Sector Assessment

Healthcare Sector Cyber Threat Assessment

February 25, 2026
16 min read Export PDF
Executive Summary

The healthcare sector occupies a uniquely vulnerable position in the cyber threat landscape. Unlike other critical infrastructure sectors, successful cyberattacks against healthcare organizations carry direct patient safety implications — ambulance diversions, delayed surgeries, and compromised medical records that can alter treatment decisions. In 2024, healthcare organizations reported 389 major data breaches to the U.S. Department of Health and Human Services (HHS), with the average breach exposing 10.93 million records. The Change Healthcare/ALPHV incident in February 2024 demonstrated the catastrophic cascading potential when a single healthcare technology provider is compromised, disrupting pharmacy operations, claims processing, and patient care across thousands of facilities nationwide. European healthcare faces compounding regulatory pressure as NIS2 designates health entities as essential infrastructure while GDPR Article 9 imposes strict requirements on processing sensitive health data. This report provides a comprehensive threat assessment for healthcare security leaders navigating an environment where the convergence of legacy medical technology, expanding IoMT attack surfaces, and highly motivated threat actors creates an operational challenge unlike any other sector.

The Healthcare Threat Landscape

Why Healthcare Is a Prime Target

Healthcare organizations present an exceptionally attractive target profile for both financially motivated cybercriminals and state-sponsored actors. Protected Health Information (PHI) commands premium prices on underground markets — between $250 and $1,000 per complete medical record, compared to $5-$50 for a credit card number. Unlike financial credentials, medical records cannot be "cancelled" — a patient's medical history, diagnosis codes, insurance identifiers, and biometric data are permanent, making medical identity theft a persistent and lucrative fraud vector.

Beyond data value, the operational criticality of healthcare IT systems creates enormous leverage for extortion. Hospitals cannot tolerate extended downtime without direct impact on patient outcomes. Emergency departments, intensive care units, and surgical suites depend on electronic health records (EHRs), picture archiving and communication systems (PACS), and laboratory information systems that, when unavailable, force staff to revert to paper-based processes with significant delays and error risks. This operational pressure — where downtime literally threatens lives — makes healthcare organizations more likely to pay ransoms and pay them quickly.

⚠ Critical Finding

Healthcare organizations experienced a 128% increase in ransomware attacks between 2022 and 2024. The average total cost of a healthcare data breach reached $10.93 million in 2024 — the highest of any industry for the fourteenth consecutive year, according to IBM's Cost of a Data Breach Report.

Major Incidents Defining the Current Threat

Three incidents in particular have shaped the current healthcare threat assessment:

Change Healthcare / ALPHV (February 2024): The ALPHV/BlackCat ransomware group compromised Change Healthcare, a UnitedHealth Group subsidiary processing approximately 15 billion healthcare transactions annually — roughly 40% of all U.S. health claims. The attack disrupted pharmacy operations, claims adjudication, and eligibility verification across the entire U.S. healthcare system for weeks. UnitedHealth confirmed paying a $22 million ransom, and the total financial impact is estimated to exceed $1.6 billion. The incident exposed catastrophic concentration risk in healthcare technology supply chains.

CommonSpirit Health (October 2022): A ransomware attack against CommonSpirit Health, one of the largest U.S. nonprofit health systems operating 140 hospitals across 21 states, forced emergency department diversions, surgery postponements, and the disconnection of EHR systems across multiple facilities. The estimated financial impact exceeded $160 million, and some facilities operated under manual processes for over a month.

NHS / WannaCry (May 2017): Though not a targeted healthcare attack, WannaCry demonstrated the devastating impact of ransomware on health systems at scale. The UK's National Health Service reported 80 hospital trusts affected, approximately 19,000 appointments cancelled including 139 potential cancer referrals, and five hospitals that diverted ambulances due to locked systems. Total estimated cost to the NHS: £92 million.

