Company Details
optum
100,751
1,379,972
62
optum.com
0
OPT_2870801
In-progress

Optum Company CyberSecurity Posture
optum.comWe’re evolving health care so everyone can have the opportunity to live their healthiest life. It’s why we put your unique needs at the heart of everything we do, making it easy and affordable to manage health and well-being. We are delivering the right care how and when it’s needed; providing support to make smarter and healthier choices; and making prescription services easier, while helping you save money along the way. It’s everything health care should be. Together, for better health. Optum is part of UnitedHealth Group (NYSE: UNH).
Company Details
optum
100,751
1,379,972
62
optum.com
0
OPT_2870801
In-progress
Between 750 and 799

Optum Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach incident involving OptumRx on April 8, 2016. The breach occurred on March 16, 2016, when an unencrypted laptop belonging to a vendor was stolen in Indianapolis, Indiana, potentially exposing names, addresses, health plan information, prescription drug details, and in some cases, dates of birth. Approximately UNKN individuals were affected, and no financial information was compromised.
Description: The Optum incident exemplifies the risks of consolidating healthcare systems, where a cyberattack paralyzed medical billing and authorization services, resulting in patients experiencing delays in medical procedures and lack of access to prescription medications. Medical service providers could not bill insurance, leading to financial strain, missed salary payments, and some cases of severe financial difficulties. With a single point of failure due to consolidated services, a large portion of health systems and patient care became vulnerable to cyber threats.
Description: The California Office of the Attorney General reported a data breach involving UnitedHealth Group on March 30, 2012. The breach occurred from June 28, 2011 to December 12, 2011, potentially affecting personal information such as names, Social Security Numbers, and Medicare Healthcare Insurance Numbers, although the total number of individuals affected is unknown.
Description: UnitedHealth Group Inc. experienced a substantial cybersecurity breach at its Change Healthcare unit, leading to significant financial repercussions. The breach resulted in immediate response costs and broader business disruption, totaling approximately $872 million in the first quarter, with projections of the total pre-tax cost reaching between $1.35 billion and $1.6 billion. Additionally, UnitedHealth is allocating $800 million as claims reserves, to address potential claims from providers due to interrupted services since the breach was reported on February 21. The breach has affected both the network security of Change Healthcare and the continuity of services to providers and partners.
Description: UnitedHealth Group, parent company of Change Healthcare, reported a cyber-attack affecting 190 million individuals, an increase of 90 million from initial reports. As one of the largest healthcare payment processors, this incident is the most severe healthcare data breach of 2024. The breach, perpetrated by ransomware group ALPHV/Blackcat, led to substantial financial consequences with costs reaching $3.1 billion, according to the company's financial results. This breach has not only compromised the personal information of millions but also resulted in multiple lawsuits against UnitedHealth Group.
Description: In late February, UnitedHealth Group's subsidiary Change Healthcare suffered a notable cyber incident, causing considerable disruptions within the healthcare system. This breach has impeded healthcare operations nationwide, most critically affecting the ability to submit claims and receive payments. The incident has drawn significant concern from various stakeholders within the healthcare community, raising cash flow issues among hospitals, doctors, pharmacies, and others. To mitigate the impact, the Centers for Medicare & Medicaid Services (CMS) have enacted several immediate measures to assist providers and ensure continued service to patients. The incident emphasizes the critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem and has prompted the Department of Health and Human Services (HHS) to actively engage with federal bodies to provide threat intelligence to the industry and ensure a transparent, effective response to the cyberattack.
Description: United Health Group encountered severe financial and operational disruptions due to the cyberattack on its subsidiary, Change Healthcare. The attack impaired medical billing and pre-authorization services, causing healthcare procedures to be delayed and prescriptions to be inaccessible. This led to delayed income for healthcare systems, impacting their ability to pay staff and potentially forcing some into financial turmoil. The resultant lack of care and delayed procedures may have affected patient health outcomes.
