Skip to Content

The $22 Million Attack That Could Have Been Prevented: The Reverse Engineering of the Change Healthcare Case

How the Lack of Multi-Factor Authentication Opened the Doors to the Largest Cyber Attack in Healthcare History
February 18, 2026 by
The $22 Million Attack That Could Have Been Prevented: The Reverse Engineering of the Change Healthcare Case

The Anatomy of a Forewarned Digital Disaster

In early 2024, the United States healthcare system was the target of what Rick Pollack, president of the American Hospital Association, described as "the most significant and consequential cybersecurity incident in its history." The victim was Change Healthcare, a technology giant operating at the heart of the American healthcare ecosystem, processing one in three patient records in the country. The attack, perpetrated by the ALPHV/BlackCat ransomware group, not only paralyzed the company's operations but also generated a devastating cascading effect, impacting 192.7 million individuals and costing, by the end of 2024, the staggering amount of $2.457 billion.

The incident exposed an inconvenient truth: the infrastructure that supports essential services is often dangerously fragile. This article reverse engineers the attack on Change Healthcare, not to focus on fear, but to illuminate the path to prevention. We will analyze the technical failure that served as the entry point and demonstrate, step by step, how fundamental managed security capabilities could have transformed this multibillion-dollar disaster into a contained and quickly neutralized incident.

The Point of Failure: An Open Door of $22 Million

In his testimony before the U.S. Congress, UnitedHealth Group CEO Andrew Witty revealed the root cause of the incident: on February 12, 2024, cybercriminals used stolen credentials to access a remote access portal of the Citrix application. The most shocking detail that defines the entire subsequent narrative is thatthis portal did not have multi-factor authentication (MFA) enabled.

This single failure, the absence of a security layer considered fundamental for over a decade, was the entry point. Once inside the network, the attackers operated undetected for nine long days. During this time, they moved laterally, escalated privileges, and exfiltrated approximately 6 terabytes of sensitive data before finally deploying the ransomware on February 21 that encrypted the systems and paralyzed the company.

"Negligence in cybersecurity led to systemic breaches across the U.S. healthcare industry. The long-term effects of this massive breach will be felt for years."Tom Kellerman, Senior VP of Cybersecurity Strategy, Contrast Security

The impact was immediate and catastrophic. Hospitals could not process payments, pharmacies could not verify prescriptions, and patients had their care delayed. UnitedHealth Group was forced to advance over $9 billion to healthcare providers to avoid widespread financial collapse in the sector.

Four Security Capabilities That Could Have Changed History

Analyzing an incident of this magnitude with the clarity of hindsight is a valuable exercise. It allows us to map the failures and understand how a proactive approach, based on managed security capabilities, would have completely rewritten this scenario. Below, we detail four essential capabilities that any organization should demand from its cybersecurity strategy.

Capability 1: Robust Identity and Access Management

The attackers' entry point was a remote access portal without MFA. In an environment with mature identity and access management, this vulnerability simply would not exist. Enabling MFA at all access points to the network, whether they are VPNs, application portals, emails, or cloud systems, should be a non-negotiable policy. It is not about a specific product, but about a "zero trust" security philosophy, where every access is verified. The implementation of MFA would have blocked the login attempt with stolen credentials in the first second, ending the attack before it even began.

Capability 2: 24/7 Managed Detection and Response (MDR)

The attackers remained in the Change Healthcare network for nine days without being detected. This dwell time is unacceptable in a modern IT environment. The capability ofManaged Detection and Response (MDR), supported by a Security Operations Center (SOC), acts as a central nervous system for the organization's security. Using advanced Endpoint Detection and Response (EDR), specialized analysts monitor the network 24 hours a day, 7 days a week, 365 days a year.

The lateral movement of attackers, the attempt to escalate privileges, and the exfiltration of data would have generated a series of alerts. Our automated systems and human analysts would have identified the anomalous behavior within minutes. The compromised workstation or server would be immediately isolated from the network, cutting off the attacker's communication and preventing the spread of the threat. The incident would shift from a large-scale data breach to a contained and documented intrusion attempt.

Capability 3: Proactive Maintenance and Attack Surface Management

The testimony of the CEO of UnitedHealth also mentioned that legacy systems amplified the impact of the attack. Complex and aging IT infrastructures are a fertile ground for vulnerabilities. Zamak's Proactive Maintenance capability involves a continuous cycle of asset management, application of security patches, and infrastructure modernization.

We conducted a comprehensive inventory of the client's IT environment, identifying obsolete operating systems, unsupported software, and inadequate network configurations. Network segmentation, a practice that creates internal barriers to limit an attacker's movement, is one of the pillars of our strategy. Even if one segment of the network were compromised, the others would remain secure. This approach drastically reduces the "attack surface," limiting opportunities for cybercriminals.

Capability 4: Resilience and Business Continuity with Backup and Disaster Recovery (BDR)

In the worst-case scenario, where an extremely sophisticated attacker managed to bypass the layers of defense and deploy ransomware, Zamak's Backup and Disaster Recovery (BDR) capability would be the final line of defense. The decision to pay a ransom of $22 million, which did not even guarantee the return of the data, was driven by desperation and the inability to restore operations quickly.

Our BDR solution ensures that multiple copies of the client's critical data are saved in secure locations and, crucially, in an immutable format. This means that backups cannot be altered or encrypted by ransomware. Instead of negotiating with criminals, Zamak's focus would be to initiate the recovery process. Within hours, not weeks or months, critical systems would be restored from a point prior to the attack, ensuring business continuity and making ransom payment an irrelevant option.


Summary: Failure vs. Prevention

  • Remote access without MFA→ Identity and Access Management with mandatory MFA at all entry points.
  • 9 days of undetected lateral movement→ Managed Detection and Response (MDR) with 24/7 monitoring and automatic isolation.
  • Legacy systems and lack of segmentation→ Proactive Maintenance with patch management and network segmentation.
  • Inability to restore operations→ Backup and Disaster Recovery (BDR) with immutable backups for recovery in hours.

The Final Lesson: Prevention is Not a Cost, It's a Strategic Investment

The case of Change Healthcare is a landmark study on how neglecting security fundamentals can lead to consequences of epic proportions. The cost of $2.457 billion, the disruption of an essential service for an entire nation, and the damage to the reputation of a multibillion-dollar company could have been avoided with the implementation of security capabilities that are standard in any IT managed services contract. IT managed services.

The real lesson is not about how sophisticated hackers have become, but about how complacency and lack of investment in proactive IT can be fatal. Cybersecurity is not a project with a beginning, middle, and end; it is a continuous process of vigilance, maintenance, and adaptation. It is a capability that needs to be managed by dedicated experts, whose sole mission is to protect a company's most valuable asset: its data and its ability to operate.

Want to know how to protect your business? Talk to someone who understands.


References

  1. Hyperproof.Understanding the Change Healthcare Breach. hyperproof.io
  2. UnitedHealth Group.Q3 2024 Earnings Report. Total cost of the incident: $2.457 billion.
  3. Cybersecurity Dive.Change Healthcare, compromised by stolen credentials, did not have MFA turned on. cybersecuritydive.com
  4. Healthcare Dive.Change Healthcare cyberattack: 5 technical takeaways from UnitedHealth CEO's testimony. healthcaredive.com
The $22 Million Attack That Could Have Been Prevented: The Reverse Engineering of the Change Healthcare Case
February 18, 2026
Share this post
Tags
Our blogs
Archive