TechCrunch News 2024年10月25日
UnitedHealth says Change Healthcare data breach affects over 100 million people in America
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

美国医疗数据处理公司Change Healthcare在今年2月遭遇勒索软件攻击,导致超过1亿人的个人健康信息被盗,这是美国历史上最大的医疗数据泄露事件之一。攻击者利用被盗的凭据绕过多因素身份验证,入侵了Change Healthcare的内部系统,窃取了大量敏感数据,包括姓名、地址、出生日期、电话号码、电子邮件地址、社会安全号码、驾照和护照号码、诊断、药物、检验结果、影像资料、治疗计划、健康保险信息以及金融和银行信息。此次攻击对数百万美国人的个人信息造成了不可逆转的损失,也引发了对医疗数据安全和隐私的广泛关注。

😨 **数据泄露规模巨大**: 此次攻击导致超过1亿人的个人健康信息被盗,是美国历史上最大的医疗数据泄露事件之一,影响范围十分广泛。

🔐 **攻击手法**: 黑客利用被盗的凭据绕过了多因素身份验证,入侵了Change Healthcare的内部系统,说明多因素身份验证对于保护敏感数据至关重要。

💰 **金钱利益驱动**: 攻击者勒索了数百万美元的赎金,并将部分数据发布到网上,显示出网络犯罪分子以金钱利益为主要目标。

🔍 **监管力度**: 这次事件引发了美国政府对医疗数据安全和隐私的关注,并加大了对网络犯罪的打击力度。

⚖️ **反垄断调查**: 美国司法部正在调查UnitedHealth Group的反垄断行为,此前该集团收购了Change Healthcare,引发了市场竞争问题。

😔 **长远影响**: 这次事件对数百万美国人造成了不可逆转的损失,可能会对他们的个人生活和医疗保健造成负面影响。

🛡️ **加强安全**: 这次事件提醒我们,加强医疗数据安全至关重要,需要采取更严格的措施来保护患者隐私。

More than 100 million individuals had their private health information stolen during the ransomware attack on Change Healthcare in February, a cyberattack that caused months of unprecedented outages and widespread disruption across the U.S. healthcare sector.

This is the first time that UnitedHealth Group, the U.S. health insurance provider that owns the health tech company, has put a number of affected individuals to the data breach, after previously saying it anticipated the breach to include data on a “substantial proportion of people in America.”

The U.S. Department of Health and Human Services first reported the updated number on its data breach portal on Thursday.

Tyler Mason, a spokesperson for UHG, did not immediately respond to a request for comment.

The ransomware attack and data breach at Change Healthcare stands as the largest known digital theft of U.S. medical records, and one of the biggest data breaches in living history. The ramifications for the millions of Americans whose private medical information was irretrievably stolen are likely to be life lasting.

UHG began notifying affected individuals in late July, which continued through October.

The stolen personal data varies by individual, but Change previously confirmed that it includes personal information, such as names and addresses, dates of birth, phone numbers and email addresses, and government identity documents, including Social Security numbers, driver licenses and passport numbers. The stolen health data includes diagnoses, medications, test results, imaging and care and treatment plans, and health insurance information — as well as financial and banking information found in claims and payment data taken by the criminals.

Change Healthcare is one of the largest handlers of health, medical data and patient records as it processes patient insurance and billing across the U.S. healthcare sector, including thousands of hospitals, pharmacies and medical practices. As such, Change handles huge amounts of health and medical-related information on around a third of all Americans, the company’s chief executive Andrew Witty told lawmakers in May. 

The cyberattack became public on February 21 when Change Healthcare pulled much of its network offline to contain the intruders, causing immediate outages across the U.S. healthcare sector that relied on Change for handling patient insurance and billing.

UHG attributed the cyberattack to ALPHV/BlackCat, a Russian-speaking ransomware and extortion gang, which later took credit for the cyberattack. 

The ransomware gang’s leaders later vanished after absconding with a $22 million ransom paid by the health insurance giant, stiffing the group’s contractors who carried out the hacking of Change Healthcare out of their new financial windfall. The contractors took the data they stole from Change Healthcare and formed a new group, which extorted a second ransom from UHG, while publishing a portion of the stolen files online in the process to prove their threat.

There is no evidence that the cybercriminals subsequently deleted the data. Other extortion gangs, including LockBit, have been shown to hoard stolen data, even after the victim pays and the criminals claim to have deleted the data

In paying the ransom, Change obtained a copy of the stolen dataset, allowing the company to identify and notify the affected individuals whose information was found in the data.

Efforts by the U.S. government to catch the hackers behind ALPHV/BlackCat, one of the most prolific ransomware gangs today, have so far failed. The gang bounced back following a takedown operation in 2023 to seize the gang’s dark web leak site.

Months after the Change Healthcare breach, the U.S. State Department upped its reward for information of the whereabouts of the ALPHV/BlackCat cybercriminals to $10 million.

Portions of Change Healthcare’s network remain offline as the company continues to recover from the February cyberattack. Lawmakers are also investigating the breach and the effect on the millions of Americans whose health data was irreversibly stolen.

During a House hearing into the cyberattack in April, UnitedHealth’s CEO Witty confirmed that the cybercriminals broke into one of its employee systems using stolen credentials that were not protected with multi-factor authentication (MFA), a security feature that can help to protect against the misuse of password theft.

By gaining access to a critical internal system using only a stolen password, the ransomware gang were able to reach other parts of Change Healthcare’s network and deploy ransomware.

UnitedHealth CEO Andrew Witty testifies before the Senate Finance committee on Capitol Hill on May 1, 2024 in Washington, DC.Image Credits:Kent Nishimura / Getty Images

It’s unclear why the system was not protected with MFA, but this will likely remain a key part of the ongoing investigations by lawmakers and the government. Witty told lawmakers that the organization has since rolled out and now enforces MFA following the cyberattack.

Lawmakers homed in on how UHG handles so much data and generates so much revenue, and failed at basic cybersecurity.

According to its 2023 full-year earnings report, UHG made $22 billion in profit on revenues of $371 billion. UHG’s CEO Witty made $23.5 million in executive compensation the same year.

While the lack of MFA was abused in this case, the sheer size and wealth of highly sensitive data that Change Healthcare collects and stores made it a target in itself, lawmakers said

Change Healthcare merged with U.S. healthcare provider Optum in 2022 as part of a $7.8 billion deal by UnitedHealth Group. The deal brough the two healthcare giants under UHG and allowed Optum, which owns physician groups and provides tech and data to insurance companies and healthcare services, broad access to patient records handled by Change.

UnitedHealth Group collectively provides over 53 million U.S. customers with benefit plans and another five million outside of the United States, according to its latest full-year earnings report. Optum serves about 103 million U.S. customers.

The deal faced scrutiny by U.S. federal antitrust authorities, who sued to block UHG from buying Change Healthcare and merging it with Optum, arguing that UnitedHealth would get an unfair competitive advantage by gaining access to “about half of all Americans’ health insurance claims pass each year.” A judge ultimately approved the deal.

The Justice Department reportedly began cranking up its investigation into UHG and its potential anticompetitive practices in the months prior to the Change Healthcare hack.

Read more:

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

医疗数据泄露 网络攻击 勒索软件 Change Healthcare UnitedHealth Group 数据安全 隐私保护
相关文章