UnitedHealth data breach caused by lack of multifactor authentication, CEO says
Hackers breached the computer system of a UnitedHealth Group subsidiary and released ransomware after stealing someone's password, CEO Andrew Witty testified Wednesday on Capitol Hill. The cybercriminals entered through a portal that didn't have multifactor authentification (MFA) enabled.
During an hourslong congressional hearing, Witty told lawmakers that the company has not yet determined how many patients and health care professionals were impacted by the cyberattack on Change Healthcare in February. The hearing focused on how hackers were able to gain access to Change Healthcare, a separate division of UnitedHealth that the company acquired in October 2022. Members of the House Energy and Commerce Committee asked Witty why the nation's largest health care insurer did not have the basic cybersecurity safeguard in place before the attack.
"Change Healthcare was a relatively older company with older technologies, which we had been working to upgrade since the acquisition," Witty said. "But for some reason, which we continue to investigate, this particular server did not have MFA on it."
Multifactor authentication adds a second layer of security to password-protected accounts by having users enter an auto-generated code sent to their phone or email. A common feature on apps, the safeguard is used to protect customer accounts against hackers who obtain or guess passwords. Witty said all logins for Change Healthcare now have multifactor authentication enabled.
The cyberattack came from Russia-based ransomware gang ALPHV or BlackCat. The group itself claimed responsibility for the attack, alleging it stole more than six terabytes of data, including "sensitive" medical records. The attack triggered a disruption of payment and claims processing around the country, stressing doctor's offices and health care systems by interfering with their ability to file claims and get paid.
Witty confirmed Wednesday that UnitedHealth paid a $22 million ransom in the form of bitcoin to BlackCat, a decision he made on his own, according to prepared testimony before the hearing. Despite the ransom payment, lawmakers said Wednesday that some of the sensitive records from patients have still been posted by hackers on the dark web.
The ransom payment "was one of the hardest decisions I've ever had to make and I wouldn't wish it on anyone," Witty said.
The scale of the attack — Change Healthcare processes 15 billion transactions a year, according to the American Hospital Association — meant that even patients who weren't customers of UnitedHealth were potentially affected. The company said earlier this month that personal information that could cover a "substantial portion of people in America" may have been taken in the attack.
The breach has already cost UnitedHealth Group nearly $900 million, company officials said in reporting first-quarter earnings last week, not including ransom paid.
Ransomware attacks, which involve disabling a target's computer systems, have become increasingly common within the health care industry. The annual number of ransomware attacks against hospitals and other health care providers doubled from 2016 to 2021, according to a 2022 study published in JAMA Health Forum.