In February 2024, **Change Healthcare**, a subsidiary of UnitedHealth Group (annual revenue: $370B), fell victim to a **ransomware attack** orchestrated by the BlackCat/AlphV cybercrime syndicate. The breach disrupted **15 billion annual healthcare transactions**, crippling prescription processing, insurance claims, and payment systems across the U.S., including for military personnel. The attack forced hospitals and pharmacies to revert to manual operations, delaying critical care and financial workflows.Change Healthcare confirmed the incident was linked to a **nation-state-associated threat actor** and ultimately paid a **$22 million ransom** to restore systems. The breach exposed sensitive patient data, though the full scope of stolen records remains undisclosed. The fallout triggered federal investigations, class-action lawsuits, and regulatory scrutiny, with the U.S. Department of Health and Human Services (HHS) launching a probe into potential **HIPAA violations**. The attack’s ripple effects persisted for months, straining healthcare providers and eroding trust in digital health infrastructure.
Source: https://explodingtopics.com/blog/cybersecurity-stats
TPRM report: https://www.rankiteo.com/company/change-healthcare
"id": "cha4702047101025",
"linkid": "change-healthcare",
"type": "Ransomware",
"date": "2/2024",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'customers_affected': '15B annual transactions (US '
'military included)',
'industry': 'Healthcare IT/Payment Processing',
'location': 'USA',
'name': 'Change Healthcare (United Healthcare)',
'size': 'Enterprise ($370B revenue)',
'type': 'Healthcare'},
{'customers_affected': '73M (7.6M current + 65.4M '
'former)',
'industry': 'Telecom',
'location': 'USA',
'name': 'AT&T',
'size': 'Enterprise',
'type': 'Telecommunications'},
{'customers_affected': 'Undisclosed (data theft '
'confirmed)',
'industry': 'Healthcare',
'location': 'USA',
'name': 'Ascension',
'size': 'Large (multi-hospital system)',
'type': 'Healthcare Provider'},
{'customers_affected': 'Undisclosed (payment data risk)',
'industry': 'Retail',
'location': 'UK',
'name': 'Marks & Spencer (M&S)',
'size': 'Enterprise',
'type': 'Retailer'},
{'customers_affected': 'Undisclosed (system shutdowns)',
'industry': 'Retail/Grocery',
'location': 'UK',
'name': 'Co-op',
'size': 'Large',
'type': 'Retailer'},
{'customers_affected': 'Undisclosed (ransomware '
'attempt)',
'industry': 'Retail',
'location': 'UK',
'name': 'Harrods',
'size': 'Enterprise',
'type': 'Luxury Retailer'},
{'customers_affected': '59% hit by ransomware (2024)',
'industry': 'All Sectors',
'location': 'Worldwide',
'name': 'General Businesses (Global)',
'size': 'SMB to Enterprise',
'type': 'Cross-Industry'}],
'attack_vector': ['Phishing (Email, Vishing, Smishing)',
'Malware (Ransomware, Spyware, Trojans)',
'Exploiting Vulnerabilities (Zero-Day, IoT)',
'Credential Stuffing',
'Supply Chain Attacks',
'Insider Threats (Malicious/Accidental)',
'DDoS (Zombie IoT Devices)',
'Cryptojacking (Malicious Scripts, Cloud Exploitation)',
'Physical Attacks',
'System/Human Error'],
'customer_advisories': ['AT&T: Credit monitoring for affected customers',
'M&S: Password reset prompts, transaction reviews',
'Change Healthcare: Prescription workflow updates',
'General: FTC tips on phishing/vishing avoidance'],
'data_breach': {'data_encryption': ['Lack of encryption (AT&T 2019 breach)',
'Post-breach encryption upgrades '
'(healthcare)'],
'data_exfiltration': ['Confirmed (Change Healthcare, '
'Ascension, AT&T)',
'Attempted (M&S/Co-op/Harrods)'],
'file_types_exposed': ['Databases (PII/PHI)',
'Documents (contracts, military '
'records)',
'Emails (BEC scams)',
'Transaction logs (Change Healthcare)'],
'number_of_records_exposed': ['3B+ (Yahoo 2013)',
'198M (US healthcare 2024)',
'73M (AT&T 2019)',
'57M (Uber 2016)',
'339M (Marriott 2018)'],
'personally_identifiable_information': ['Names, addresses, '
'SSNs (AT&T)',
'Medical histories '
'(Change Healthcare)',
'Login credentials '
'(M&S)'],
'sensitivity_of_data': ['Critical (PHI, SSNs, military data)',
