Change Healthcare brings some systems back online after cyberattack

Avatar

Some of Change Healthcare’s systems are functional as of Friday, and others will be online by mid-March as the response continues to cyberattack that has disrupted operations for weeks, according to an update from parent company UnitedHealth Group.

“UnitedHealth Group continues to make substantial progress in mitigating the impact to consumers and care providers of the unprecedented cyberattack on the U.S. health system and the Change Healthcare claims and payment infrastructure,” UnitedHealth said in a statement posted Thursday night.

Change Healthcare’s electronic prescribing services for pharmacies are “now fully functional,” said UnitedHealth, which owns the company through its Optum division. Pharmacy claim submission and payment transmission are available, the statement said.

Other aspects of the Change Healthcare system still need more work after a late February cyberattack disrupted it and caused problems nationwide for pharmacies, hospital systems, physician networks and other healthcare organizations. Users have been unable to properly file for and receive insurance payments.

The broader payments platform will be running again on March 15, UnitedHealth said. As for its medical claims technology, officials expect to “begin testing and reestablish connectivity” through the week of March 18.

“We are committed to providing relief for people affected by this malicious attack on the U.S. health system,” UnitedHealth CEO Andrew Witty said in the statement. “All of us at UnitedHealth Group feel a deep sense of responsibility for recovery and are working tirelessly to ensure that providers can care for their patients and run their practices, and that patients can get their medications. We’re determined to make this right as fast as possible.”

UnitedHealth also said it would continue to provide funding support for users. Large healthcare providers have reported cash flow problems of hundreds of millions of dollars as they were unable to receive payments for claims.

The statement did not include information about the investigation into the attack, which the company has blamed on the AlphV/BlackCat ransomware group.

Company officials have continued to decline to comment on whether the company paid a ransom. Reports have said the cybercrime gang allegedly received a payment of $22 million.

AlphV/BlackCat, meanwhile, has been the subject of intense scrutiny as cybersecurity experts noticed activity earlier this week that suggested leaders were attempting to pull an elaborate scam on the group’s affiliates.

The incident continues to draw attention from Washington. Senators wrote on Friday to leaders at the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Health and Human Services (HHS) to request that the agencies create “enhanced contingency plans for outages within the healthcare ecosystem” and broaden the activities of the public-private Joint Cyber Defense Collaborative (JCDC) “to ensure key healthcare sector entities proactively receive actionable threat information.”

IndustryCybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. Most recently he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Microsoft: Russians are using stolen information to breach company’s systems

Next Post

Bills targeting data brokers and TikTok approved in House committee

Related Posts

Military-themed Email Scam Spreads Malware to Infect Pakistani Users

Cybersecurity researchers have shed light on a new phishing campaign that has been identified as targeting people in Pakistan using a custom backdoor. Dubbed PHANTOM#SPIKE by Securonix, the unknown threat actors behind the activity have leveraged military-related phishing documents to activate the infection sequence. "While there are many methods used today to deploy malware, the threat actors
Avatar
Read More

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless. "TheMoon, which emerged in 2014, has been operating quietly while growing to over 40,000 bots from 88 countries in January and February of 2024," the Black Lotus Labs team at Lumen
Omega Balla
Read More