UnitedHealth Paid Ransom to BlackCat/ALPHV in Change Healthcare Breach

UnitedHealth Confirms Paying Ransom in Crippling Change Healthcare Attack

CRITICAL
April 27, 2026
4m read
RansomwareData BreachCyberattack

Impact Scope

People Affected

over 100 million

Industries Affected

Healthcare

Geographic Impact

United States (national)

Related Entities

Threat Actors

Organizations

Other

UnitedHealth Group Change Healthcare

Full Report

Executive Summary

In April 2024, UnitedHealth Group made the significant admission that it had paid a ransom to the cybercriminals behind the devastating February 2024 attack on its subsidiary, Change Healthcare. The attack, orchestrated by the BlackCat/ALPHV ransomware group, brought a critical part of the U.S. healthcare infrastructure to a standstill, disrupting billing, prescriptions, and patient care nationwide. The financial impact on UnitedHealth was immediate, with the company reporting an $872 million hit in Q1 2024. The attackers claimed to have exfiltrated 6 terabytes of sensitive patient data, raising fears of a massive data breach affecting a substantial portion of the U.S. population. The confirmation of a ransom payment, reportedly $22 million, has fueled a debate about the ethics and effectiveness of paying cybercriminals.

Threat Overview

The attack on Change Healthcare is one of the most impactful ransomware incidents on U.S. critical infrastructure to date. Change Healthcare's systems process about half of all U.S. medical claims, and their outage had a cascading effect on hospitals, clinics, and pharmacies. The BlackCat/ALPHV group, a sophisticated RaaS operation with links to former members of the DarkSide and BlackMatter gangs, was responsible. Their business model relies on high-impact attacks against large organizations, followed by double or triple extortion (encryption, data leak threats, and direct harassment of patients/customers).

Technical Analysis

The initial access vector for the Change Healthcare attack was reportedly a compromised Citrix remote access portal that lacked multi-factor authentication. Once inside, the attackers were able to move laterally through the network over a period of days, exfiltrating massive amounts of data before deploying the BlackCat ransomware to encrypt systems. This long dwell time allowed them to maximize their impact and data theft.

MITRE ATT&CK Mapping

Impact Assessment

The impact of the Change Healthcare attack has been catastrophic:

  • Nationwide Healthcare Disruption: For weeks, providers were unable to process claims, verify insurance, or fill prescriptions, leading to delayed care and significant financial strain on smaller practices.
  • Massive Financial Cost: UnitedHealth reported an initial cost of $872 million, with the total expected to be much higher. This includes the ransom payment, recovery efforts, and financial assistance to affected providers.
  • Unprecedented Data Breach: The potential compromise of health information for over 100 million Americans represents one of the largest data breaches in history, with long-term risks of fraud and identity theft.
  • Regulatory Scrutiny: The incident has triggered multiple government investigations and will likely lead to new regulations for the healthcare industry.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) were provided in the source articles.

Cyber Observables — Hunting Hints

To hunt for BlackCat activity:

Type
Process Name
Value
rundll32.exe
Description
BlackCat often uses rundll32.exe to execute its payload. Monitor for suspicious command-line arguments.
Type
File Path
Value
C:\Windows\Temp\
Description
Look for suspicious binaries or scripts being written to and executed from temporary directories.
Type
Command Line Pattern
Value
wmic.exe ... shadowcopy delete
Description
BlackCat, like other ransomware, attempts to delete backups.

Detection & Response

  • MFA on All Remote Access: The initial access vector highlights the absolute necessity of MFA on all external remote access solutions, without exception.
  • Network Egress Filtering: Detecting and blocking the exfiltration of 6 TB of data should be a priority. Implement Data Loss Prevention (DLP) and network monitoring to alert on large, anomalous data transfers.
  • Incident Response Plan: The scale of this incident underscores the need for a well-rehearsed incident response plan that includes communication strategies and business continuity plans for extended outages.

Mitigation

  1. Enforce MFA: The single most important lesson from this attack is to enforce phishing-resistant MFA on all remote access points and critical applications. This is a direct application of D3FEND's Multi-factor Authentication technique.
  2. Patch Management: Keep all internet-facing systems, including VPNs and remote access portals like Citrix, fully patched.
  3. Network Segmentation: Properly segmenting the network could have contained the breach and prevented the attackers from moving from the initial point of compromise to the entire Change Healthcare environment.
  4. Immutable Backups: While the data was also stolen, having immutable backups is crucial for restoring systems and avoiding the operational pressure that often leads to paying a ransom.

Timeline of Events

1
February 21, 2024
The initial ransomware attack on Change Healthcare begins, causing widespread outages.
2
April 22, 2024
UnitedHealth Group confirms in an earnings call that it paid a ransom to the attackers.
3
April 27, 2026
This article was published

MITRE ATT&CK Mitigations

The failure to have MFA on the initial access point was the root cause of this breach. Enforcing MFA is non-negotiable for all remote access.

Mapped D3FEND Techniques:

Proper network segmentation would have limited the attackers' ability to move from the compromised Citrix portal to the entire corporate network.

Mapped D3FEND Techniques:

Implementing egress filtering and DLP solutions to detect and block massive data exfiltration attempts is a critical control.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The Change Healthcare breach is a textbook case for the absolute necessity of multi-factor authentication. The initial access point was a Citrix portal without MFA. The single most impactful countermeasure any organization can implement to prevent a similar attack is to enforce phishing-resistant MFA on every single remote access point, without exception. This includes VPNs, Citrix portals, RDP gateways, and any other service that allows external access to the internal network. This is not just a recommendation; it should be considered a baseline security requirement for any organization, especially those in critical infrastructure sectors like healthcare. Had MFA been in place, the stolen credential would have been useless, and this catastrophic attack could have been prevented at the first step.

The exfiltration of 6 terabytes of data before encryption is a massive failure of network security monitoring. Implementing User Data Transfer Analysis, likely through a combination of Data Loss Prevention (DLP) and Network Detection and Response (NDR) tools, is a critical countermeasure. Security teams must establish baselines for normal data transfer volumes and patterns. An alert should be triggered when a system begins to transfer an anomalous amount of data to an external destination. For a transfer of this magnitude, automated systems should not just alert but actively block the connection and quarantine the source host. It is unacceptable for terabytes of data to leave a network undetected. This technique provides a last line of defense to prevent the data breach aspect of a double-extortion ransomware attack.

Timeline of Events

1
February 21, 2024

The initial ransomware attack on Change Healthcare begins, causing widespread outages.

2
April 22, 2024

UnitedHealth Group confirms in an earnings call that it paid a ransom to the attackers.

Sources & References

Major Cyber Attacks, Data Breaches & Ransomware Attacks in April 2024
Security and Compliance (securityandcompliance.com) May 1, 2024
Ransomware attacks in 2024 | Kaspersky official blog
Kaspersky (blog.kaspersky.com) January 31, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ransomwareUnitedHealth GroupChange HealthcareBlackCatALPHVhealthcaredata breachcritical infrastructure

📢 Share This Article

Help others stay informed about cybersecurity threats