All cases

Change Healthcare Ransomware Attack

February 2024

RansomwarePeak: DegradationAttribution: High ConfidenceHealthcareCritical Infrastructure
Year
2024
Actor country
Russia (criminal, possible state nexus)
Target regions
United States
Unpeace score
8

Executive Summary

ALPHV/BlackCat ransomware attack on Change Healthcare, a UnitedHealth Group subsidiary processing approximately one-third of all US healthcare claims. The attack disrupted prescription processing, insurance claims, and revenue cycles across the US healthcare system for weeks, affecting hospitals, pharmacies, and patients nationwide. UnitedHealth reportedly paid a $22M ransom.

Why This Matters

Change Healthcare demonstrated that a single ransomware attack on a dominant healthcare intermediary can cascade into a national healthcare crisis, making the case for treating healthcare claims infrastructure as critical national infrastructure.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2024-02-12
Intrusion

Initial access via stolen credentials

Attackers gained access to Change Healthcare systems using compromised credentials for a Citrix remote access portal lacking multi-factor authentication.

2024-02-21
Disruption

Ransomware deployment and system shutdown

ALPHV/BlackCat ransomware encrypted critical systems; Change Healthcare disconnected its entire network, halting claims processing nationwide.

2024-02
Degradation

Healthcare system cascading impact

Pharmacies could not process prescriptions; hospitals lost revenue cycle management; small practices faced cash-flow crises threatening viability.

Threshold Crossings

  • Largest disruption to US healthcare infrastructure from a single cyber attack
  • Demonstrated systemic concentration risk in healthcare claims processing

Restraint Factors

  • Financially motivated — no geopolitical or destructive intent beyond extortion
  • Attackers offered decryption for ransom payment

Attribution Assessment

High ConfidenceALPHV/BlackCat ransomware-as-a-service group, a Russian-speaking criminal organization
Russia (criminal, possible state nexus)
ALPHVBlackCatNoberus
1. Technical

Threat actor mapped to Russia (criminal, possible state nexus) based on infrastructure analysis, malware attribution, and operational patterns.

Evidence: UnitedHealth Group: Change Healthcare Cyber Response Update

2. Political / Legal
No formal state response
  • HHS and CISA emergency coordination and guidance for affected providers
  • Congressional hearings on healthcare cybersecurity and concentration risk
  • UnitedHealth CEO testified before Senate Finance Committee (May 2024)

Sources: CISA: ALPHV BlackCat Advisory Update; Senate Finance Committee: Hearing Testimony on Change Healthcare

3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

High Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

8

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak4/6
Threshold crossings2/4
Governance flags2/8
Sectors affected2/6
Entanglement4/10
Country scope1/6

Coercive Function

Ransomware

Denial of access through encryption — coercive value through economic extortion and operational disruption.

Observed coercive effects

  • Largest disruption to US healthcare infrastructure from a single cyber attack
  • Demonstrated systemic concentration risk in healthcare claims processing

Entanglement Risk

Entanglement score4

Sectors affected

HealthcareCritical Infrastructure

Countries / regions

United States

Impact summary

Healthcare claims processing disrupted nationwide for weeks; pharmacies, hospitals, and providers affected; $22M ransom reportedly paid.

Infrastructure Meaning

Malware / tooling

ALPHVBlackCat

Capability profile

Healthcare claims processing disrupted nationwide for weeks; pharmacies, hospitals, and providers affected; $22M ransom reportedly paid.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • Protection of healthcare infrastructure as critical civilian necessity
  • Corporate duty of care for healthcare data and operational resilience

Policy responses

  • HHS and CISA emergency coordination and guidance for affected providers
  • Congressional hearings on healthcare cybersecurity and concentration risk
  • UnitedHealth CEO testified before Senate Finance Committee (May 2024)

Regulatory changes

  • Renewed push for mandatory healthcare cybersecurity standards
  • HHS proposed updates to HIPAA Security Rule with prescriptive controls
  • CMS accelerated payment programs to offset provider cash-flow disruptions

Governance impact assessment

Exposed the systemic fragility of concentrated healthcare infrastructure and accelerated federal momentum toward mandatory cybersecurity standards for healthcare entities handling critical claims processing functions.

Sources

G

CISA: ALPHV BlackCat Advisory Update

Government2024-02-27
V

UnitedHealth Group: Change Healthcare Cyber Response Update

Vendor Report2024-03-13
G

Senate Finance Committee: Hearing Testimony on Change Healthcare

Government2024-05-01

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.