On February 10, 2026, Marquis Health Services, a subacute rehabilitation and skilled nursing care provider, disclosed it was the victim of a ransomware attack. In a statement, the company attributed the breach to a compromise of its SonicWall cloud backup systems. This access allowed threat actors to encrypt vital data, leading to significant operational disruptions. The attack vector is particularly concerning as it demonstrates a sophisticated understanding by attackers of business continuity processes. By targeting and compromising the backup infrastructure, the attackers aimed to ensure their ransomware attack would be successful by crippling the primary means of recovery. This incident highlights a critical supply chain risk and underscores the necessity for robust security controls around all third-party services, especially those integral to disaster recovery.
This attack is a textbook example of a Supply Chain Attack, where an organization is breached through a trusted third-party vendor or service. It also aligns with the ransomware tactic of T1486 - Data Encrypted for Impact combined with T1562.008 - Impair Defenses: Disable Cloud Logs (or in this case, backups).
The exact method of compromise for the SonicWall cloud backup system was not detailed, but several possibilities exist:
Once the attackers gained control of the backup system (T1078 - Valid Accounts), they could perform several malicious actions:
T1565 - Data Manipulation)T1537 - Transfer Data to Cloud Account)This 'attack the recovery' strategy is highly effective and demonstrates a mature adversary.
The impact on a healthcare provider like Marquis Health Services is severe:
DELETE /api/backupsD3-DAM: Domain Account Monitoring (extended to cloud admin accounts) to detect anomalous login behavior. Implement D3-ACH: Application Configuration Hardening by enabling immutability and object lock on cloud storage.Enforce MFA on all administrative accounts, especially for critical third-party services like cloud backup systems.
Mapped D3FEND Techniques:
Configure cloud backup storage with immutability and object versioning to prevent deletion or modification of backups by a compromised account.
Mapped D3FEND Techniques:
Continuously monitor audit logs from cloud service providers for suspicious activities like mass deletions or logins from unusual locations.
Mapped D3FEND Techniques:
Regularly assess the security of third-party platforms and on-premises appliances for vulnerabilities and misconfigurations.
The core failure in the Marquis Health Services breach was the ability of attackers to destroy backups. The most powerful defense against this is to harden the configuration of the cloud backup storage itself by enabling immutability. On platforms like AWS S3, this is achieved with 'Object Lock' in Compliance mode. On Azure, it's 'Immutable storage for blobs'. When enabled, this feature makes it technically impossible to delete or modify data for a predefined retention period, even for an account with root-level privileges. Organizations must configure their cloud backup solutions to write data to an immutable bucket or container with a retention policy that aligns with their business continuity needs (e.g., 30 days). This single control would have rendered the attacker's attempt to cripple the recovery process useless, as the backups would have remained intact and available for restoration, completely undermining the ransomware attack.
To prevent the initial compromise of the SonicWall cloud backup portal, mandatory Multi-Factor Authentication (MFA) for all administrative accounts is non-negotiable. The credentials for a backup system are among the most powerful in an organization and must be protected as such. Phishing-resistant MFA, such as FIDO2 security keys, should be the standard for these privileged accounts. By requiring a physical token or biometric verification, MFA prevents attackers from gaining access even if they successfully steal a password through phishing or other means. This preventative control acts as the first line of defense, securing the 'front door' to the backup environment and stopping attacks like the one against Marquis Health Services before they can even begin.
Marquis Health Services reports it suffered a ransomware attack originating from its cloud backup system.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.