On February 10, 2026, Marquis Health Services, a subacute rehabilitation and skilled nursing care provider, disclosed it was the victim of a ransomware attack. In a statement, the company attributed the breach to a compromise of its SonicWall cloud backup systems. This access allowed threat actors to encrypt vital data, leading to significant operational disruptions. The attack vector is particularly concerning as it demonstrates a sophisticated understanding by attackers of business continuity processes. By targeting and compromising the backup infrastructure, the attackers aimed to ensure their ransomware attack would be successful by crippling the primary means of recovery. This incident highlights a critical supply chain risk and underscores the necessity for robust security controls around all third-party services, especially those integral to disaster recovery.
This attack is a textbook example of a Supply Chain Attack, where an organization is breached through a trusted third-party vendor or service. It also aligns with the ransomware tactic of T1486 - Data Encrypted for Impact combined with T1562.008 - Impair Defenses: Disable Cloud Logs (or in this case, backups).
The exact method of compromise for the SonicWall cloud backup system was not detailed, but several possibilities exist:
Once the attackers gained control of the backup system (T1078 - Valid Accounts), they could perform several malicious actions:
T1565 - Data Manipulation)T1537 - Transfer Data to Cloud Account)This 'attack the recovery' strategy is highly effective and demonstrates a mature adversary.
The impact on a healthcare provider like Marquis Health Services is severe:
| Type | Value | Description | Context |
|---|---|---|---|
| log_source | Cloud Backup Provider Logs | Monitor for anomalous logins to the cloud backup management portal, especially from unrecognized IP addresses or geographic locations. | Cloud provider audit logs (e.g., AWS CloudTrail, Azure Activity Log) |
| api_endpoint | DELETE /api/backups |
Any API calls to delete backup sets or storage repositories should be treated as a critical, high-fidelity alert. | Cloud provider API logs |
| user_account_pattern | Creation of new admin accounts | An attacker may create a new administrative account in the backup platform for persistence. | User management logs in the backup service portal |
| network_traffic_pattern | Large data egress from backup repository | Unusually large data transfers out of the cloud backup storage to an unknown destination could indicate data exfiltration before a ransomware attack. | Cloud storage access logs, network flow data |
D3-DAM: Domain Account Monitoring (extended to cloud admin accounts) to detect anomalous login behavior. Implement D3-ACH: Application Configuration Hardening by enabling immutability and object lock on cloud storage.Enforce MFA on all administrative accounts, especially for critical third-party services like cloud backup systems.
Mapped D3FEND Techniques:
Configure cloud backup storage with immutability and object versioning to prevent deletion or modification of backups by a compromised account.
Mapped D3FEND Techniques:
Continuously monitor audit logs from cloud service providers for suspicious activities like mass deletions or logins from unusual locations.
Mapped D3FEND Techniques:
Regularly assess the security of third-party platforms and on-premises appliances for vulnerabilities and misconfigurations.
The core failure in the Marquis Health Services breach was the ability of attackers to destroy backups. The most powerful defense against this is to harden the configuration of the cloud backup storage itself by enabling immutability. On platforms like AWS S3, this is achieved with 'Object Lock' in Compliance mode. On Azure, it's 'Immutable storage for blobs'. When enabled, this feature makes it technically impossible to delete or modify data for a predefined retention period, even for an account with root-level privileges. Organizations must configure their cloud backup solutions to write data to an immutable bucket or container with a retention policy that aligns with their business continuity needs (e.g., 30 days). This single control would have rendered the attacker's attempt to cripple the recovery process useless, as the backups would have remained intact and available for restoration, completely undermining the ransomware attack.
To prevent the initial compromise of the SonicWall cloud backup portal, mandatory Multi-Factor Authentication (MFA) for all administrative accounts is non-negotiable. The credentials for a backup system are among the most powerful in an organization and must be protected as such. Phishing-resistant MFA, such as FIDO2 security keys, should be the standard for these privileged accounts. By requiring a physical token or biometric verification, MFA prevents attackers from gaining access even if they successfully steal a password through phishing or other means. This preventative control acts as the first line of defense, securing the 'front door' to the backup environment and stopping attacks like the one against Marquis Health Services before they can even begin.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats