{"id":53065,"date":"2025-02-20T13:00:04","date_gmt":"2025-02-20T18:00:04","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53065"},"modified":"2025-02-20T13:00:04","modified_gmt":"2025-02-20T18:00:04","slug":"unitedhealth-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/unitedhealth-ransomware-attack\/53065\/","title":{"rendered":"UnitedHealth ransomware attack"},"content":{"rendered":"<p>About a year ago, UnitedHealth Group, the U.S. health-insurance giant, was targeted in one of the largest ransomware attacks ever. It had such far-reaching, severe consequences that new details about the attack and its aftermath have continued to emerge since the incident. To mark its anniversary, we\u2019ve compiled a summary of all the data available today.<\/p>\n<h2>The ransomware attack on UnitedHealth Group<\/h2>\n<p>Before we proceed, let\u2019s briefly introduce this organization to those unfamiliar with it. With a capitalization of approximately $500 billion, UnitedHealth Group is the largest company in the U.S. market for health insurance and healthcare services. It ranks ninth globally in terms of revenue \u2014 right after Apple.<\/p>\n<p>UnitedHealth Group comprises two companies. One of them, UnitedHealthcare, focuses on health insurance. The other, Optum, specializes in delivering a broad spectrum of healthcare services ranging from pharmaceuticals and direct medical care to the IT systems underlying healthcare operations.<\/p>\n<p>Optum Insight, one of Optum\u2019s three divisions (and the most profitable), handles the latter. In the fall of 2022, UnitedHealth Group acquired the Change Healthcare platform, and Optum Insight <a href=\"https:\/\/www.forbes.com\/sites\/brucejapsen\/2022\/10\/03\/unitedhealth-closes-optums-13-billion-change-healthcare-deal\/\" target=\"_blank\" rel=\"nofollow noopener\">integrated<\/a> it. This digital platform processes insurance claims \u2014 acting as a financial intermediary between patients, healthcare providers, and insurers.<\/p>\n<p>Change Healthcare <a href=\"https:\/\/techcrunch.com\/2024\/02\/21\/change-healthcare-cyberattack\/\" target=\"_blank\" rel=\"nofollow noopener\">was the target of the attack<\/a>. On February 21, 2024, its systems were infected with ransomware \u2014 rendering the platform inaccessible. The incident wreaked havoc on the U.S. healthcare system, leaving many patients to shoulder the financial burden of medical expenses as insurance claims couldn\u2019t be processed quickly. Healthcare providers were forced to process bills manually.<\/p>\n<p>Recovering the compromised systems took several months. For instance, the Change Healthcare clearing service didn\u2019t resume full operations <a href=\"https:\/\/www.theregister.com\/2024\/11\/20\/change_healthcares_clearinghouse_services\/\" target=\"_blank\" rel=\"nofollow noopener\">until November<\/a>. UnitedHealth Group even set up a <a href=\"https:\/\/www.unitedhealthgroup.com\/changehealthcarecyberresponse\" target=\"_blank\" rel=\"nofollow noopener\">dedicated website<\/a> to track the restoration efforts. Even now, a year after the attack, the company is still regularly publishing updates on the website, and some systems are still listed as only \u201cpartially available\u201d.<\/p>\n<h2>Timeline of the attack on UnitedHealth Group<\/h2>\n<p>A few months after the incident, on May 1, the CEO of UnitedHealth Group, Andrew Witty, was summoned to testify before Congress. From that <a href=\"https:\/\/www.finance.senate.gov\/imo\/media\/doc\/0501_witty_testimony.pdf\" target=\"_blank\" rel=\"nofollow noopener\">testimony<\/a>, the general public was finally able to learn about how the attack on the company unfolded.<\/p>\n<p>According to Witty, the attack began on February 12. The attackers used compromised credentials to gain access to the Change Healthcare Citrix portal, which was used for remote desktop connections. Two-factor authentication should have stopped them but\u2026 it wasn\u2019t enabled. Thus, attackers were able to gain entry simply by using the compromised credentials.<\/p>\n<p>After gaining initial access, they began to move laterally and harvest data. The attackers clearly managed to collect a substantial amount of valuable data within the following nine days. In any case, on February 21, they deployed ransomware \u2014 initiating the encryption of Change Healthcare\u2019s systems.<\/p>\n<p>Faced with this situation, UnitedHealth decided to disconnect Change Healthcare data centers from the network to contain the ransomware attack.<\/p>\n<p>Witty argued that the decision effectively prevented the infection from spreading to Optum, UnitedHealthcare, UnitedHealth Group, and any external organizations. However, the complete shutdown of a critical digital platform had a devastating impact on both UnitedHealth Group\u2019s business operations and the broader U.S. healthcare system as a whole.