Description: UnitedHealth Group’s subsidiary **Change Healthcare** suffered a **massive cyberattack** in February 2024, attributed to the **Blackcat (ALPHV) ransomware group**. The attack crippled critical systems, disrupting **billing, claims processing, and prescription services** across the U.S. healthcare sector. Hospitals, pharmacies, and providers faced **payment processing outages**, delaying patient care and financial transactions. The breach also exposed **sensitive patient data**, including medical records and personally identifiable information (PII), though the full scope of data theft remains under investigation. UnitedHealth was forced to **isolate affected systems**, leading to prolonged operational disruptions. The incident triggered **federal investigations**, with the U.S. Department of Health and Human Services (HHS) and the FBI involved. The financial and reputational damage was severe, with **stock drops** and **lawsuits** from affected parties. The attack underscored vulnerabilities in healthcare IT infrastructure, raising concerns about **future ransomware threats** to critical services.
Description: The ransomware attack on Change Healthcare, a component of UnitedHealth Group, reported on February 21, has been notably disruptive within the healthcare industry. This cyberattack is projected to result in financial damages approximating $1.6 billion. The incident has caused considerable perturbation amid providers contending with its extensive repercussions. Recovery efforts are hampered by the lack of clear communication from United Health and Change Healthcare, as providers await definitive instructions from the OCR regarding their reporting duties under HIPAA for this breach.
Description: UnitedHealth Group, the parent company of Change Healthcare, was affected by a ransomware attack that resulted in substantial operational disruption across the healthcare sector. Costs associated with the breach are projected to reach $1.6 billion. This breach compelled healthcare organizations to seek clarifications on their reporting obligations under HIPAA. While the extent of the compromised personal health information (PHI) is still being assessed, the situation highlights the complex challenges involved in managing and securing sensitive healthcare information in the digital age, alongside navigating the intricacies of legal and regulatory compliance.
Description: UnitedHealth faced a significant ransomware attack where its subsidiary, Change Healthcare, was compromised. The attack disrupted pharmacy operations, leading to chaos and a desperate need to fill prescriptions. UnitedHealth ultimately paid $22 million in bitcoin to the ALPHV/BlackCat gang to restore services quickly.
Description: UnitedHealth Group experienced a ransomware attack on February 21, which disrupted their services including medical claim handling and revenue cycle services. This resulted in severe delays in processing claims, pushing healthcare providers towards financial distress, with some nearly facing bankruptcy. The attack by the group BlackCat forced UnitedHealth to rebuild services and affected providers have started filing lawsuits due to not maintaining adequate cybersecurity measures, with allegations of sensitive information leaks. UnitedHealth has paid over $2 billion to affected providers and the data compromised in the attack remains undisclosed.
Description: The California Office of the Attorney General reported that UnitedHealthcare experienced a data breach affecting individuals' health information. The breach was detected on December 29, 2022, and it involved unauthorized access to the UHC broker portal, affecting information from December 1, 2022, to January 25, 2023. The breach potentially exposed first and last names, member ID numbers, plan effective dates, and other plan-related information, but not Social Security numbers or financial account information.
Description: On January 28, 2013, the California Office of the Attorney General reported a data breach involving RR Donnelley, which included the theft of an unencrypted computer containing personal information of UnitedHealthcare members. The specific date of the breach is unknown, but it occurred sometime between the second half of September and the end of November 2012. The information potentially compromised includes names, addresses, and Social Security numbers, and approximately 2003 health benefit plan members were affected.
Description: The company experienced a data breach after filing official documents with the Attorney General of Texas. The breach resulted in the names, addresses, health insurance information, and medical information being compromised. Leaked healthcare data was indeed protected healthcare information. They had sufficient information about a patient to carry out healthcare identity fraud.
Description: The CEO of UnitedHealthcare, Brian Thompson, was fatally shot in an incident involving Luigi Mangione, who was arrested in Pennsylvania. The shooter allegedly left behind bullet casings with words indicating a protest against healthcare insurance claim denials. The perpetrator carried a manifesto critical of healthcare companies' focus on profits over patient care. The case has drawn significant media attention, impacting the company’s reputation and possibly causing a financial setback due to concerns over the safety of its executives, potential legal issues, and the necessity for increased security measures.
Description: The Washington State Office of the Attorney General reported a data breach involving UnitedHealthcare on August 25, 2023. The breach, which was a ransomware attack discovered on April 17, 2023, affected approximately 1,025 Washington residents and involved compromised information including names, Social Security numbers, dates of birth, health insurance information, and medical information.