Patient Data Targeting and Monetization

The Value Hierarchy of Health Data

Not all healthcare data carries equal value in underground markets. Dark Angel's analysis of dark web marketplace listings and stealer log collections identifies the following monetization hierarchy:

Data Type Market Value (per record) Fraud Application Shelf Life
Complete patient record (PHI + PII + insurance) $250 – $1,000 Medical identity theft, insurance fraud, prescription fraud Indefinite
Insurance credentials only $50 – $250 Claims fraud, phantom billing Until policy renewal
EHR login credentials $500 – $2,000 Unauthorized access, data theft, prescription alteration Until credential rotation
Provider/physician credentials (DEA, NPI) $1,000 – $5,000 Controlled substance fraud, phantom billing Until detection
Clinical trial data Variable (high) Corporate espionage, stock manipulation Until publication

Medical identity theft is particularly insidious because victims often do not discover the fraud for months or years — typically only when they receive unexpected medical bills, insurance denials, or discover incorrect information in their medical records that could affect future treatment decisions. The FBI's Internet Crime Complaint Center (IC3) documented a 65% increase in healthcare-related identity theft complaints between 2022 and 2024.

Data Enrichment and Cross-Referencing

Sophisticated threat actors do not sell healthcare data in isolation. Instead, they enrich stolen PHI with data from other breaches — financial records, social media profiles, employment history — to create comprehensive identity packages that enable more convincing fraud. Dark Angel's monitoring of underground markets has identified specialized vendors who aggregate data from multiple healthcare breaches, cross-referencing patient records with exposed credentials from stealer logs to create "full profiles" commanding premium prices of $1,500 or more per identity.

Ransomware Impact on Care Delivery

Direct Patient Safety Implications

The relationship between ransomware attacks and patient outcomes has moved beyond theoretical concern to documented reality. A 2023 study published in JAMA Health Forum analyzing Medicare data found that ransomware attacks against hospitals were associated with increased in-hospital mortality and a 17-25% decrease in hospital volume during the attack period. Another study documented a measurable increase in cardiac arrest mortality at neighboring hospitals experiencing overflow from diverted patients during an attack.

"A ransomware attack against a hospital is not simply a cybersecurity incident — it is a patient safety emergency that demands the same urgency and coordination as a mass casualty event."

— Dark Angel Research, Healthcare Sector Assessment

Common operational impacts during healthcare ransomware incidents include:

  • Emergency department diversions — ambulances redirected to alternative facilities, increasing transport time for critical patients
  • Surgical postponements — elective and non-emergency procedures cancelled due to inability to access patient records, imaging, or laboratory results
  • Medication errors — reversion to paper-based ordering increases transcription errors and eliminates automated drug interaction checks
  • Diagnostic delays — PACS system unavailability prevents access to imaging studies; laboratory information systems offline delay critical test results
  • Discharge delays — inability to process discharge documentation extends hospital stays, reducing capacity

Average downtime following a healthcare ransomware incident is 21 days, though some organizations have reported degraded operations for 60 days or longer. During this period, clinical staff must operate under business continuity procedures that significantly reduce throughput and increase error risk.

Ransomware Groups Targeting Healthcare

Several ransomware groups have demonstrated a willingness — or even preference — for targeting healthcare organizations, despite the moral opprobrium such attacks attract:

Group Healthcare Victims (2024) Notable Characteristics Status
ALPHV/BlackCat 23 confirmed Change Healthcare, filed SEC complaint against victim Exit scam (Mar 2024)
LockBit 18 confirmed Claims to prohibit attacks on hospitals; affiliates routinely violate policy Degraded post-Cronos
Royal/BlackSuit 14 confirmed Former Conti operators, aggressive healthcare targeting Active
Rhysida 12 confirmed Prospect Medical Holdings attack, auction of patient data Active
Black Basta 9 confirmed Ascension Health incident (May 2024), social engineering focus Active

Medical Device and IoMT Vulnerabilities

The Expanding IoMT Attack Surface

The average hospital now operates between 10,000 and 15,000 connected devices, many of which fall under the umbrella of the Internet of Medical Things (IoMT). These devices — infusion pumps, patient monitors, MRI machines, CT scanners, ventilators, and implantable cardiac devices — were designed for clinical functionality, not cybersecurity resilience. Research by Cynerio found that 53% of connected medical devices in U.S. hospitals have a known critical vulnerability, and the average hospital has approximately 6.2 critical medical device vulnerabilities per bed.