<\/p>\n<p>Thus, the most extensive ransomware attack of 2024 was caused by the absence of two-factor authentication on a remote desktop access portal \u2014 precisely the place where it absolutely should have been enabled. As Oregon Senator, Ron Wyden, <a href=\"https:\/\/www.youtube.com\/watch?v=vjQAcWy1_dQ%23t=15m12s\" target=\"_blank\" rel=\"nofollow noopener\">summarized<\/a>, \u201cThis hack could have been stopped with cybersecurity 101\u201d.<\/p>\n<h2>UnitedHealth Group pays up<\/h2>\n<p>Several days after the breach, the BlackCat\/ALPHV cybercrime gang <a href=\"https:\/\/www.cnbc.com\/2024\/02\/29\/blackcat-claims-responsibility-for-cyberattack-at-unitedhealth.html\" target=\"_blank\" rel=\"nofollow noopener\">claimed responsibility for it<\/a>. The attackers claimed to have exfiltrated 6TB of confidential data \u2014 including medical records, financial documents, and personal information belonging to U.S. civilians and military personnel, among other sensitive information.<\/p>\n<p>In March 2024, UnitedHealth Group <a href=\"https:\/\/www.wired.com\/story\/alphv-change-healthcare-ransomware-payment\/\" target=\"_blank\" rel=\"nofollow noopener\">paid a ransom<\/a> of $22 million to the gang. But the story didn\u2019t end there: after receiving the ransom, ALPHV feigned having their infrastructure seized by the FBI <a href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant\" target=\"_blank\" rel=\"nofollow noopener\">again<\/a>. This was likely a ploy to <a href=\"https:\/\/thehackernews.com\/2024\/03\/exit-scam-blackcat-ransomware-group.html\" target=\"_blank\" rel=\"nofollow noopener\">double-cross<\/a> one of their associates \u2014 pocketing the funds and disappearing into the ether.<\/p>\n<p>Said associate claimed ALPHV had failed to give them their cut, and later teamed up with another ransomware gang \u2014 RansomHub. That gang made some of the stolen data public in April 2024, and then <a href=\"https:\/\/www.pcmag.com\/news\/second-ransomware-group-demands-unitedhealth-pay-for-stolen-data\" target=\"_blank\" rel=\"nofollow noopener\">tried to extort more money from UnitedHealth<\/a>.<\/p>\n<div id=\"attachment_53066\" style=\"width: 1546px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/02\/20124656\/unitedhealth-ransowmare-attack-6.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53066\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/02\/20124656\/unitedhealth-ransowmare-attack-6.png\" alt=\"ALPHV website announcing the UnitedHealth breach\" width=\"1536\" height=\"1046\" class=\"size-full wp-image-53066\"><\/a><p id=\"caption-attachment-53066\" class=\"wp-caption-text\">Post by RansomHub demanding a second ransom from UnitedHealth Group. <a href=\"https:\/\/www.pcmag.com\/news\/second-ransomware-group-demands-unitedhealth-pay-for-stolen-data\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a><\/p><\/div>\n<p>It remains unclear whether UnitedHealth ever paid the second ransom, as there was no official confirmation. However, the demand was later removed from RansomHub\u2019s website, and no further leaks of the stolen company data have been observed. Therefore, it can be assumed that the company did, in fact, pay twice. This is even more likely if one considers that the ransom amounts are dwarfed by the massive financial impact the attack had on UnitedHealth Group.<\/p>\n<h2>The aftermath of the ransomware attack on UnitedHealth Group<\/h2>\n<p>UnitedHealth Group <a href=\"https:\/\/www.unitedhealthgroup.com\/content\/dam\/UHG\/PDF\/investors\/2024\/UNH-Q1-2024-Release.pdf\" target=\"_blank\" rel=\"nofollow noopener\">posted $872 million<\/a> in losses associated with the cyberattack in Q1 2024 alone. The company also estimated in its Q1 report that the annual cost of the breach could reach $1.35 to $1.6 billion.<\/p>\n<p>Those initial estimates proved to be far too optimistic: predicted damage kept growing quarter after quarter, first increasing to <a href=\"https:\/\/www.unitedhealthgroup.com\/content\/dam\/UHG\/PDF\/investors\/2024\/UNH-Q2-2024-Release.pdf\" target=\"_blank\" rel=\"nofollow noopener\">$2.3 to $2.45 billion<\/a>, and then to <a href=\"https:\/\/www.unitedhealthgroup.com\/content\/dam\/UHG\/PDF\/investors\/2024\/UNH-Q3-2024-Release.pdf\" target=\"_blank\" rel=\"nofollow noopener\">$2.87 billion<\/a>.<\/p>\n<p>By the end of the fiscal year, as reported by UnitedHealth Group in January 2025, the incident resulted in a <a href=\"https:\/\/www.unitedhealthgroup.com\/content\/dam\/UHG\/PDF\/investors\/2024\/2025-16-01-uhg-reports-fourth-quarter-results.pdf\" target=\"_blank\" rel=\"nofollow noopener\">total annual loss of $3.09 billion<\/a>. Although the damage estimate for 2024 is now finalized, the total damage could still increase substantially as the company continues to deal with the consequences of the attack.