No incidents recorded for Optum in 2025.
No incidents recorded for Optum in 2025.
No incidents recorded for Optum in 2025.
Optum cyber incidents detection timeline including parent company and subsidiaries

We’re evolving health care so everyone can have the opportunity to live their healthiest life. It’s why we put your unique needs at the heart of everything we do, making it easy and affordable to manage health and well-being. We are delivering the right care how and when it’s needed; providing support to make smarter and healthier choices; and making prescription services easier, while helping you save money along the way. It’s everything health care should be. Together, for better health. Optum is part of UnitedHealth Group (NYSE: UNH).


Emory Healthcare is the most comprehensive health care system in Georgia. We offer 11 hospitals, the Emory Clinic, more than 250 provider locations, and more than 2,800 physicians specializing in 70 different medical subspecialties. Meaning we can provide treatments and services that may not be avai

Rush University Medical Center is an academic medical center that includes a 671-bed hospital serving adults and children, the 61-bed Johnston R. Bowman Health Center and Rush University. Rush University is home to one of the first medical colleges in the Midwest and one of the nation's top-ranked n

The Hospital Authority (HA) is a statutory body established under the Hospital Authority Ordinance in 1990. We have been responsible for managing Hong Kong's public hospitals services since December 1991. We are accountable to the Hong Kong Special Administrative Region Government through the Secret
A Dasa é a maior rede de saúde integrada do Brasil. Faz parte da vida de mais de 20 milhões de pessoas por ano, com alta tecnologia, experiência intuitiva e atitude à frente do tempo. Com mais de 50 mil colaboradores e 250 mil médicos parceiros, existe para ser a saúde que as pessoas desejam e que

CHRISTUS Health is a Catholic not-for-profit health care system comprising more than 600 centers, including long-term care facilities, community hospitals, walk-in clinics and health ministries. We are a community of 50,000 Associates, with over 15,000 physicians providing personalized care. Our m

At Wellstar Health System, our mission is to enhance the health and well-being of every person we serve. Nationally ranked and locally recognized for our high-quality care, inclusive culture and world-class doctors and caregivers, Wellstar is one of the largest, most integrated healthcare systems in
Ochsner Health is the leading nonprofit healthcare provider in the Gulf South, delivering expert care at its 46 hospitals and more than 370 health and urgent care centers. For 13 consecutive years, U.S. News & World Report has recognized Ochsner as the No. 1 hospital in Louisiana. Additionally, Ochs

Cincinnati Children’s, a nonprofit academic medical center established in 1883, offers services from well-child care to treatment for the most rare and complex conditions. It is the Department of Pediatrics at the University of Cincinnati College of Medicine and trains more than 600 residents and cl