'High (PII, financial records)',
'Moderate (masked payment data)'],
'type_of_data_compromised': ['Personally Identifiable '
'Information (PII)',
'Protected Health Information '
'(PHI)',
'Social Security Numbers (SSNs)',
'Payment Card Data '
'(masked/unmasked)',
'Credentials (usernames, '
'passwords)',
'Military/Civilian Personnel '
'Records (Pentagon 2015)',
'Corporate Espionage Data']},
'date_publicly_disclosed': '2024-2025',
'description': 'A comprehensive report on the latest cybersecurity threats, '
'attack statistics, and notable incidents in 2024-2025. '
'Highlights include the rise in ransomware, phishing, malware, '
'and IoT attacks, with significant financial and operational '
'impacts across industries. Key incidents include breaches at '
'Change Healthcare, AT&T, Ascension, M&S, Co-op, and Harrods, '
'alongside broader trends in attack vectors, costs, and '
'regulatory compliance.',
'impact': {'brand_reputation_impact': ['Healthcare: Erosion of patient trust',
'Telecom: Long-term credibility damage '
'(AT&T)',
'Retail: Short-term sales declines '
'(M&S, Harrods)'],
'customer_complaints': ['Prescription delays (Change Healthcare)',
'Identity theft fears (AT&T SSN exposure)',
'Login resets (M&S/Co-op/Harrods)'],
'data_compromised': ['3B+ records (largest breach, Yahoo 2013)',
'198M Americans (healthcare breaches, 2024)',
'73M AT&T customers (SSNs, 2019 breach)',
'57M Uber users/drivers (2016)',
'339M Marriott guests (2018)',
'PII, PHI, payment data, credentials, '
'military/civilian records'],
'downtime': ['Change Healthcare: Weeks (prescription/insurance '
'disruptions)',
'Ascension: Days (emergency care diversions)',
'M&S/Co-op/Harrods: Hours-Days (system shutdowns)',
'Average Ransomware Downtime: 22 days (2024)'],
'financial_loss': [{'amount': '$22 million (ransom) + $330M+ '
'(operational costs)',
'incident': 'Change Healthcare Ransomware'},
{'amount': 'Undisclosed (73M records exposed, '
'2019 breach)',
'incident': 'AT&T Data Breach'},
{'amount': 'Undisclosed (emergency care '
'diversions, data theft)',
'incident': 'Ascension Malware Attack'},
{'amount': 'Undisclosed (payment data risk, '
'operational disruption)',
'incident': 'M&S/Co-op/Harrods Hacks'},
{'amount': '$4.91M (including '
'downtime/recovery)',
'incident': 'Average Ransomware Cost'},
{'amount': '$330,000+',
'incident': 'Average IoT Attack Cost'},
{'amount': '$6.3B (2024 total)',
'incident': 'Business Email Compromise (BEC)'}],
'identity_theft_risk': ['High (AT&T SSNs, healthcare PII)',
'Moderate (retail payment data, masked)'],
'legal_liabilities': ['SEC 8-K filings (Change Healthcare)',
'GDPR/CCPA violations (AT&T, healthcare '
'breaches)',
'Class-action lawsuits (data breach victims)',
'Regulatory fines (e.g., $4.99M for insider '
'threats)'],
'operational_impact': ['Supply chain disruptions (healthcare, '
'retail)',
'Regulatory scrutiny (SEC filings, GDPR '
'violations)',
'Customer churn (trust erosion)',
'Increased insurance premiums',
'Incident response resource drain'],
'payment_information_risk': ['M&S: Masked card data (low risk)',
'AT&T: SSNs (high risk)',
'Healthcare: PHI + insurance data '
'(critical risk)'],
'revenue_loss': ['United Healthcare: $370B revenue (Change '
'Healthcare subsidiary)',
'Retailers: Undisclosed (sales disruption during '
'peak periods)'],
'systems_affected': ['Healthcare (Change Healthcare, Ascension)',
'Telecom (AT&T)',
'Retail (M&S, Co-op, Harrods)',
'Government/Military (Pentagon 2015)',
'IoT Devices (124% attack increase)',
'Cloud Infrastructure (Cryptojacking)']},
'initial_access_broker': {'backdoors_established': ['Persistent access '
'(BlackCat/AlphV)',
'Web shells (Ascension)'],
'data_sold_on_dark_web': ['AT&T SSNs (2019 breach)',
'Stolen credentials '
'(credential stuffing)',
'Corporate espionage '
'data'],
'entry_point': ['Phishing emails (Ascension malware '
'download)',
'Exploited vulnerabilities (Change '
'Healthcare)',
'Compromised credentials (AT&T 2019 '
'breach)',
'Third-party vendors (supply chain '
'attacks)',
'Unpatched IoT devices (lateral '
