In a recent revelation, United Healthcare has come forward with the shocking admission that a staggering 100 million individuals were affected by the Change Healthcare ransomware attack. This marks the first time that the healthcare giant has publicly disclosed the extent of the breach since it occurred.
The incident, which took place back in February, initially went unnoticed by many as Change Healthcare failed to send out any notifications to those impacted until June. It wasn’t until May, when Andrew Witty, the CEO of UnitedHealth, hinted at the scale of the breach, suggesting that up to a third of all American health data may have been compromised in the ransomware attack.
The repercussions of this breach have been far-reaching, sparking widespread concerns about the state of cybersecurity within the healthcare sector. The ransomware attack, attributed to the group BlackCat/ALPHV, forced Change Healthcare to make the difficult decision to pay off the hackers in order to regain control of its systems.
Unfortunately, the troubles didn’t end there for the company. Shortly after the initial attack, Change Healthcare fell victim to another ransomware incident, this time at the hands of a group known as RansomHub. This group demanded payment for the 4TB of data they had stolen, which consisted primarily of medical records and financial information belonging to US military personnel. In a disturbing turn of events, RansomHub threatened to sell this sensitive data to the highest bidder.
During a congressional testimony in May, Change Healthcare disclosed that they had paid a hefty $22 million ransom to the attackers behind the February breach. It was also revealed that the attackers were able to infiltrate the company’s systems using previously compromised credentials, highlighting a lack of adequate security measures such as multifactor authentication.
The lack of security maturity within Change Healthcare’s systems was further emphasized during the hearing, pointing to systemic vulnerabilities that granted attackers easy access. The breach not only compromised sensitive data but also resulted in significant delays in healthcare services across the US.
Dan Ortega, a security strategist at Anomali, noted that while the time frame for confirming the breach may have been reasonable given the complexity of UnitedHealth as an entity, it was still unacceptable from an operational efficiency and public safety standpoint.
For the 100 million Americans impacted by this breach, the stolen information encompasses a wide range of sensitive data including health insurance details, medical records, prescriptions, test results, financial information, and even personal identification numbers such as Social Security, driver’s license, and passport numbers.
This breach serves as a stark reminder of the urgent need for robust cybersecurity measures within the healthcare industry to safeguard patient data and privacy from malicious actors. The fallout from this incident will undoubtedly continue to reverberate throughout the sector as companies strive to shore up their defenses against future cyber threats.