O nascimento da Sociedade Beneficente Israelita Brasileira Albert Einstein, na década de 50, resultou do compromisso da comunidade judaica em oferecer à população brasileira uma referência em qualidade da prática médica. Mas a Sociedade queria ir além da simples construção de um hospital. E assi
.png)
A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...
UnitedHealth Group (NYSE: UNH), a titan in the U.S. healthcare industry, is grappling with a formidable array of financial and operational...
Two U.S. senators have written to UnitedHealth Group (UHG) CEO Stephen J. Hemsley demanding answers about cybersecurity and the response to...
U.S. Senators Bill Cassidy, R-La., and Maggie Hassan, D-N.H., have sent a letter to UnitedHealth Group CEO Stephen Hemsley expressing...
Develop your skills alongside leaders with a global organization that values your growth and encourages you to improve the health care landscape.
Elevate your career with a leading health care and innovation organization. Work alongside talented professionals from around the world,...
A tech firm providing services to the healthcare industry said hackers stole information on millions of people in an incident discovered in early February.
In the FAQ, UnitedHealth discusses its Medicare Advantage operations, the performance of its Optum healthcare services subsidiary, its executive shakeup and...
UnitedHealthcare is demanding to be paid back for loans it issued to healthcare providers who suffered financial damage from the February 2024 hack on Change...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Optum is https://www.optum.com/en/.
According to Rankiteo, Optum’s AI-generated cybersecurity score is 769, reflecting their Fair security posture.
According to Rankiteo, Optum currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Optum is not certified under SOC 2 Type 1.
According to Rankiteo, Optum does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Optum is not listed as GDPR compliant.
According to Rankiteo, Optum does not currently maintain PCI DSS compliance.
According to Rankiteo, Optum is not compliant with HIPAA regulations.
According to Rankiteo,Optum is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Optum operates primarily in the Hospitals and Health Care industry.
Optum employs approximately 100,751 people worldwide.
Optum presently has no subsidiaries across any sectors.
Optum’s official LinkedIn profile has approximately 1,379,972 followers.
Optum is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Optum does not have a profile on Crunchbase.
Yes, Optum maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/optum.
As of December 11, 2025, Rankiteo reports that Optum has experienced 17 cybersecurity incidents.
Optum has an estimated 30,929 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack, Breach and Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $10.52 billion.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with centers for medicare & medicaid services (cms), third party assistance with department of health and human services (hhs), and law enforcement notified with yes, and and remediation measures with wipe systems clean, remediation measures with restore from backups, remediation measures with thoroughly check for remaining threats..
Title: Data Breach of Healthcare Information
Description: The company experienced a data breach after filing official documents with the Attorney General of Texas. The breach resulted in the names, addresses, health insurance information, and medical information being compromised. Leaked healthcare data was indeed protected healthcare information. They had sufficient information about a patient to carry out healthcare identity fraud.
Type: Data Breach
Title: Cyber Incident at Change Healthcare
Description: In late February, UnitedHealth Group's subsidiary Change Healthcare suffered a notable cyber incident, causing considerable disruptions within the healthcare system. This breach has impeded healthcare operations nationwide, most critically affecting the ability to submit claims and receive payments. The incident has drawn significant concern from various stakeholders within the healthcare community, raising cash flow issues among hospitals, doctors, pharmacies, and others. To mitigate the impact, the Centers for Medicare & Medicaid Services (CMS) have enacted several immediate measures to assist providers and ensure continued service to patients. The incident emphasizes the critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem and has prompted the Department of Health and Human Services (HHS) to actively engage with federal bodies to provide threat intelligence to the industry and ensure a transparent, effective response to the cyberattack.
Date Detected: Late February
Type: Cyber Incident
Title: Cybersecurity Breach at Change Healthcare Unit of UnitedHealth Group Inc.
Description: UnitedHealth Group Inc. experienced a substantial cybersecurity breach at its Change Healthcare unit, leading to significant financial repercussions. The breach resulted in immediate response costs and broader business disruption, totaling approximately $872 million in the first quarter, with projections of the total pre-tax cost reaching between $1.35 billion and $1.6 billion. Additionally, UnitedHealth is allocating $800 million as claims reserves, to address potential claims from providers due to interrupted services since the breach was reported on February 21. The breach has affected both the network security of Change Healthcare and the continuity of services to providers and partners.
Date Detected: 2023-02-21
Type: Cybersecurity Breach
Title: UnitedHealth Group Ransomware Attack
Description: UnitedHealth Group experienced a ransomware attack on February 21, which disrupted their services including medical claim handling and revenue cycle services. This resulted in severe delays in processing claims, pushing healthcare providers towards financial distress, with some nearly facing bankruptcy. The attack by the group BlackCat forced UnitedHealth to rebuild services and affected providers have started filing lawsuits due to not maintaining adequate cybersecurity measures, with allegations of sensitive information leaks. UnitedHealth has paid over $2 billion to affected providers and the data compromised in the attack remains undisclosed.
Date Detected: 2023-02-21
Type: Ransomware
Attack Vector: Ransomware
Threat Actor: BlackCat
Motivation: Financial Gain
Title: Cyberattack on Change Healthcare
Description: United Health Group encountered severe financial and operational disruptions due to the cyberattack on its subsidiary, Change Healthcare. The attack impaired medical billing and pre-authorization services, causing healthcare procedures to be delayed and prescriptions to be inaccessible. This led to delayed income for healthcare systems, impacting their ability to pay staff and potentially forcing some into financial turmoil. The resultant lack of care and delayed procedures may have affected patient health outcomes.
Type: Cyberattack
Title: Optum Cyber Incident
