Security

Cyber-crime

Mega US healthcare payments network restores system 9 months after ransomware attack

Change Healthcare’s $2 billion recovery is still a work in progress


Still reeling from its February ransomware attack, Change Healthcare confirms its clearinghouse services are back up and running, almost exactly nine months since the digital disruption began.

In an ordinary year, the healthcare organization handles 15 billion transactions – the most of any clearinghouse in the US. It looks after payments and transactions between and among healthcare providers, hospitals, practitioners, and patients throughout the US healthcare system. Its February ransomware attack by ALPHV/Blackcat led to a financial impact on a whopping 94 percent of hospitals the following month, according to the American Hospital Association (AHA).

The restoration of this service, confirmed via an update to its website status page, marks a key milestone in Change Healthcare's overall recovery from the attack, which is largely but not yet entirely complete. 

I'm blown away by the fact that they weren't using multi-factor authentication. I'm blown away that the networks weren't segmented...

The vast majority of its functions are back online and were all at least partially restored within just two months. The only business functions yet to achieve full restoration status are Clinical Exchange (e-health record information exchange), MedRX (pharmacy claims management), and its Payer Print Communication Multi-Channel Distribution System (payment document printing).

However, providers will be feeling the huge financial impact of the incident for much longer.

Providers reported financial difficulties almost immediately after Change Healthcare was floored by ALPHV. By early March, more than a third of them said more than half of their revenue was impacted by payment disruptions and nearly 60 percent of all hospitals reported a revenue shortfall of $1 million or more per day.

UnitedHealth-owned Optum launched its Temporary Funding Assistance Program on March 1 to support providers as they battled cashflow issues. In the same update that broke the news about the restoration of its clearinghouse services, Change Healthcare, which is also owned by UnitedHealth, said that as of October 15, $3.2 billion of funds loaned had been repaid. 

The total amount of money loaned out to providers on an interest-free basis is thought to be more than $6 billion. That's on top of the $872 million Change Healthcare spent on remediating the attack just at the end of March, costs that have since risen to well above $2 billion (inclusive of tax), per UnitedHealth's most recent earnings report [PDF].

The Register contacted Change Healthcare for a statement but it didn't immediately respond.

Around 100 million people were affected by Change Healthcare's mega-breach, per recent statistics from the Department of Health and Human Services (HHS). Factoring in the AHA's belief that the company processes around one in three US citizens' medical claims and the country's population of around 337 million, it means that nearly a third of the country was affected, and the vast majority of Change Healthcare patients were compromised.

The degree to which people's data was compromised varies, but full names, email addresses, banking data, claims records, and more were stolen.

Naturally, UnitedHealth CEO Andrew Witty was summoned to Congress soon after things went down to explain exactly how this weapons-grade stuffup was allowed to occur.

He explained to lawmakers that the ALPHV affiliate used stolen credentials to log into a Citrix portal that, you guessed it, didn't have multi-factor authentication (MFA) enabled.

Witty was grilled on the company's decision to pay the extortionists, a move that had previously been rumored based on blockchain analyses of known ALPHV wallets. He confirmed to senators that UnitedHealth indeed paid $22 million to the attackers.

He admitted he was the individual who authorized the payment, saying it "was one of the hardest decisions I've ever had to make. And I wouldn't wish it on anyone."

Experts speaking to The Register following the CEO's testimony said the security failings exploited by the cybercriminals were tantamount to "egregious negligence."

"I'm blown away by the fact that they weren't using multi-factor authentication," said Tom Kellermann, SVP of cyber strategy at Contrast Security. "I'm blown away that the networks weren't segmented. And I'm blown away that they didn't conduct threat hunting robustly into that environment knowing that they had been compromised. I think it's egregious negligence, frankly."

Send us news
5 Comments

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Heart surgery device maker's security bypassed, data encrypted and stolen

Sounds like th-aorta get this sorted quickly

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Russia arrests one of its own – a cybercrime suspect on FBI's most wanted list

The latest in an unusual change of fortune for group once protected by the Kremlin

BT Group confirms attackers tried to break into Conferencing division

Sensitive data allegedly stolen from US subsidiary following Black Basta post

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?