FBI: Ransomware Attacks on Healthcare and Critical Infrastructure are Surging

Ransomware Remains Top Threat to Critical Sectors, with Healthcare and Manufacturing Hardest Hit, FBI Reports

HIGH
February 13, 2026
4m read
RansomwareCyberattackIndustrial Control Systems

Related Entities

Organizations

Other

Colonial PipelineJBSUnited States

Full Report

Executive Summary

According to a recent report from the FBI, ransomware has become the most dominant and damaging cyber threat to U.S. critical infrastructure. The report highlights a significant increase in attacks, affecting at least 14 of the 16 designated critical sectors. The healthcare and manufacturing sectors are bearing the brunt of these campaigns. Threat actors are deliberately targeting organizations with a low tolerance for downtime, knowing the immense pressure they are under to restore services increases the likelihood of a ransom payment. The consequences of these attacks extend beyond financial loss, posing direct risks to public health and safety, as seen in the disruption of patient care in hospitals and the fuel shortages caused by the Colonial Pipeline attack.

Threat Overview

Ransomware attacks on critical infrastructure are a multifaceted threat involving data encryption, data exfiltration (double extortion), and service disruption. Attackers recognize that disrupting essential services like healthcare or energy distribution creates immense public and political pressure on the victim organization.

  • Targeting: The healthcare sector is a prime target because of the direct impact on human lives. An attack can force hospitals to divert ambulances, cancel surgeries, and delay diagnoses, directly impacting patient outcomes.
  • Impact: The 2021 attack on Colonial Pipeline, which shut down nearly half of the U.S. East Coast's fuel supply, demonstrated the potential for a single ransomware incident to cause widespread societal disruption, including panic buying and economic turmoil.
  • Motivation: The high-pressure environment makes these victims more likely to pay a ransom to restore operations quickly, making it a highly profitable enterprise for cybercriminals.

Technical Analysis

Ransomware groups use a variety of TTPs to gain initial access and deploy their payloads. Common initial access vectors include:

Once inside, they perform reconnaissance, escalate privileges, and move laterally to identify and exfiltrate valuable data before executing the final encryption payload (T1486 - Data Encrypted for Impact). To further pressure victims, they often destroy or encrypt backups (T1490 - Inhibit System Recovery).

Impact Assessment

The impact of ransomware on critical infrastructure is severe and multi-layered:

  • Public Safety: Direct threat to human life in healthcare settings; disruption of essential services like power, water, and transportation.
  • Economic Damage: Costs include ransom payments, recovery and remediation expenses, lost revenue from downtime, and regulatory fines.
  • National Security: A successful large-scale attack on critical infrastructure can be considered an act of aggression and a threat to national security, destabilizing the country and eroding public trust.

Detection & Response

  • Endpoint Detection and Response (EDR): Deploy EDR solutions to detect common ransomware behaviors, such as rapid file modification/encryption, deletion of volume shadow copies (vssadmin), and attempts to disable security tools. This aligns with D3FEND's Process Analysis (D3-PA).
  • Network Monitoring: Monitor for large, unexpected data outflows, which could indicate data exfiltration prior to encryption. Look for C2 traffic to known malicious domains.
  • Decoy Files: Use honeypot files or "canaries" on file shares. An alert on the modification of these files can provide an early warning of ransomware activity.

Mitigation

  1. Backup and Recovery: Maintain offline, immutable, and regularly tested backups. This is the single most important mitigation for recovering from a ransomware attack without paying the ransom. This is a core concept of D3FEND's File Restoration (D3-FR).
  2. Patch Management: Aggressively patch vulnerabilities, especially those in internet-facing systems like VPNs and firewalls. Prioritize CVEs listed in CISA's KEV catalog.
  3. Network Segmentation: Segment networks to prevent ransomware from spreading from the IT environment to critical OT systems or from one part of the business to another.
  4. Security Awareness Training: Train users to recognize and report phishing attempts, a primary initial access vector for ransomware.

Timeline of Events

1
February 13, 2026
This article was published

MITRE ATT&CK Mitigations

Maintain isolated, immutable, and frequently tested backups to ensure you can recover data without paying a ransom.

Implement a rigorous patch management program to close the vulnerabilities that ransomware groups commonly exploit for initial access.

Mapped D3FEND Techniques:

Educate employees on how to spot and report phishing emails, which remain a primary initial access vector for ransomware.

Sources & References

Ransomware Attacks on Critical Infrastructure Surge, Reports FBI
Tripwire (tripwire.com) February 13, 2026
The Threat of Ransomware to Critical Infrastructure
Belfer Center for Science and International Affairs (belfercenter.org) February 13, 2026
Ransomware Critical Infrastructure | Sepio
Sepio (sepiocyber.com) February 12, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareFBIHealthcareCritical InfrastructureColonial PipelineCyberattack

📢 Share This Article

Help others stay informed about cybersecurity threats