Description: The Optum incident exemplifies the risks of consolidating healthcare systems, where a cyberattack paralyzed medical billing and authorization services, resulting in patients experiencing delays in medical procedures and lack of access to prescription medications. Medical service providers could not bill insurance, leading to financial strain, missed salary payments, and some cases of severe financial difficulties. With a single point of failure due to consolidated services, a large portion of health systems and patient care became vulnerable to cyber threats.
Type: Ransomware
Title: Fatal Shooting of UnitedHealthcare CEO
Description: The CEO of UnitedHealthcare, Brian Thompson, was fatally shot in an incident involving Luigi Mangione, who was arrested in Pennsylvania. The shooter allegedly left behind bullet casings with words indicating a protest against healthcare insurance claim denials. The perpetrator carried a manifesto critical of healthcare companies' focus on profits over patient care. The case has drawn significant media attention, impacting the company’s reputation and possibly causing a financial setback due to concerns over the safety of its executives, potential legal issues, and the necessity for increased security measures.
Type: Physical Security Incident
Attack Vector: Physical Violence
Threat Actor: Luigi Mangione
Motivation: Protest against healthcare insurance claim denialsCriticism of healthcare companies' focus on profits over patient care
Title: UnitedHealth Group Cyber-Attack
Description: UnitedHealth Group, parent company of Change Healthcare, reported a cyber-attack affecting 190 million individuals, an increase of 90 million from initial reports. As one of the largest healthcare payment processors, this incident is the most severe healthcare data breach of 2024. The breach, perpetrated by ransomware group ALPHV/Blackcat, led to substantial financial consequences with costs reaching $3.1 billion, according to the company's financial results. This breach has not only compromised the personal information of millions but also resulted in multiple lawsuits against UnitedHealth Group.
Type: Data Breach, Ransomware
Threat Actor: ALPHV/Blackcat
Title: Ransomware Attack on UnitedHealth Group and Change Healthcare
Description: UnitedHealth Group, the parent company of Change Healthcare, was affected by a ransomware attack that resulted in substantial operational disruption across the healthcare sector. Costs associated with the breach are projected to reach $1.6 billion. This breach compelled healthcare organizations to seek clarifications on their reporting obligations under HIPAA. While the extent of the compromised personal health information (PHI) is still being assessed, the situation highlights the complex challenges involved in managing and securing sensitive healthcare information in the digital age, alongside navigating the intricacies of legal and regulatory compliance.
Type: Ransomware
Title: Ransomware Attack on Change Healthcare
Description: The ransomware attack on Change Healthcare, a component of UnitedHealth Group, reported on February 21, has been notably disruptive within the healthcare industry. This cyberattack is projected to result in financial damages approximating $1.6 billion. The incident has caused considerable perturbation amid providers contending with its extensive repercussions. Recovery efforts are hampered by the lack of clear communication from United Health and Change Healthcare, as providers await definitive instructions from the OCR regarding their reporting duties under HIPAA for this breach.
Date Detected: 2023-02-21
Type: Ransomware
Title: Ransomware Incident Analysis
Description: Computer screens all over your org are flashing up a warning that you've been infected by ransomware, or you've got a message that someone's been stealing information from your server. There's a growing market of firms that advise extortion victims on how to handle the situation, but that just adds another invoice to the injury, and some still prefer to go it alone. In the end, while a few companies do ignore ransom demands outright, all at least assess their options before deciding whether to negotiate, restore from backups, or pay up.
Type: Ransomware
Threat Actor: ALPHV/BlackCat gangLockBit
Motivation: Financial Gain
Title: UnitedHealthcare Data Breach
Description: Unauthorized access to the UHC broker portal, potentially exposing personal and plan-related information.
Date Detected: 2022-12-29
Type: Data Breach
Attack Vector: Unauthorized Access
Title: OptumRx Data Breach
Description: A data breach incident involving OptumRx where an unencrypted laptop belonging to a vendor was stolen, potentially exposing personal and health information.
Date Detected: 2016-03-16
Date Publicly Disclosed: 2016-04-08
Type: Data Breach
Attack Vector: Physical Theft
Vulnerability Exploited: Unencrypted Laptop
Threat Actor: Unknown
Motivation: Unknown
Title: RR Donnelley Data Breach
Description: Theft of an unencrypted computer containing personal information of UnitedHealthcare members.
Date Detected: 2013-01-28
Date Publicly Disclosed: 2013-01-28
Type: Data Breach
Attack Vector: Theft of Physical Device
Vulnerability Exploited: Unencrypted Data
Title: UnitedHealth Group Data Breach
Description: The California Office of the Attorney General reported a data breach involving UnitedHealth Group on March 30, 2012. The breach occurred from June 28, 2011 to December 12, 2011, potentially affecting personal information such as names, Social Security Numbers, and Medicare Healthcare Insurance Numbers, although the total number of individuals affected is unknown.
Date Detected: 2012-03-30
Date Publicly Disclosed: 2012-03-30
Type: Data Breach
Title: UnitedHealthcare Data Breach
Description: The Washington State Office of the Attorney General reported a data breach involving UnitedHealthcare on August 25, 2023. The breach, which was a ransomware attack discovered on April 17, 2023, affected approximately 1,025 Washington residents and involved compromised information including names, Social Security numbers, dates of birth, health insurance information, and medical information.
Date Detected: 2023-04-17
Date Publicly Disclosed: 2023-08-25
Type: Data Breach
Attack Vector: Ransomware
Title: Cyberattack on Indian Council of Medical Research (ICMR) Leads to Data Breach of 81.5 Crore Citizens
Description: A cyberattack on the Indian Council of Medical Research (ICMR) resulted in a massive data breach exposing sensitive personal and medical information of approximately 81.5 crore (815 million) Indian citizens. The breach, attributed to a threat actor known as 'pwn0001,' involved the sale of the stolen data on the dark web for $80,000. The compromised data includes Aadhaar and passport details, names, phone numbers, and addresses, raising significant concerns over identity theft and fraud. The ICMR has not yet publicly confirmed the breach, and the extent of the impact remains under investigation.
Type: data breach
Threat Actor: pwn0001
Motivation: financial gaindata theft
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through UHC broker portal.