<\/p>\n<p>An official estimate of the number of individuals whose data could have been stolen by the cybercriminals took a long time to materialize. It was only eight months after the incident, on October 24, 2024, that UnitedHealth Group finally came up with a <a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/hack-unitedhealths-tech-unit-impacted-100-mln-people-2024-10-24\/\" target=\"_blank\" rel=\"nofollow noopener\">tally<\/a>. It was a mind-boggling figure: 100 million, or nearly a third of the entire population of the United States.<\/p>\n<p>Nevertheless, it would become evident that these estimations were as overly hopeful as the original predictions about the financial losses. Three months later, at the end of January 2025, UnitedHealth Group released an <a href=\"https:\/\/www.reuters.com\/business\/healthcare-pharmaceuticals\/unitedhealth-confirms-190-million-americans-affected-by-hack-tech-unit-2025-01-24\/\" target=\"_blank\" rel=\"nofollow noopener\">updated report<\/a> that put the number of those impacted by the breach at 190 million.<\/p>\n<h2>Protecting your company against ransomware<\/h2>\n<p>Clearly, the most obvious lesson to be learned from the UnitedHealth Group breach is that <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> is a must for any public-facing service. Otherwise, a single compromised password could cause massive problems and billions of dollars in losses.<\/p>\n<p>Essential as it is, two-factor authentication is by no means sufficient protection against ransomware. Defending corporate infrastructure from ransomware attacks must be multilayered. Here are some additional tips:<\/p>\n<ul>\n<li>Raise your employees\u2019 cybersecurity awareness through tailored training programs. Our <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>, provides an easy and cost-effective solution.<\/li>\n<li>Segment your network, set up proper data-retention rules, and enforce <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-the-principle-of-least-privilege\/50232\/\" target=\"_blank\" rel=\"noopener nofollow\">data access policies<\/a>. Ideally, adopt the <a href=\"https:\/\/www.kaspersky.com\/blog\/zero-trust-security\/36423\/\" target=\"_blank\" https: rel=\"noopener nofollow\">robust security tools<\/a> on all your corporate devices.<\/li>\n<li>Monitor any suspicious activities inside the corporate network using an <a href=\"https:\/\/www.kaspersky.com\/next?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____a8c0f733e524af27\" target=\"_blank\" rel=\"noopener nofollow\">XDR system<\/a>.<\/li>\n<li>Engage an <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\" rel=\"noopener nofollow\">external threat-hunting and response service<\/a> if your in-house information security team is under-resourced or lacks the expertise.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"kesb-ransomware\" value=\"50951\">\n","protected":false},"excerpt":{"rendered":"<p>A year after the ransomware attack on healthcare giant UnitedHealth Group, we\u2019ve compiled all publicly available information about the incident and its aftermath.<\/p>\n","protected":false},"author":2726,"featured_media":53068,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[1218,2141,4315,527,2188,961,4134,187,420,1146,97,422,4619,268],"class_list":{"0":"post-53065","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-2fa","10":"tag-business","11":"tag-cryptomalware","12":"tag-hacks","13":"tag-healthcare","14":"tag-leaks","15":"tag-mfa","16":"tag-passwords","17":"tag-ransomware","18":"tag-risks","19":"tag-security-2","20":"tag-threats","21":"tag-two-factor-authentication","22":"tag-vulnerabilities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/unitedhealth-ransomware-attack\/53065\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/unitedhealth-ransomware-attack\/28604\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/unitedhealth-ransomware-attack\/23846\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/unitedhealth-ransomware-attack\/28721\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/unitedhealth-ransomware-attack\/34673\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/unitedhealth-ransomware-attack\/34301\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53065"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53065\/revisions"}],"predecessor-version":[{"id":53067,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53065\/revisions\/53067"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53068"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}