Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity Education & TrainingHospitals & Medical Centers

Healthcare can — and must — learn from 2024’s devastating cyberattacks

By Shankar Somasundaram
Healthcare professional with incubator

Hush Naidoo Jade Photography via Unsplash

January 20, 2025

It was a rough year for cybersecurity in the healthcare industry. Providers remain opportune targets because of relatively limited security budgets, a vulnerability to downtime, valuable patient data, and insufficient monitoring of fast-scaling Internet of Medical Things (IoMT) devices and other network-connected equipment.

Ideally, absorbing the lessons of these attacks enables healthcare delivery organizations to move faster: faster to implement sufficient protections that deter attacks with harder targets, and faster to respond when attacks do arrive. Time will tell if that’s the reality, but here are three specific incidents from the last year that every provider should understand. 

Lesson #1: Ascension Healthcare and multi-layer access protections

In May 2024, Ascension Healthcare suffered a ransomware attack perpetrated by the Black Basta gang. Ascension is the largest nonprofit Catholic health system in the United States, with 2,600 healthcare facilities, 142 hospitals, and 90 skilled nursing facilities across 19 states.

The attack eliminated access to the organization’s electronic health record system and blocked patient access to the patient portal — causing major operational issues and forcing facilities to send patients to other locations for care. These issues persisted for weeks, and efforts to upload patient records from between those dates are still underway.

The incident was traced to a spearphishing attack on a single device that allowed attackers to escalate their access privileges over weeks before finally introducing ransomware encryption and capturing patient health data.

This attack is a cautionary tale that prescribes layered access security and anomalous behavioral tracking. With multi-layer protections in place limiting device permissions, attackers would not have gained the powerful foothold they did by bypassing a single security layer. Anomalous behavior monitoring could have flagged threat activity, allowing Ascension’s security team to stop the attack in its tracks.

Lesson #2: Change Healthcare and supply chain risk

In February 2024, Change Healthcare faced a ransomware attack from the BlackCat/ALPHV gang, resulting in major service interruptions, an unprecedented impact on healthcare providers, and one of the largest data breaches of all time (for any industry).

Change Healthcare is the payments processing supplier for about one-third of all healthcare insurance transactions in the U.S.; in 2023, it handled more than 15 billion transactions and $1.5 trillion in collected revenue. The attack rendered Change customers unable to be reimbursed or pay employees, suddenly making countless facilities unable to care for patients. At the same time, approximately a third of all patients in the U.S. likely had their data breached.

Frustratingly, this massive attack could have been prevented if Change had implemented multi-factor authentication on a critical remote access service. The takeaway for healthcare organizations is to have a plan ready in case a crucial link in their supply chain is compromised, and to make sure to keep even seemingly basic security in good working order. That includes ensuring that protections like multi-factor authentication, access controls guided by the principle of least privilege, and other simple safeguards are in place so that exposing a single set of credentials can’t cripple a business.

Lesson #3: Synnovis and zero-day vulnerabilities

In June 2024, the Qilin ransomware gang launched an attack on London-based pathology services provider Synnovis. The ransomware attack forced Synnovis, a partnership among two London-area hospitals and SYNLAB, to destroy 20,000 blood samples. The attack also interrupted the hospitals’ ability to perform blood transfusions, making it necessary to cancel cancer-related surgeries. All totaled, the attack has required rescheduling 1,130 operations and 2,190 outpatient appointments.

According to the Qilin gang that took responsibility for the attack, this significant harmful impact on patient care was caused by a zero-day vulnerability. While they didn’t disclose which device or vulnerability they exploited — and the gang may have sourced its own unknown zero-day vulnerability — healthcare organizations are by no means helpless against these threats. Even if a patch or workaround takes time to develop for a zero-day, the anomalous behavior that can be part of an exploit attempt can be detected. IT and security teams should deploy anomalous behavior detection capabilities. They need to be able to discover all devices on a healthcare organization’s network, accurately assess the risks of such vulnerabilities for each device, and apply available updates or virtual patches to mitigate those risks.

Healthcare security must improve

Healthcare organizations are under relentless threat, at a level unparalleled among critical infrastructure industries. In 2023, the FBI tracked 1,193 ransomware attacks: a plurality of 20.9% (249 attacks) hit healthcare organizations.

Attackers will remain eager to apply ransomware and breach data as long as healthcare providers give them the opportunity. By maintaining basic security hygiene, multi-layer access controls, anomalous behavior detection, and measures that address vulnerability risks, healthcare organizations can withstand threats and send attackers looking elsewhere.

KEYWORDS: data breaches healthcare cybersecurity ransomware threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Shankar somasundaram headshot

Shankar Somasundaram is the CEO of Asimily. Image courtesy of Somasundaram

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Laptop and monitor

    Frontline lessons: What cybersecurity leaders can learn from attacks

    See More
  • 5 minutes with Passwaters

    5 minutes with Jason Passwaters - What cyberthreat intelligence can learn from the military

    See More
  • Microphone

    What security leaders can learn from Smashing Pumpkins hacker attack

    See More

Events

View AllSubmit An Event
  • March 26, 2025

    Boost Emergency Preparedness: Mastering Mass Notification in Healthcare

    ON DEMAND: In today’s rapidly changing healthcare environment, reliable and timely communication during emergencies is crucial. A well-implemented Mass Notification System (MNS) can differentiate between chaos and control during critical natural disasters, medical emergencies, or security threats.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing