Over 6 million records breached
A new report from Comparitech reveals a concerning trend in the healthcare sector: ransomware actors are shifting their focus from direct patient care providers to their less-secure vendors and business partners. In the first three quarters of 2025, attacks on these healthcare-affiliated businesses surged by 30%. This strategic pivot allows threat actors like Qilin and INC to exploit the supply chain, causing widespread disruption and accessing sensitive patient data indirectly. This shift follows several high-profile, disruptive attacks on major hospital systems, suggesting that attackers are now targeting the softer underbelly of the healthcare ecosystem to achieve their goals.
The data, covering the first nine months of 2025, shows a clear and deliberate change in ransomware targeting strategy.
This tactic is a classic example of abusing a Trusted Relationship (T1199) to bypass the defenses of a primary target.
Several prominent ransomware groups have been active in this space:
The impact of this strategic shift is substantial and multifaceted.
Healthcare organizations must expand their security focus beyond their own perimeters.
User Data Transfer Analysis (D3-UDTA) can help detect anomalous data exfiltration to or from a vendor.Defending against these supply chain attacks requires a proactive and collaborative approach.
Pre-compromise (M1056).Network Segmentation (M1030) to isolate systems that interact with third-party vendors. This can limit the blast radius if a vendor's connection is compromised, preventing attackers from moving laterally into core clinical networks.Segmenting networks can help contain the impact of a ransomware attack originating from a compromised vendor, preventing lateral movement.
Extending security assessments and vulnerability management requirements to third-party vendors is crucial for mitigating supply chain risk.
Enforcing the principle of least privilege for all vendor accounts limits the potential damage if an account is compromised.
Establishing strong contractual security requirements and conducting due diligence on vendors before onboarding them.
To combat the threat of ransomware spreading from a compromised healthcare vendor, providers must implement robust network segmentation, a form of Broadcast Domain Isolation. Create a dedicated, isolated network segment (a 'DMZ' for vendors) where all third-party connections terminate. Systems within this zone should have no direct access to the core clinical network or sensitive data repositories. All communication between the vendor DMZ and the internal network must be strictly controlled and proxied through application-layer firewalls that inspect traffic for malicious activity. This ensures that even if a vendor's connection is hijacked by a ransomware group like Qilin, the attack is contained within the isolated segment, preventing it from spreading laterally and encrypting critical hospital systems.
Healthcare organizations should apply Job Function Access Pattern Analysis to all vendor accounts. For each vendor (e.g., a medical billing service), define their specific job function and establish a baseline of normal data access patterns. The billing service should only access patient billing information, not clinical trial data or electronic health records. By using a CASB or similar tool, security teams can monitor for deviations from this baseline. If the billing vendor's account suddenly starts trying to access the EHR database or download large volumes of data outside its defined role, an automated alert should be triggered. This allows for the detection and suspension of a compromised vendor account before a significant breach occurs.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats