www.corvusinsurance.com
Open in
urlscan Pro
199.60.103.227
Public Scan
Submitted URL: https://email.corvusinsurance.com/e3t/Ctc/I4+113/cxr4f04/VWJqM-7tHbZcN3c6QtRy6r-HW2K0rfL5cpTfsN8DGmCb5m_5PW50kH_H6lZ3pJVClPfZ4jVW6...
Effective URL: https://www.corvusinsurance.com/blog/change-healthcare-hack-what-this-means-for-healthcare?utm_campaign=FY24%20Policyholder%20Ne...
Submission: On April 03 via manual from IN — Scanned from DE
Effective URL: https://www.corvusinsurance.com/blog/change-healthcare-hack-what-this-means-for-healthcare?utm_campaign=FY24%20Policyholder%20Ne...
Submission: On April 03 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOM/hs-search-results
<form data-hs-do-not-collect="true" action="/hs-search-results">
<input type="text" class="hs-search-field__input" name="term" autocomplete="off" aria-label="Search" placeholder="Search" style="height: 97px;">
<input type="hidden" name="type" value="SITE_PAGE">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="type" value="LISTING_PAGE">
</form>
Text Content
Cookie Policy This website uses cookies to ensure you get the best experience on our website. Learn more Allow CookiesDismiss Cookie Preferences Submit a Claim * Insurance * Smart Cyber Insurance® * Smart Tech E+O® Q4 Ransomware Report: 2023 Ends as a Record-Breaking Year * The Corvus Solution * Cyber Underwriting * Corvus Signal™ Risk Prevention * Claims Management Q4 Ransomware Report: 2023 Ends as a Record-Breaking Year * Broker Hub * Broker Resources * London Markets * Corvus Germany * Distribution Partnerships Q4 Ransomware Report: 2023 Ends as a Record-Breaking Year * Resources * Cyber Resources * Blog * Threat Updates * Knowledge Nest Q4 Ransomware Report: 2023 Ends as a Record-Breaking Year * Company * About Us * Careers * Pressroom Q4 Ransomware Report: 2023 Ends as a Record-Breaking Year Contact Us Contact Us Contact Us Contact Us CHANGE HEALTHCARE HACK: EVERYTHING YOU NEED TO KNOW Lauren Winchester • April 1, 2024 On February 21st, an unnatural disaster hit healthcare providers across the nation. The fallout: hospitals that couldn’t file claims, healthcare practices unable to pay their staff, and individuals paying out of pocket for prescriptions. Change Healthcare (CHC), a healthcare technology and business management vendor, was down as a result of a ransomware attack. UnitedHealth Group, which acquired Change Healthcare in 2022, announced they discovered that threat actors gained access to CHC’s environment and quickly disconnected impacted systems to stop the spread. But CHC handles one in every three patient records in the United States. With it offline, healthcare providers were left scrambling. WHAT WE KNOW (SO FAR) ABOUT THE CHANGE HEALTHCARE HACK: Medical claims processing, pharmacy operations, and practice management slowed or stopped for thousands of hospitals, medical groups, and pharmacies. The event prompted an investigation by the Department of Health and Human Services (HHS), which the HHS Office for Civil Rights cited as “unprecedented magnitude.” Later, a cohort of leaders from HHS, the White House, and health insurance companies discussed how to respond and recover. To mitigate the fallout of the attack, Change Healthcare initiated a temporary funding program, and the Centers for Medicare and Medicaid Services (CMS) introduced flexibilities to provide relief for providers. CHANGE HEALTHCARE'S RESPONSE TIMELINE: * FEBRUARY 21: CHANGE HEALTHCARE DISCOVERS INCIDENT; UNITEDHEALTH GROUP FILES 8-K WITH SEC * FEBRUARY 26: AMERICAN HOSPITAL ASSOCIATION WRITES A PUBLIC LETTER TO HHS WARNING OF WIDESPREAD IMPACT * FEBRUARY 28: ALPHV/BLACKCAT CLAIMS RESPONSIBILITY FOR THE ATTACK * MARCH 7: CHANGE HEALTHCARE RESTORES 99% OF THEIR PHARMACY NETWORK SERVICES * MARCH 15: CHC'S ELECTRONIC PAYMENTS PLATFORM IS RESTORED * MARCH 18: ASSURANCE, THEIR MEDICAL CLAIMS PREPARATION SOFTWARE, IS BACK ONLINE * NOW: PHASED RECONNECTION AND TESTING CONTINUES IN AN EFFORT TO BRING CLAIMS PROCESSING BACK TO COMPLETE FUNCTIONALITY THE CULPRIT BEHIND THE ATTACK The