Data Compromised: Names, Addresses, Health insurance information, Medical information
Identity Theft Risk: True

Systems Affected: Claim submission and payment systems
Operational Impact: Impeded healthcare operations nationwideCash flow issues among hospitals, doctors, pharmacies, and others

Financial Loss: $872 million in the first quarter$1.35 billion to $1.6 billion total pre-tax cost
Systems Affected: Network security of Change HealthcareContinuity of services to providers and partners
Operational Impact: Interrupted services to providers

Financial Loss: $2 billion
Systems Affected: Medical claim handlingRevenue cycle services
Downtime: Severe delays in processing claims
Operational Impact: Rebuild services
Legal Liabilities: Lawsuits filed by affected providers

Systems Affected: Medical billingPre-authorization services
Operational Impact: Delayed healthcare proceduresInaccessible prescriptionsDelayed income for healthcare systems

Financial Loss: financial strainmissed salary paymentssevere financial difficulties
Systems Affected: medical billing servicesauthorization services
Operational Impact: delays in medical procedureslack of access to prescription medications

Financial Loss: Potential financial setback due to concerns over executive safety, potential legal issues, and increased security measures
Operational Impact: Impact on company’s reputation
Brand Reputation Impact: Significant media attention impacting the company’s reputation
Legal Liabilities: Potential legal issues

Financial Loss: $3.1 billion
Data Compromised: Personal information of 190 million individuals
Legal Liabilities: Multiple lawsuits

Financial Loss: $1.6 billion
Data Compromised: Personal Health Information (PHI)
Operational Impact: Substantial operational disruption

Financial Loss: $1.6 billion

Data Compromised: First and last names, Member id numbers, Plan effective dates, Other plan-related information
Systems Affected: UHC broker portal

Data Compromised: Names, Addresses, Health plan information, Prescription drug details, Dates of birth

Data Compromised: Names, Addresses, Social security numbers

Data Compromised: Names, Social security numbers, Medicare healthcare insurance numbers

