a $1600m hit for ongoing ransomware incident at Change Healthcare

Wall Street Journal has a leak from the Change Healthcare ransomware incident

- Initial entry was via a remote access system without MFA
- Dwell time was 9 days
- They paid the ransom, then got held to ransom again and had data leaked anyway

https://www.wsj.com/articles/change-healthcare-hackers-broke-in-nine-days-before-ransomware-attack-7119fdc6

#threatintel #ransomware

UnitedHealth says Change Healthcare ransomware threat actor stole health data on ‘substantial proportion of people in America’

Change Healthcare deal with the healthcare information of around half of Americans. https://techcrunch.com/2024/04/22/unitedhealth-change-healthcare-hackers-substantial-proportion-americans/ #threatintel #ransomware

UnitedHealth says Change hackers stole health data on 'substantial proportion of people in America' | TechCrunch

The health tech giant processes 15 billion health transactions a year, and handles health information for about half of all Americans.

TechCrunch

The CEO says entry to Change Healthcare was via an unspecified Citrix vulnerability https://www.reuters.com/technology/cybersecurity/unitedhealth-hackers-took-advantage-citrix-vulnerabilty-break-ceo-says-2024-04-29/

This conflicts with a prior WSJ report saying lack of MFA. Although maybe lack of MFA on Netscaler was the vulnerability.

#threatintel #ransomware

TechCrunch has really good coverage: https://techcrunch.com/2024/04/30/uhg-change-healthcare-ransomware-compromised-credentials-mfa/

Change Healthcare didn’t use MFA on Citrix Netscaler. It was a bog standard ransomware incident.

One learning for the industry btw - I saw loads of threat intel channels circulating incorrect info about the incident. That’s fine, but some (eg the health info sharing authorities) reshared this wrong info.

#threatintel #ransomware

Change Healthcare hackers broke in using stolen credentials — and no MFA, says UHG CEO | TechCrunch

UnitedHealth's CEO said in congressional testimony that the portal used by the hackers to break into Change Healthcare was not protected with a basic security feature.

TechCrunch

The CEO of UnitedHealth is due to give testimony in Washington on their Change Healthcare ransomware incident tomorrow, where he will say “Our company alone repels an attempted intrusion every 70 seconds – thwarting more than 450,000 intrusions per year”

That sound impressive, but if you own a Windows PC at home, you’re doing the same thing - it’s called the built in firewall.

Not having MFA on Citrix Netscaler is also called negligence.

#threatintel #ransomware

Change Healthcare say their data breach, caused by their lack of MFA on Citrix Netscaler and AlphV ransomware group, impacted 100m Americans, making it the largest healthcare breach to date. https://www.reuters.com/technology/cybersecurity/hack-unitedhealths-tech-unit-impacted-100-mln-people-2024-10-24/

#threatintel #ransomware

@GossiTheDog “Not having MFA on Citrix Netscaler “

OhNo

@GossiTheDog Next he's going to open the event log and show us how they fix 300 errors every minute.
@GossiTheDog and also, only every 70 seconds? So they have what, 0.25 of a public IP address for all of UnitedHealth?
@GossiTheDog we thwart nearly 40,000 security incidents a month….wait we are including internet scans as incidents right?

@GossiTheDog I was pretty sure we didn’t have that option when I was still an admin, so I checked… Netscaler added MFA support in NetScaler 12.1 build 51.16, which was released March 28, 2019.

I would say five years is plenty of time to implement.

@GossiTheDog only if your router is set up for port forwarding.
@GossiTheDog One intrusion every 70 seconds. I wonder what their metric for "intrusion" is. I'm currently seeing about 12 password spraying attacks per second against my VPN endpoints. By that measure, I'm passively thwarting 378 million attacks per year.

@GossiTheDog When we developed our SOC, we decided to omit this bullshit number in our reports. This the white noise.

More important to the management to know is the number and quality of unfixed problems.

@GossiTheDog My Windows firewall on my PC at home does not see any external attacks whatsoever.

Hint: The PC is behind a NAT router.

@GossiTheDog no MFA? On a health platform? What is this? 1995?
@yaleman @GossiTheDog Wait 'til you hear about the financial system.
@guitarfosec @GossiTheDog I don’t care about money, all my value is in memes and frozen dim sims. 😂
@GossiTheDog The wrong info, as it were.

@GossiTheDog I know that I keep saying this, but people need to go to jail for this.

UnitedHealth should not be handling 1/3rd of the entire countries health records. Who the fuck approved of this?

Their malfeasance is causing tangible, physical, harm to the country. People have absolutely died or been hurt by not being able to get their prescriptions.

@GossiTheDog this really screwed over veterans and VA contractors providing medical services to veterans, including small businesses and independent doctors.
@GossiTheDog YESTERDAY I got a chirpy call from a woman at Change to tell me the breach was now fixed and I wanted to call her back but she said I couldn’t because she was in a call center. No apology or concern that we hadn’t been paid for services we rendered months ago.