attack was perpetrated by the notorious ransomware gang ALPHV/BlackCat, who the FBI has cited as the second most prolific ransomware-as-a-service variant in the world. In December, the FBI disrupted the gang’s efforts by seizing several websites operated by the group and offering a decryption tool to their victims. Unfortunately, that didn’t seem to deter them or their affiliate from targeting one of the largest medical claims payment processors in the United States. ALPHV/BlackCat allegedly stole four terabytes of data — and an affiliate hacker claims they accessed data from numerous other healthcare firms partnered with CHC as well. While Change Healthcare has not confirmed that it paid a ransom, security researchers spotted a publicly visible $22 million transaction on Bitcoin’s blockchain to an address connected to ALPHV/BlackCat. 📹 EXPERTS DISCUSS THE FALLOUT OF THE CHANGE HEALTHCARE HACK: WATCH OUR WEBINAR WHAT THIS MEANS FOR HEALTHCARE he Office of Civil Rights issued a “Dear Colleague” letter stating that their investigation's primary focus is on United HealthGroup and whether a breach of private health information occurred. Impacted healthcare providers are a secondary concern for their investigation, but they included the following reminder: “We are reminding entities that have partnered with Change Healthcare and UHG of their regulatory obligations and responsibilities, including ensuring that business associate agreements are in place and that timely breach notification to HHS and affected individuals occurs.” WHILE WAITING TO HEAR UPDATES FROM CHC REGARDING THE SCOPE OF IMPACTED DATA, DOWNSTREAM HEALTHCARE PROVIDERS SHOULD DO THE FOLLOWING: 1. REVIEW VENDOR CONTRACTS ASSOCIATED WITH CHANGE HEALTHCARE AND UNDERSTAND WHAT SERVICES THEY ARE ON THE HOOK FOR (AND IF ANY HAVE EVOLVED, CONSIDERING THE MANY ACQUISITIONS AND MERGERS) AND KNOW THEIR RIGHTS AS CUSTOMERS. 2. UNDERSTAND WHAT INFORMATION THEY HAVE SHARED WITH CHANGE HEALTHCARE HISTORICALLY. 3. FOLLOW UPDATES FROM CHANGE HEALTHCARE CLOSELY AS FINDINGS UNFOLD AND PARTICIPATE IN CALLS WITH CHC’S CHIEF INFORMATION SECURITY OFFICER TO SHOW DUE DILIGENCE. TIME FOR SYSTEMIC OVERHAUL In December 2023, HHS released a concept paper outlining the Department’s cybersecurity strategy for the industry; this builds on the National Cybersecurity Strategy outlined by President Biden and introduces new healthcare-specific cybersecurity goals to increase accountability within the sector. This incident serves as a real-life (worst-case scenario) reminder: The healthcare ecosystem is deeply interconnected. To prevent future catastrophic events, the entire industry needs to address an overreliance on a handful of vendors and meet the government’s cybersecurity standards. But sweeping systemic changes won’t happen overnight. So, yes, operations are slowly returning to normal. But will “normal” be enough for the healthcare industry in the future? DATA PRIVACY CONCERNS It’s too early to understand the full scope of losses related to the attack. UnitedHealth has not revealed much on the topic of exposed patient data, but they have just begun the massive undertaking of parsing through what information may have been accessed by threat actors. There’s also no guarantee that ALPHV/BlackCat deleted any of the exfiltrated data, even if UnitedHealth paid the ransom. And to make matters worse, the affiliate behind the attack claims they still have a copy (and were never paid by ALPHV/BlackCat). In short, we have no idea what or how much data ALPHV/BlackCat accessed, which means millions of patients’ sensitive health information could be compromised. Plus, the sheer scale of the breach requires a thoughtful approach to notification. Think of how many healthcare providers the average patient sees a year (dentist, pharmacist, primary care) and the confusion (or panic!) if they get a separate notification from each. UHG stated that, “where permitted,” it will handle the notification process for customers whose data was impacted. Depending on the services