over 100 million
In April 2024, UnitedHealth Group made the significant admission that it had paid a ransom to the cybercriminals behind the devastating February 2024 attack on its subsidiary, Change Healthcare. The attack, orchestrated by the BlackCat/ALPHV ransomware group, brought a critical part of the U.S. healthcare infrastructure to a standstill, disrupting billing, prescriptions, and patient care nationwide. The financial impact on UnitedHealth was immediate, with the company reporting an $872 million hit in Q1 2024. The attackers claimed to have exfiltrated 6 terabytes of sensitive patient data, raising fears of a massive data breach affecting a substantial portion of the U.S. population. The confirmation of a ransom payment, reportedly $22 million, has fueled a debate about the ethics and effectiveness of paying cybercriminals.
The attack on Change Healthcare is one of the most impactful ransomware incidents on U.S. critical infrastructure to date. Change Healthcare's systems process about half of all U.S. medical claims, and their outage had a cascading effect on hospitals, clinics, and pharmacies. The BlackCat/ALPHV group, a sophisticated RaaS operation with links to former members of the DarkSide and BlackMatter gangs, was responsible. Their business model relies on high-impact attacks against large organizations, followed by double or triple extortion (encryption, data leak threats, and direct harassment of patients/customers).
The initial access vector for the Change Healthcare attack was reportedly a compromised Citrix remote access portal that lacked multi-factor authentication. Once inside, the attackers were able to move laterally through the network over a period of days, exfiltrating massive amounts of data before deploying the BlackCat ransomware to encrypt systems. This long dwell time allowed them to maximize their impact and data theft.
T1133 - External Remote Services: Initial access via a compromised Citrix portal.T1078 - Valid Accounts: Use of stolen credentials to log into the remote access service.T1048 - Exfiltration Over Alternative Protocol: Theft of 6 TB of data before encryption.T1486 - Data Encrypted for Impact: Deployment of the BlackCat ransomware to disrupt operations.T1021 - Remote Services: Used for lateral movement within the network.The impact of the Change Healthcare attack has been catastrophic:
No specific Indicators of Compromise (IOCs) were provided in the source articles.
To hunt for BlackCat activity:
rundll32.exerundll32.exe to execute its payload. Monitor for suspicious command-line arguments.C:\Windows\Temp\wmic.exe ... shadowcopy deleteMulti-factor Authentication technique.The failure to have MFA on the initial access point was the root cause of this breach. Enforcing MFA is non-negotiable for all remote access.
Mapped D3FEND Techniques:
Proper network segmentation would have limited the attackers' ability to move from the compromised Citrix portal to the entire corporate network.
Implementing egress filtering and DLP solutions to detect and block massive data exfiltration attempts is a critical control.
Mapped D3FEND Techniques:
The Change Healthcare breach is a textbook case for the absolute necessity of multi-factor authentication. The initial access point was a Citrix portal without MFA. The single most impactful countermeasure any organization can implement to prevent a similar attack is to enforce phishing-resistant MFA on every single remote access point, without exception. This includes VPNs, Citrix portals, RDP gateways, and any other service that allows external access to the internal network. This is not just a recommendation; it should be considered a baseline security requirement for any organization, especially those in critical infrastructure sectors like healthcare. Had MFA been in place, the stolen credential would have been useless, and this catastrophic attack could have been prevented at the first step.
The exfiltration of 6 terabytes of data before encryption is a massive failure of network security monitoring. Implementing User Data Transfer Analysis, likely through a combination of Data Loss Prevention (DLP) and Network Detection and Response (NDR) tools, is a critical countermeasure. Security teams must establish baselines for normal data transfer volumes and patterns. An alert should be triggered when a system begins to transfer an anomalous amount of data to an external destination. For a transfer of this magnitude, automated systems should not just alert but actively block the connection and quarantine the source host. It is unacceptable for terabytes of data to leave a network undetected. This technique provides a last line of defense to prevent the data breach aspect of a double-extortion ransomware attack.
The initial ransomware attack on Change Healthcare begins, causing widespread outages.
UnitedHealth Group confirms in an earnings call that it paid a ransom to the attackers.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats