
Data Risk Management: Framework, Assessment & Strategies
Risk Management Data Security Best Practices
What is data risk management? Every company has data worth stealing. The question is whether you know where it is and …

Learn how a single stolen password without MFA protection led to the largest healthcare data breach in US history.
• Attackers used stolen credentials to access a Citrix portal lacking multi-factor authentication, giving them over a week of undetected access
• The ransom payment failed completely when ALPHV leadership stole the money from their own affiliate, who then re-extorted victims through RansomHub
• The attack became the largest healthcare breach in US history, affecting over half of Americans and disrupting pharmacies, hospitals, and providers nationwide
• Enable MFA on all remote access and monitor for credential exposure because paying ransoms rarely works
A single stolen password. No multi-factor authentication. 190 million Americans affected. Attackers moved through the network for nine days before deploying ransomware.
Change Healthcare processes 15 billion healthcare transactions annually. One in three US patient records touches their systems. When attackers breached this central hub, the impact rippled nationwide.
This case study examines how stolen credentials enabled the attack and why the ransom payment failed. The final victim count reached 190 million in January 2025.
For security teams, this breach offers critical lessons about authentication and the futility of ransomware payments.
On February 21, 2024, Change Healthcare detected ransomware deployed across their systems. Investigation revealed attackers had been inside the network since February 12. They used those nine days to exfiltrate approximately 4 TB of data before triggering the encryption.
Ransomware is malware that encrypts files and demands payment for decryption keys. Modern ransomware groups also steal data before encrypting, threatening to publish it if victims refuse payment. This combination of encryption and data theft is called double extortion.
Change Healthcare is a subsidiary of UnitedHealth Group. The company processes healthcare transactions including claims and payments. They also handle prior authorizations.
When Change Healthcare went offline, the impact cascaded across the healthcare industry. Pharmacies could not process prescriptions. Hospitals could not verify insurance. Providers could not submit claims or receive payments.
The attack vector was remarkably simple. Attackers obtained stolen credentials for a low-level customer support employee. They used these credentials to access a Citrix remote access portal. The portal lacked multi-factor authentication.
According to court filings in the Nebraska lawsuit, attackers used the “stolen username and password of a low-level customer support employee.” The credential source was not publicly disclosed, but stolen credentials typically come from two sources.
First, infostealer malware infections capture credentials from employee devices. These logs circulate on criminal marketplaces and Telegram channels. Second, credentials from previous third-party data breaches get compiled into combo lists that attackers purchase.
Dark web monitoring would have detected the exposed credentials before attackers exploited them. The password may have been available on criminal marketplaces for weeks or months before the attack.
UnitedHealth CEO Andrew Witty testified to Congress that attackers accessed the network through a Citrix portal protected only by a password. No multi-factor authentication was required.
This configuration meant anyone with the stolen credentials could access the portal. No additional verification. No second factor. No alert that an unusual device was accessing the system.
Witty admitted this was the failure point. The CEO testified that the company had not yet implemented MFA on this legacy system. The portal had been acquired through a previous acquisition and not fully integrated into UnitedHealth’s security controls.
From February 12 to February 21, attackers moved through the network without triggering detection. They escalated privileges and identified valuable data stores. By the time ransomware deployed, they had exfiltrated 4 TB of sensitive information.
Network segmentation failures allowed this lateral movement. Attackers accessed systems far beyond what a customer support account should reach. Proper segmentation would have limited the blast radius of the initial compromise.
ALPHV/BlackCat, a ransomware-as-a-service operation, claimed responsibility for the attack on February 29, 2024. The group has ties to Russian-speaking criminal organizations.
ALPHV operated an affiliate model. The group provided ransomware tools and infrastructure. Affiliates conducted the actual attacks and shared profits with ALPHV leadership.
This affiliate model became significant in the aftermath. The affiliate who conducted the Change Healthcare attack would later be betrayed by ALPHV leadership.
The ransom payment story illustrates why security teams should never count on payments to resolve ransomware incidents.
Blockchain analysis confirmed UnitedHealth paid approximately $22 million in Bitcoin on March 3, 2024. The payment went to wallets associated with ALPHV/BlackCat.
The company expected to receive decryption keys and confirmation that stolen data would be deleted. Ransomware groups typically promise both in exchange for payment.
Two days after receiving the ransom, ALPHV leadership executed an exit scam. They stole the $22 million from their own affiliate who conducted the attack. Then they shut down their operation.
The affiliate never received their share of the ransom. More importantly, they retained a copy of all stolen data. ALPHV’s promises about data deletion became meaningless when the gang ceased operations.
The unpaid affiliate took the stolen Change Healthcare data to RansomHub, another ransomware group. In April 2024, RansomHub demanded a second ransom.
Patient data began appearing on dark web leak sites despite the $22 million payment. UnitedHealth faced the exact outcome the ransom was supposed to prevent.
Paying one group doesn’t stop others from demanding more. Affiliates retain data copies. Data surfaces on multiple platforms regardless of payment.
In January 2025, UnitedHealth confirmed the final count: 190 million Americans affected. This represents over half the US population.
Initial estimates in spring 2024 suggested tens of millions affected. By October 2024, UnitedHealth confirmed over 100 million. The count continued climbing as forensic analysis progressed.
The data compromised included:
For victims, this represents a complete healthcare identity. The combination of financial data and medical history enables targeted fraud and identity theft.