healthcare providers receive from CHC, CHC may act as a clearinghouse (in and of itself a HIPAA-covered entity) or a business associate of the healthcare entities. The terms of companies’ master agreements and business associate agreements with CHC entities will determine whether UHG will handle the notification process on behalf of the entities. KEY TAKEAWAYS FOR ORGANIZATIONS: THIRD-PARTY RISK MANAGEMENT In a letter to Congress, The American Hospital Association called the Change Healthcare Hack “the most significant cyberattack on the U.S. healthcare system in American history.” While the scale is unprecedented (most vendors aren’t involved in a third of the business transactions in their industry), it provides an example of the impact third parties have on business resilience. Or rather, how quickly any organization can suffer if a critical vendor is offline. Third-party risk management helps organizations assess and identify risks associated with third-party vendors so there’s a plan in place before a critical partner is breached. Read more about securing vendors here. BUSINESSES CONTINUITY AND DISASTER RECOVERY PLANS The actions an organization takes in the first 48 hours of a business disruption dictate the speed and effectiveness of resuming business operations. To make effective and quick mobilization possible, they need a business continuity and disaster recovery (BCDR) strategy. This doesn’t just address their own systems, but also their dependency on vendors. By organizing a BCDR, it may force conversations between business partners and IT to address critical vendors, if any, and contingency plans if they were to go offline. Learn more here. REVISIT VENDOR CONTRACTS AND BUSINESS ASSOCIATE AGREEMENTS (BAA) Try to avoid letting vendor contracts or BAAs go untouched for too long (especially with the frequency of mergers and acquisitions). As part of an organization’s third-party risk management, they should regularly make sure contracts are up-to-date, negotiate favorable terms (if possible), and note any provisions related to a cyber attack. Watch the webinar RECOMMENDED BLOGS FOR YOU Cyber and Healthcare: Treating the Rise of Ransomware "They Found Hundreds of Trackers": How Healthcare is Responding to New Guidelines for Pixel Tech Ransomware Groups Want to Exploit Your File Transfer Software: Here’s What You Need to Know In the Binoculars: Barrett Heacock, Chief Financial Officer Keeping up with Cybercriminals: The Future of Online Threats RECENT ARTICLES CHANGE HEALTHCARE HACK: EVERYTHING YOU NEED TO KNOW Change Healthcare experienced a ransomware attack with unprecedented fallout. What happened, and what have we learned? WOMEN IN CYBER: ADVICE FROM THE FIELD In honor of Women’s History Month, we connected with women making significant contributions to cyber to collect career advice, lessons from the field, and... LAW ENFORCEMENT CAN HELP IN A CYBER CRISIS — BUT PREVENTION IS EVEN BETTER Law enforcement is thwarting threat actors on the dark web. But what can organizations do to lay a strong security foundation (with or without the FBI's... Corvus Insurance® is a wholly owned subsidiary of The Travelers Companies, Inc. ©2024 Corvus Insurance Holdings Inc., Corvus Insurance Agency, LLC CA Lic No. 0M20816, Corvus Agency Limited, Corvus Underwriting GmbH. Nothing on this website constitutes an indictment, offer, or contract of insurance. Material on this website is intended for licensed insurance agent or producer use. This is not intended for business owner or insured use. Please disregard this communication if you are not a licensed agent or producer. Corvus Headquarters: 100 Summer St. Boston, MA 02110 Telephone Number: (857) 259-3995 Insurance Smart Cyber Insurance® Smart Tech E+O® Corvus Signal™ Cyber Underwriting Claims Management London Markets Deutschland und Österreich Distribution Partnerships Company About Us Careers Pressroom Privacy Policy Legal Documentation Contact Us Resources Blog Broker Hub Cyber Resources Threat Updates Knowledge Nest Broker Sign In