'movement)'],
'high_value_targets': ['Healthcare (PHI, insurance '
'data)',
'Financial (payment systems, '
'BEC)',
'Government (military '
'personnel records)'],
'reconnaissance_period': ['Weeks-Months (APT '
'groups)',
'Days (opportunistic '
'ransomware)']},
'investigation_status': [{'incident': 'Change Healthcare',
'status': 'Ongoing (ransom paid, forensic '
'analysis)'},
{'incident': 'AT&T',
'status': 'Ongoing (2019 breach, dark web '
'monitoring)'},
{'incident': 'Ascension',
'status': 'Ongoing (data theft confirmed, recovery '
'phase)'},
{'incident': 'M&S/Co-op/Harrods',
'status': 'Contained (failed ransomware, systems '
'restored)'},
{'incident': 'General Trends',
'status': 'Continuous (industry-wide threat '
'intelligence)'}],
'lessons_learned': ['Legacy systems are prime targets (AT&T 2019 breach '
'resurfaced)',
'Third-party risks extend attack surfaces (Change '
'Healthcare)',
'Human error remains a critical vector (Ascension malware '
'download)',
'Ransomware payments fund further attacks '
'(BlackCat/AlphV)',
'Encrypted threats bypass traditional firewalls (93% '
'increase in 2024)',
'IoT devices require dedicated security (124% attack '
'surge)',
'AI-driven attacks (vishing +442%) demand adaptive '
'defenses'],
'motivation': ['Financial Gain (Ransomware, BEC, Cryptojacking)',
'Espionage (Data Theft, Corporate/State Secrets)',
'Disruption (DDoS, Operational Sabotage)',
'Data Exfiltration (Dark Web Sales)',
'Reputation Damage (Brand Targeting)',
'Geopolitical (Nation-State Attacks)'],
'post_incident_analysis': {'corrective_actions': [{'technical': ['Deploy '
'EDR/XDR '
'solutions',
'Implement '
'network '
'micro-segmentation',
'Upgrade to '
'next-gen '
'firewalls '
'(NGFW)',
'Enforce '
'least-privilege '
'access']},
{'process': ['Mandate '
'security '
'awareness '
'training '
'(quarterly)',
'Conduct '
'tabletop '
'exercises '
'(ransomware '
'scenarios)',
'Automate '
'threat '
'intelligence '
'sharing',
'Integrate '
'threat '
'hunting into '
'SOC '
'operations']},
{'governance': ['Appoint '
'dedicated '
'CISO/DSO '
'roles',
'Align '
'cybersecurity '
'with '
'business '
'risk '
'appetite',
'Increase '
'board-level '
'oversight',
'Adopt '
'cybersecurity '
'frameworks '
'(NIST, ISO '
'27001)']}],
'root_causes': ['Inadequate patch management '
'(AT&T, IoT)',
'Lack of MFA (Ascension, phishing)',
'Over-reliance on legacy firewalls '
'(encrypted threats)',
'Third-party risk blindness '
'(Change Healthcare)',
'Insider threat neglect '
'(malicious/accidental)',
'Poor IoT security hygiene '
'(default credentials)']},
'ransomware': {'data_encryption': ['Full encryption (Change Healthcare)',
'Partial encryption (Ascension)'],
'data_exfiltration': ['Double extortion (Change Healthcare: '
'data stolen + encrypted)'],
'ransom_demanded': ['$22M (Change Healthcare, paid)',
'Undisclosed (M&S/Co-op/Harrods, '
'attempted)'],
'ransom_paid': ['$22M (Change Healthcare to BlackCat/AlphV)'],
'ransomware_strain': ['BlackCat/AlphV (Change Healthcare)',
'Scattered Spider (UK retailers, '
'failed)']},
'recommendations': [{'strategic': ['Adopt Zero Trust Architecture (ZTA)',
'Implement AI-driven threat detection',
'Conduct regular red team exercises',
'Prioritize third-party risk management']},
{'tactical': ['Enforce MFA universally (prevent 80% of '
'breaches)',
'Segment networks to limit lateral movement',
'Deploy behavioral WAFs for web apps',
'Encrypt data at rest/transit (especially '
'PII/PHI)',
'Update IoT firmware and monitor for '
'anomalies']},
{'operational': ['Train employees on phishing/vishing '
'(55% of attacks financially motivated)',
'Test backup integrity (ransomware '
'recovery)',
'Monitor dark web for credential leaks',
'Establish cross-functional incident '
'response teams']},
{'compliance': ['Align with NIS2 (EU), CIS Controls, '
'MITRE ATT&CK',
'Automate compliance reporting (GDPR, '
'HIPAA)',
'Conduct annual penetration tests']}],
'references': [{'date_accessed': '2024',
'source': 'ITRC Annual Data Breach Report 2024',
'url': 'https://www.idtheftcenter.org'},
{'date_accessed': '2024',