Legacy Operating Systems

A significant proportion of medical devices run operating systems that no longer receive security patches. Dark Angel's analysis of exposed healthcare infrastructure identifies:

  • Windows XP/Windows 7: Approximately 17% of connected medical devices still run these unsupported operating systems, particularly imaging systems (MRI, CT, ultrasound) with long procurement cycles and FDA-validated software configurations that vendors are reluctant to update
  • Embedded Linux (unsupported versions): Many infusion pumps and patient monitoring systems run custom Linux distributions that are no longer maintained
  • Proprietary RTOS: Real-time operating systems in ventilators and cardiac devices with no security update mechanism
⚠ Key Risk

The FDA's 2023 guidance on premarket cybersecurity requirements (Section 524B of the FD&C Act) mandates that new device submissions include a Software Bill of Materials (SBOM) and a plan for addressing postmarket vulnerabilities. However, this applies only to new devices — the installed base of legacy devices will remain vulnerable for years to come, with some imaging systems having operational lifespans of 15-20 years.

Vulnerability Classes in Medical Devices

Common vulnerability patterns across IoMT devices include default or hardcoded credentials (affecting an estimated 21% of devices in clinical environments), unencrypted clinical data transmission (HL7v2 and DICOM traffic frequently traverses networks without TLS), absence of integrity verification mechanisms allowing firmware modification, flat network architectures providing lateral movement opportunities from compromised devices to clinical systems, and inadequate logging that prevents forensic analysis after a compromise. Network segmentation remains the primary mitigation strategy, though implementation is complicated by the interdependencies between medical devices, EHR systems, and clinical workflows.

Regulatory Compliance Challenges

HIPAA Security Rule

The HIPAA Security Rule (45 CFR Part 160 and Subparts A and C of Part 164) establishes national standards for protecting electronic protected health information (ePHI). While HIPAA mandates risk analysis, access controls, audit controls, and transmission security, enforcement has historically been penalty-driven rather than prevention-focused. The HHS Office for Civil Rights (OCR) issued $4.18 million in HIPAA penalties in 2024, though this represents a fraction of the total breach costs incurred by healthcare organizations.

GDPR Article 9: Health Data as Special Category

Under the EU General Data Protection Regulation, health data is classified as a "special category" of personal data under Article 9, requiring explicit consent or specific legal bases for processing. For healthcare organizations operating in or serving EU residents, this creates enhanced obligations including mandatory Data Protection Impact Assessments (DPIAs) for processing health data at scale, 72-hour breach notification requirements to supervisory authorities, potential fines of up to €20 million or 4% of annual global turnover, and mandatory appointment of a Data Protection Officer (DPO).

NIS2 and European Healthcare

The NIS2 Directive designates healthcare entities — including hospitals, reference laboratories, entities carrying out research and development of medicinal products, entities manufacturing pharmaceutical preparations and medical devices — as essential entities subject to the directive's most stringent requirements. This includes mandatory cybersecurity risk management measures, incident reporting within 24 hours, supply chain security assessments, and management body personal liability for non-compliance. European healthcare organizations that have historically operated under less prescriptive cybersecurity regulations now face a fundamentally more demanding compliance landscape.

Supply Chain Risks in Healthcare

EHR Vendor Concentration

The healthcare sector exhibits dangerous vendor concentration in critical systems. Epic Systems and Oracle Health (formerly Cerner) together account for approximately 60% of the U.S. acute care EHR market. A successful cyberattack or supply chain compromise affecting either platform would have cascading effects across thousands of healthcare organizations simultaneously. The Change Healthcare incident demonstrated this concentration risk in the claims processing domain — a single entity processing 40% of U.S. health claims created a systemic single point of failure.