Data Compromised: Names, Social security numbers, Dates of birth, Health insurance information, Medical information

Data Compromised: Aadhaar details, Passport details, Names, Phone numbers, Addresses, Medical records
Brand Reputation Impact: high (potential loss of public trust in ICMR's data security)
Identity Theft Risk: high
Average Financial Loss: The average financial loss per incident is $618.94 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Protected Healthcare Information, Personally Identifiable Information, , Personal information, Personal Health Information (PHI), Personal Information, Plan-Related Information, , Names, Addresses, Health Plan Information, Prescription Drug Details, Dates Of Birth, , Personal Information, , Names, Social Security Numbers, Medicare Healthcare Insurance Numbers, , Names, Social Security Numbers, Dates Of Birth, Health Insurance Information, Medical Information, , Personal Identifiable Information (Pii), Medical Records, Government-Issued Ids (Aadhaar, Passport) and .

Entity Name: Change Healthcare
Entity Type: Subsidiary
Industry: Healthcare
Location: Nationwide
Customers Affected: Hospitals, Doctors, Pharmacies

Entity Name: Change Healthcare Unit of UnitedHealth Group Inc.
Entity Type: Healthcare
Industry: Healthcare

Entity Name: UnitedHealth Group
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Subsidiary
Industry: Healthcare

Entity Name: UnitedHealthcare
Entity Type: Healthcare Company
Industry: Healthcare
Location: Pennsylvania

Entity Name: UnitedHealth Group
Entity Type: Parent Company
Industry: Healthcare
Size: Large
Customers Affected: 190 million individuals

Entity Name: Change Healthcare
Entity Type: Subsidiary
Industry: Healthcare
Size: Large

Entity Name: UnitedHealth Group
Entity Type: Corporation
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Subsidiary
Industry: Healthcare

Entity Name: Change Healthcare
Entity Type: Healthcare
Industry: Healthcare

Entity Name: ['Colonial Pipeline', 'UnitedHealth', 'Change Healthcare', 'PowerSchool']
Entity Type: Organization

Entity Name: UnitedHealthcare
Entity Type: Health Insurance Provider
Industry: Healthcare

Entity Name: OptumRx
Entity Type: Healthcare
Industry: Healthcare
Location: Indianapolis, Indiana
Customers Affected: UNKN

Entity Name: RR Donnelley
Entity Type: Company
Industry: Printing and Marketing Services
Customers Affected: 2003

Entity Name: UnitedHealth Group
Entity Type: Healthcare
Industry: Healthcare

Entity Name: UnitedHealthcare
Entity Type: Health Insurance Company
Industry: Healthcare
Location: Washington
Customers Affected: 1025

Entity Name: Indian Council of Medical Research (ICMR)
Entity Type: government agency
Industry: healthcare and medical research
Location: India
Customers Affected: 81.5 crore (815 million) citizens

Third Party Assistance: Centers For Medicare & Medicaid Services (Cms), Department Of Health And Human Services (Hhs).

Law Enforcement Notified: Yes

Remediation Measures: Wipe systems cleanRestore from backupsThoroughly check for remaining threats
Third-Party Assistance: The company involves third-party assistance in incident response through Centers for Medicare & Medicaid Services (CMS), Department of Health and Human Services (HHS), , .

Type of Data Compromised: Protected healthcare information, Personally identifiable information
Sensitivity of Data: High

Type of Data Compromised: Personal information
Number of Records Exposed: 190 million

Type of Data Compromised: Personal Health Information (PHI)
Sensitivity of Data: High

Type of Data Compromised: Personal information, Plan-related information
Sensitivity of Data: Medium
Personally Identifiable Information: First and last namesMember ID numbers

Type of Data Compromised: Names, Addresses, Health plan information, Prescription drug details, Dates of birth
Number of Records Exposed: UNKN
Sensitivity of Data: High
Data Encryption: No
Personally Identifiable Information: Yes

Type of Data Compromised: Personal information
Number of Records Exposed: 2003
Sensitivity of Data: High
Data Encryption: No
Personally Identifiable Information: Yes

Type of Data Compromised: Names, Social security numbers, Medicare healthcare insurance numbers
Sensitivity of Data: High

Type of Data Compromised: Names, Social security numbers, Dates of birth, Health insurance information, Medical information
Number of Records Exposed: 1025
Sensitivity of Data: High

Type of Data Compromised: Personal identifiable information (pii), Medical records, Government-issued ids (aadhaar, passport)
Number of Records Exposed: 81.5 crore (815 million)
Sensitivity of Data: high (includes Aadhaar, passport, and medical data)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Wipe systems clean, Restore from backups, Thoroughly check for remaining threats, .

