April 8, 2024 Breach

A Vendor Breach That Disrupted an Entire Industry

On February 21, 2024, Change Healthcare, a subsidiary of UnitedHealth Group's Optum division, was hit by a ransomware attack carried out by the ALPHV/BlackCat ransomware group. Change Healthcare processes approximately 15 billion healthcare claims transactions annually — roughly one-third of all U.S. healthcare claims — making it one of the most critical third-party vendors in the American healthcare system. The attack brought claims processing to a halt nationwide, delayed prescription fulfillment for millions of patients, and ultimately exposed the protected health information of 190 million individuals, making it the largest healthcare data breach in history.

The Attack and Its Immediate Impact

The ALPHV/BlackCat group gained initial access to Change Healthcare's systems through compromised credentials on a Citrix remote access portal that lacked multi-factor authentication (MFA), as UnitedHealth Group CEO Andrew Witty confirmed during Congressional testimony in May 2024. Once inside, the attackers moved laterally through Change Healthcare's network for approximately nine days before deploying the ransomware payload on February 21.

The operational disruption was immediate and far-reaching:

The Ransom and Double Extortion

UnitedHealth Group paid a $22 million ransom to the ALPHV/BlackCat group. However, in a twist that illustrated the unreliability of criminal negotiations, the ALPHV group appeared to execute an "exit scam" — taking the ransom payment and shutting down their infrastructure without fully delivering on their promises. Subsequently, an affiliate group calling itself RansomHub claimed to still possess the stolen data and issued additional extortion demands.

Scale of Data Exposure

In October 2024, UnitedHealth Group updated its breach notification to confirm that approximately 190 million individuals were affected, a dramatic increase from earlier estimates of 100 million. The compromised data included:

Data Category Details
Personal Information Names, addresses, dates of birth, Social Security numbers
Health Information Diagnoses, medications, test results, treatment records
Insurance Information Health plan details, member/group ID numbers, Medicaid/Medicare IDs
Financial Information Claims and billing data, payment information, banking details

Financial Impact

In its SEC filings, UnitedHealth Group reported that the total cost of the Change Healthcare breach exceeded $2 billion through 2024, encompassing incident response, system restoration, provider financial assistance, customer notifications, and enhanced security measures. This figure does not include ongoing litigation costs, regulatory penalties from the HHS Office for Civil Rights (OCR) investigation, or long-term reputational damage.

TPRM Lesson Learned: The Change Healthcare breach demonstrates the catastrophic consequences of vendor concentration risk in critical infrastructure. When a single vendor processes one-third of all healthcare claims in the United States, its compromise becomes a systemic event. TPRM programs in healthcare must identify single points of failure in their vendor ecosystems and develop contingency plans for the disruption of critical transaction-processing vendors. Furthermore, the root cause — a Citrix portal without MFA — underscores that even the most consequential breaches often stem from basic security hygiene failures. Vendor risk assessments must verify that fundamental controls like MFA are implemented on all remote access points, not just take the vendor's word for it.

Third-Party Risk Management Lessons

FAIR Quantification of Healthcare Vendor Risk

The Change Healthcare breach is a landmark data point for FAIR risk quantification in the healthcare sector. With $2+ billion in direct costs, 190 million affected individuals, and nationwide operational disruption, it establishes a concrete upper-bound estimate for loss magnitude when a systemically important healthcare vendor is compromised. Organizations using FAIR to quantify vendor risk should use this incident to calibrate their loss magnitude estimates for critical claims-processing and health information exchange vendors.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. Change Healthcare Cyberattack Information - UnitedHealth Group
  2. UnitedHealth Group SEC 8-K Filings - U.S. Securities and Exchange Commission
  3. Change Healthcare Cybersecurity Incident - U.S. Department of Health and Human Services
  4. Congressional Testimony: Examining the Change Healthcare Cyberattack - House Energy & Commerce Committee
  5. Change Healthcare Cyberattack: What Physicians Need to Know - American Medical Association