'source': 'Sophos: The State of Ransomware 2024',
'url': 'https://www.sophos.com'},
{'date_accessed': '2025',
'source': 'Verizon 2025 Data Breach Investigations Report',
'url': 'https://www.verizon.com/business/resources/reports/dbir/'},
{'date_accessed': '2024',
'source': 'SonicWall Cyber Threat Report 2024',
'url': 'https://www.sonicwall.com/threat-report/'},
{'date_accessed': '2024',
'source': 'IBM Cost of a Data Breach Report 2024',
'url': 'https://www.ibm.com/reports/data-breach'},
{'date_accessed': '2024',
'source': 'UK Government Cyber Security Breaches Survey 2024',
'url': 'https://www.gov.uk/government/statistics'},
{'date_accessed': '2024',
'source': 'SEC Filing: Change Healthcare 8-K (February 2024)',
'url': 'https://www.sec.gov/edgar/browse/'},
{'date_accessed': '2025',
'source': 'BBC: M&S, Co-op, Harrods Cyberattacks (April 2025)',
'url': 'https://www.bbc.com/news'}],
'regulatory_compliance': {'fines_imposed': ['Potential: $4.99M (insider '
'threat average)',
'Undisclosed (ongoing '
'investigations)'],
'legal_actions': ['Class-action lawsuits (AT&T, '
'healthcare breaches)',
'Regulatory probes (SEC, ICO UK)'],
'regulations_violated': ['HIPAA (Change Healthcare, '
'Ascension)',
'GDPR (AT&T, UK retailers)',
'SEC Disclosure Rules '
'(Change Healthcare 8-K)',
'CCPA (AT&T, if CA '
'residents affected)'],
'regulatory_notifications': ['SEC (Change '
'Healthcare)',
'ICO (UK retailers)',
'HHS (healthcare '
'breaches)']},
'response': {'communication_strategy': ['Public disclosures (SEC filings, '
'press releases)',
'Customer advisories (AT&T, M&S)',
'Transparency reports (healthcare '
'breaches)'],
'containment_measures': ['Network isolation (Ascension, '
'retailers)',
'Endpoint detection/response (EDR) '
'deployment',
'Dark web monitoring (AT&T)',
'Password resets (M&S customers)'],
'enhanced_monitoring': ['SIEM upgrades (Change Healthcare)',
'Threat intelligence feeds (AT&T)'],
'incident_response_plan_activated': ['Change Healthcare: SEC 8-K '
'filing, ransom payment',
'Ascension: Emergency care '
'diversions, forensic '
'investigation',
'M&S/Co-op/Harrods: System '
'shutdowns, customer '
'notifications',
'AT&T: Dark web monitoring, '
'credit protection offers'],
'law_enforcement_notified': ['FBI (BlackCat/AlphV, Scattered '
'Spider)',
'UK National Cyber Security Centre '
'(M&S/Co-op/Harrods)',
'Interpol/Europol (cross-border '
'attacks)'],
'network_segmentation': ['Implemented post-breach (Ascension, '
'retailers)'],
'recovery_measures': ['Backup restoration (ransomware victims)',
'Customer compensation (credit monitoring)',
'Operational continuity planning'],
'remediation_measures': ['Patch management (IoT, zero-day '
'vulnerabilities)',
'Credential rotation (compromised '
'accounts)',
'Data encryption enhancements',
'Legacy system upgrades'],
'third_party_assistance': ['Cybersecurity firms (forensics, '
'recovery)',
'Legal counsel (regulatory '
'compliance)',
'PR agencies (crisis '
'communications)']},
'stakeholder_advisories': ['Healthcare: HHS bulletins on ransomware '
'resilience',
'Retail: PCI DSS updates for payment security',
'Telecom: FCC guidelines on customer data '
'protection',
'SMBs: CISA resources for ransomware readiness'],
'threat_actor': ['BlackCat/AlphV (Ransomware Group, Nation-State Linked)',
'Scattered Spider (Cybercrime Group)',
'Unspecified APT Groups (Advanced Persistent Threats)',
'Insider Threats (Malicious/Compromised)',
'Opportunistic Cybercriminals (Phishing, BEC)',
'Hacktivists (Data Leaks for Ideological Reasons)'],
'title': 'Cybersecurity Threats and Incident Trends (2024-2025)',
'type': ['Data Breach',
'Ransomware',
'Phishing',
'Malware',
'IoT Attack',
'DDoS',
'Cryptojacking',
'Business Email Compromise (BEC)',
'Social Engineering'],
'vulnerability_exploited': ['Legacy Firewall Gaps (Encrypted Threats)',
'Unpatched Software (IoT, Zero-Day)',
'Weak Credentials (Reused/Predictable Passwords)',
'Lack of Multi-Factor Authentication (MFA)',
'Misconfigured Cloud Storage',
'Third-Party Vendor Risks',
'Social Engineering (Trust Exploitation)']}