The financial impact extended across multiple categories. Direct costs to UnitedHealth exceeded $2.9 billion. Industry-wide impacts affected virtually every healthcare provider in the country.
UnitedHealth reported total response costs exceeding $2.9 billion through earnings reports. This included incident response and system rebuilding. Credit monitoring for victims and business disruption added billions more.
The $22 million ransom payment became one of the smallest costs. The failed payment represented less than 1% of total breach expenses.
American Hospital Association surveys from March 2024 found that 94% of hospitals reported financial impact from the breach. 74% reported direct patient care impacts. 77% of clinicians experienced service disruptions.
The American Medical Association survey revealed that 55% of medical practice owners used personal funds to cover payroll during the outage. Providers could not submit claims or receive payments while Change Healthcare systems remained offline.
UnitedHealth advanced over $9 billion to healthcare providers facing cash flow crises. These advances helped keep providers operational during the weeks of system outage.
The Nebraska Attorney General filed the first state enforcement action. Federal lawsuits consolidated into multi-district litigation with over 49 cases combined.
Congressional hearings examined the breach in May 2024. CEO Andrew Witty testified about the missing MFA and acknowledged the company’s security failures.
HIPAA investigations continue. The breach represents the largest healthcare data compromise subject to federal health privacy regulations.
Change Healthcare took systems offline immediately upon detecting the ransomware on February 21, 2024. The shutdown prevented further encryption but also halted healthcare transactions nationwide.
The company made the ransom payment decision on March 3, 2024. This decision received criticism given the unreliability of ransomware payments. The exit scam proved them right.
UnitedHealth advanced over $9 billion to healthcare providers who couldn’t receive payments during the outage.
Victim notification began in June 2024 and continued through the end of the year. Sorting through 4 TB of stolen files to identify victims took months.
The breach offers concrete lessons if you manage sensitive data through third-party processors.
Credential monitoring is the automated detection of stolen employee credentials appearing on dark web marketplaces and stealer logs. When attackers obtain credentials through phishing or malware, those credentials often appear on criminal markets before they’re exploited. Dark web monitoring detects these leaked credentials, enabling password rotation before attackers exploit them.
The Citrix portal lacking MFA became the entry point for attackers. CEO testimony confirmed this was the critical failure. Any remote access portal represents a potential attack vector.
Enable MFA on every Citrix deployment and VPN connection. No exceptions for legacy systems. No exceptions for “low-risk” accounts. The Change Healthcare attack started with a customer support account, not an administrator.
Hardware security keys provide stronger protection than SMS or app-based codes. For critical infrastructure, consider requiring hardware tokens.
The stolen credentials likely appeared on dark web marketplaces before the attack. Dark web monitoring would have caught them.
Compromised credential monitoring catches exposed passwords before attackers exploit them. Early detection enables password rotation. The attack window closes before exploitation occurs.
Third-party cyber risk management extends this monitoring to vendors. Change Healthcare was a vendor to thousands of US healthcare providers. Their breach disrupted providers nationwide.
The $22 million payment did not prevent data publication. Criminal organizations are unreliable partners.
Prevention is cheaper than hoping payment works. Maintain offline backups and plan for recovery without decryption keys. If you do pay, assume the data will still leak.
The Change Healthcare case demonstrates that even substantial payments provide no guarantee. The data ended up on leak sites anyway.
Nine days of undetected lateral movement enabled the attackers to reach systems far beyond their initial access point. A customer support credential should not provide access to core data stores.
Network segmentation limits the blast radius of compromised credentials. Zero trust architectures assume breach and verify access at every step. Monitoring for unusual lateral movement detects attackers earlier.
The Change Healthcare breach shows how a single stolen password without MFA protection can cascade into the largest healthcare data breach in US history. 190 million Americans affected. $2.9 billion in costs. A ransom payment that failed to protect any stolen data.
Key lessons for security teams:
The healthcare industry faces unique pressures from ransomware attackers who know system downtime affects patient care. Preventing data breaches in healthcare requires both technical controls and recognition that this sector remains a primary target.
Check if your credentials have been exposed with a dark web scan.
The Nebraska lawsuit revealed attackers used stolen credentials from a low-level customer support employee. While the exact source isn’t public, stolen credentials typically come from infostealer malware infections or dark web marketplace purchases. This is why monitoring for credential exposure is critical.
ALPHV/BlackCat leadership stole the ransom from their own affiliate in an exit scam. The unpaid affiliate kept a copy of the stolen data and took it to RansomHub, which demanded a second ransom. Paying one group doesn’t stop others from demanding more.
Enable MFA on all remote access portals including Citrix and VPN. Use dark web monitoring to detect exposed employee credentials. Implement network segmentation to limit lateral movement. Assume ransomware payments won’t work and invest in prevention instead.
Change Healthcare processes 15 billion transactions annually across thousands of healthcare providers. Determining exactly whose data was in the stolen 4 TB required months of forensic analysis. The count increased from 100 million in October 2024 to 190 million in January 2025 as analysis continued.
Stolen data included names, addresses, Social Security numbers, dates of birth, health insurance information, medical records including diagnoses and treatments, test results, and provider information. This represents essentially a complete healthcare identity for 190 million Americans.

Risk Management Data Security Best Practices
What is data risk management? Every company has data worth stealing. The question is whether you know where it is and …

Authentication Dark Web Monitoring Credential Monitoring Security Tools
Top 10 Account Takeover Solutions at a Glance Platform Category Best For Breachsense Credential Intelligence Dark web …