Ransomware Strain: BlackCat

Ransomware Strain: ALPHV/Blackcat

Ransom Paid: $22 million in bitcoin
Ransomware Strain: ALPHV/BlackCatLockBit

Legal Actions: Lawsuits filed by affected providers

Legal Actions: Multiple lawsuits

Regulations Violated: HIPAA

Regulatory Notifications: HIPAA
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuits filed by affected providers, Multiple lawsuits.

Lessons Learned: The critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem
Key Lessons Learned: The key lessons learned from past incidents are The critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem.

Source: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2016-04-08

Source: California Office of the Attorney General
Date Accessed: 2013-01-28

Source: California Office of the Attorney General
Date Accessed: 2012-03-30

Source: Washington State Office of the Attorney General
Date Accessed: 2023-08-25
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2016-04-08, and Source: California Office of the Attorney GeneralDate Accessed: 2013-01-28, and Source: California Office of the Attorney GeneralDate Accessed: 2012-03-30, and Source: Washington State Office of the Attorney GeneralDate Accessed: 2023-08-25, and Source: The Cyber ExpressUrl: https://tinyurl.com/46j93hew.

Investigation Status: Ongoing

Investigation Status: ongoing (unconfirmed by ICMR)

Entry Point: UHC broker portal

High Value Targets: Aadhaar Data, Passport Data, Medical Records,
Data Sold on Dark Web: Aadhaar Data, Passport Data, Medical Records,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Centers For Medicare & Medicaid Services (Cms), Department Of Health And Human Services (Hhs), , .
Ransom Payment History: The company has Paid ransoms in the past.
Last Attacking Group: The attacking group in the last incident were an BlackCat, Luigi Mangione, ALPHV/Blackcat, ALPHV/BlackCat gangLockBit, Unknown and pwn0001.
Most Recent Incident Detected: The most recent incident detected was on Late February.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-08-25.
Highest Financial Loss: The highest financial loss from an incident was $3.1 billion.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, health insurance information, medical information, , Personal information of 190 million individuals, Personal Health Information (PHI), First and last names, Member ID numbers, Plan effective dates, Other plan-related information, , Names, Addresses, Health Plan Information, Prescription Drug Details, Dates of Birth, , Names, Addresses, Social Security numbers, , names, Social Security Numbers, Medicare Healthcare Insurance Numbers, , names, Social Security numbers, dates of birth, health insurance information, medical information, , Aadhaar details, passport details, names, phone numbers, addresses, medical records and .
Most Significant System Affected: The most significant system affected in an incident was Claim submission and payment systems and Network security of Change HealthcareContinuity of services to providers and partners and Medical claim handlingRevenue cycle services and Medical billingPre-authorization services and medical billing servicesauthorization services and UHC broker portal.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was centers for medicare & medicaid services (cms), department of health and human services (hhs), , .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Other plan-related information, Aadhaar details, names, dates of birth, Prescription Drug Details, Dates of Birth, addresses, Addresses, phone numbers, passport details, First and last names, Medicare Healthcare Insurance Numbers, medical information, Member ID numbers, Plan effective dates, Social Security Numbers, Names, Social Security numbers, Personal information of 190 million individuals, Personal Health Information (PHI), medical records, Health Plan Information and health insurance information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.0B.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was ['$22 million in bitcoin'].
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuits filed by affected providers, Multiple lawsuits.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The critical need for enhanced cybersecurity resilience throughout the healthcare ecosystem.
Most Recent Source: The most recent source of information about an incident are The Cyber Express, California Office of the Attorney General and Washington State Office of the Attorney General.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://tinyurl.com/46j93hew .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an UHC broker portal.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.