{"id":24050,"date":"2024-02-28T11:12:53","date_gmt":"2024-02-28T19:12:53","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17780\/"},"modified":"2024-02-28T11:12:53","modified_gmt":"2024-02-28T19:12:53","slug":"news-17780","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17780\/","title":{"rendered":"Change Healthcare outages reportedly caused by ransomware"},"content":{"rendered":"\n<p>On Wednesday February 21, 2024, Change Healthcare\u2014a subsidiary of UnitedHealth Group\u2014experienced serious system outages due to a cyberattack.<\/p>\n<p>In a <a href=\"https:\/\/www.sec.gov\/ixviewer\/ix.html?doc=\/Archives\/edgar\/data\/731766\/000073176624000045\/unh-20240221.htm\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Form 8-K filing<\/a> the company said it:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cidentified a suspected nation-state associated cyber security threat actor had gained access to some of the Change Healthcare information technology systems.\u201d<\/p>\n<\/blockquote>\n<p>Change Healthcare is one of the largest healthcare technology companies in the United States. Its subsidiary, Optum Solutions, operates the Change Healthcare platform. This platform is the largest payment exchange platform between doctors, pharmacies, healthcare providers, and patients in the US healthcare system.<\/p>\n<p>The incident led to widespread billing outages, as well as disruptions at pharmacies across the United States.<\/p>\n<p><a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/cyber-security-outage-change-healthcare-continues-sixth-straight-day-2024-02-26\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">According to Reuters<\/a>, the group behind the attack is the ALPHV\/BlackCat ransomware group. ALPHV is currently one of the most active groups, and generally associated with Russia. They are certainly no strangers to <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/lehigh-valley-health-network-targeted-by-blackcat-ransomware\">attacking healthcare providers<\/a>. In our <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/ransomware-review-february-2024\">monthly ransomware reviews<\/a> you will typically find them in the top five of ransomware groups. Even after a disruption in December 2023 they <a href=\"https:\/\/www.malwarebytes.com\/blog\/ransomware\/2023\/12\/alphv-ransomware-gang-returns-sorta\">returned<\/a> and maintained a high level of activity.<\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/unitedhealth-subsidiary-optum-hack-linked-to-blackcat-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BleepingComputer<\/a> confirmed Reuters assertion, saying it had received information from forensic experts involved in the incident response that linked the attack to the ALPHV ransomware gang.<\/p>\n<p>It would certainly make more sense to us that the attacker was a ransomware group than a nation-state associated group, but both ALPHV and UnitedHealth have not commented on this. That&#8217;s no surprise since the investigation is probably still ongoing and solving the security issue is a higher priority.<\/p>\n<p>What the ramifications of any stolen data are, remains to be seen, but they could be very serious given the size of the company and the nationwide application of their electronic health record (EHR) systems, payment processing, care coordination, and data analytics.<\/p>\n<p>In a February 26 update the company says it took immediate action to disconnect Change Healthcare\u2019s systems in order to prevent further impact. You can follow updates about the issue on the <a href=\"https:\/\/status.changehealthcare.com\/incidents\/hqpjz25fn3n7\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">dedicated incident report site<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-avoid-ransomware\">How to avoid ransomware<\/h2>\n<ul>\n<li><strong>Block common forms of entry.<\/strong>&nbsp;Create a plan for&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a>&nbsp;in internet-facing systems quickly; and disable or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a>&nbsp;like RDP and VPNs.<\/li>\n<li><strong>Prevent intrusions.<\/strong>&nbsp;Stop threats early before they can even infiltrate or infect your endpoints. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a>&nbsp;that can prevent exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions.<\/strong>&nbsp;Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a>&nbsp;to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption.<\/strong>&nbsp;Deploy Endpoint Detection and Response software like&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">ThreatDown EDR<\/a>&nbsp;that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.<\/li>\n<li><strong>Create offsite, offline backups.<\/strong>&nbsp;Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Don\u2019t get attacked twice.<\/strong>&nbsp;Once you\u2019ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p>Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-371336e6-815b-4134-8818-f944dbc308bb\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/change-healthcare-outages-reportedly-caused-by-ransomware\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The cyberattack on Change Healthcare that has been causing a lot of disruptions is likely the work of the BlackCat\/ALPHV ransomware gang. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26819,25303,30957,32,3765,30958],"class_list":["post-24050","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-alphv","tag-blackcat","tag-change-healthcare","tag-news","tag-ransomware","tag-unitedhealth"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24050"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24050\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}