Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

Change Healthcare cyberattack was due to a lack of multifactor authentication, UnitedHealth CEO says

The beginning of the Change Healthcare cyberattack happened when hackers entered a server that lacked multifactor authentication

Tom Murphy
Wednesday 01 May 2024 13:10 EDT

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

The Change Healthcare cyberattack that disrupted health care systems nationwide earlier this year started when hackers entered a server that lacked a basic form of security: multifactor authentication.

UnitedHealth CEO Andrew Witty said Wednesday in a U.S. Senate hearing that his company, which owns Change Healthcare, is still trying to understand why the server did not have the additional protection.

His admission did not sit well with Senate Finance Committee members who spent more than two hours questioning the CEO about the attack and broader health care issues.

“This hack could have been stopped with cybersecurity 101,” Oregon Democratic Sen. Ron Wyden told Witty.

Multifactor authentication adds a second layer of security to password-protected accounts by having users enter an auto-generated code. It’s common on apps protecting sensitive data like bank accounts and meant to guard against hackers guessing passwords.

Hackers gained access to Change Healthcare in February and unleashed a ransomware attack that encrypted and froze large parts of the company’s system, Witty said. The attack disrupted payment and claims processing around the country, stressing doctor’s offices and health care systems by interfering with their ability to file claims and get paid.

While UnitedHealth quickly disconnected the affected systems to limit damage and paid a $22 million ransom, Witty said. The company is still recovering.

“We’ve literally built this platform back from scratch so that we can reassure people that there are not elements of the old attacked environment within the new technology," Witty said.

Witty told senators that the company was in the process of upgrading Change’s technology, and he was “incredibly frustrated” to learn about the lack of multifactor authentication, which is a standard across UnitedHealth.

In March, the Office for Civil Rights said it would investigate whether protected health information was exposed and whether Change Healthcare followed laws protecting patient privacy. The company said earlier this month that personal information that could cover a “substantial portion of people in America” may have been taken in the attack. But company officials have said they see no signs that doctor charts or full medical histories were released after the attack.

Witty also told senators he was “deeply, deeply sorry,” and the company would not rest until the problem had been fixed.

Change Healthcare provides technology used to submit and process insurance claims — about 14 billion transactions a year. UnitedHealth bought Change Healthcare in a roughly $8 billion deal that closed in 2022.

___

The Associated Press Health and Science Department receives support from the Howard Hughes Medical Institute’s Science and Educational Media Group. The AP is solely responsible for all content.

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in