Medical Device Manufacturer Supply Chain

Medical devices incorporate components from dozens of suppliers, creating supply chain attack surfaces that are difficult to audit. The 2020 SolarWinds compromise affected multiple healthcare organizations through their IT management infrastructure, while the 2023 MOVEit vulnerability impacted healthcare data processors including Maximus, which handles government health programs, exposing 11 million records. Device manufacturers' increasing reliance on cloud-based services for device management, telemetry, and software updates introduces additional attack vectors that extend beyond the physical hospital perimeter.

Third-Party Billing and Claims Processors

Healthcare's complex financial ecosystem — involving claims clearinghouses, pharmacy benefit managers, medical billing companies, and revenue cycle management firms — creates an extensive network of third parties with access to sensitive patient and financial data. Many of these entities are small to mid-sized companies with less mature security programs than the large healthcare organizations they serve. The Change Healthcare incident underscored that a compromise at any point in this ecosystem can propagate to affect the entire healthcare delivery chain.

Defensive Recommendations

  1. Implement network segmentation for medical devices — Isolate IoMT devices on dedicated VLANs with firewall policies restricting lateral movement. Prioritize segmentation of legacy devices running unsupported operating systems and high-risk devices with direct patient impact.
  2. Deploy healthcare-specific threat intelligence — Subscribe to healthcare ISAC (H-ISAC) threat feeds and integrate sector-specific intelligence into security operations. Monitor dark web markets for exposed patient data, stolen credentials, and healthcare-targeted threat actor activity.
  3. Conduct regular medical device inventory and risk assessment — Maintain a comprehensive, continuously updated inventory of all connected medical devices including operating system versions, firmware versions, network connectivity, and known vulnerabilities. Prioritize remediation based on patient safety impact.
  4. Develop healthcare-specific incident response plans — Plans must address clinical workflow continuity, patient diversion protocols, regulatory notification requirements across multiple jurisdictions (HHS, GDPR supervisory authorities, NIS2 CSIRTs), and communication with patients whose data may be compromised.
  5. Strengthen identity and access management for clinical systems — Implement multi-factor authentication for EHR access, role-based access controls aligned to the principle of least privilege, and privileged access management for IT administrators with access to clinical systems.
  6. Audit and secure third-party relationships — Assess cybersecurity posture of all vendors with access to patient data or clinical systems. Include contractual requirements for security standards, breach notification timelines, and right-to-audit clauses. Develop concentration risk assessments for critical vendors.
  7. Implement immutable backup architecture — Deploy offline, immutable backups for all critical clinical systems with regular restoration testing. Ensure backup coverage includes EHR databases, PACS archives, laboratory information systems, and pharmacy management systems.
  8. Address dual compliance requirements proactively — For organizations operating across U.S. and EU jurisdictions, develop unified compliance frameworks addressing HIPAA, GDPR, and NIS2 requirements simultaneously rather than treating each regulation as a separate workstream.

Methodology

This assessment draws on Dark Angel's continuous monitoring of healthcare-targeted threat activity across multiple intelligence domains: ransomware leak site monitoring (tracking healthcare victim posts across 47 active leak sites), dark web marketplace analysis (monitoring PHI and credential listings), vulnerability intelligence (tracking disclosed CVEs affecting medical devices and healthcare IT systems), and regulatory filings (HHS breach reports, GDPR supervisory authority decisions, NIS2 transposition legislation). Statistical data reflects Dark Angel's proprietary analysis of 380+ healthcare security incidents from January 2023 through April 2025, supplemented by publicly reported incidents and industry surveys. Confidence assessments follow the Admiralty Code framework (reliability A-F, credibility 1-6).

Protect Your Healthcare Organization

Dark Angel provides specialized threat intelligence for healthcare organizations, including real-time monitoring of patient data exposure, medical device vulnerability tracking, and regulatory compliance intelligence.

Request a Healthcare Briefing

Related Reports