UnitedHealth Group experienced a significant cybersecurity breach, primarily attributed to hackers exploiting vulnerabilities in Citrix software and using stolen credentials to access the Change Healthcare systems. The breach, which occurred on February 12, was facilitated by the absence of multifactor authentication (MFA), a critical security measure. UnitedHealth CEO Andrew Witty disclosed these details during a congressional testimony and in various statements. The cyberattack, which involved a ransomware attack and allowed hackers to lurk in the network for nine days, had severe repercussions, including forcing some healthcare providers to use personal savings to maintain operations due to disrupted payments.
UnitedHealth CEO Says Hackers Lurked in Network for Nine Days Before Ransomware Strike #cybersecurity https://t.co/PZv8qIzb6V
UnitedHealth CEO Andrew Witty defended the company’s response to a disastrous cyberattack that snarled payments for doctors in the first of back-to-back hearings in Washington https://t.co/G7vYHf7iBf
UnitedHealth hackers used stolen login credentials to break in, CEO says https://t.co/CKWehgm99T https://t.co/UluGZUdYD8
Change Healthcare hacked through stolen password for account with no MFA https://t.co/4T6KZJfvDo
Change Healthcare Hackers Broke In Using Stolen Credentials, No MFA https://t.co/xK6rXUuhhC
UnitedHealth Group CEO Andrew Witty says threat actors used compromised credentials to remotely access a @Change_HC Citrix portal — a portal that lacked multifactor authentication (MFA), a basic tenet of #cybersecurity. #infosec #ITsecurity https://t.co/tvj1GZlrvG
UnitedHealth: Hackers Exploited Remote-Access Software for Ransomware Attack https://t.co/gOJyFn4BIS
Cyberattack on UnitedHealth firm forces doctors to dig into personal savings to stay afloat https://t.co/eWock5cF50
Change Healthcare hacked using stolen Citrix account with no MFA https://t.co/JBXEsc7UfV
NEW: The ransomware gang that hacked into U.S. health tech giant Change Healthcare used a set of stolen credentials to remotely access company systems. These systems were not protected by MFA, according to the CEO of its parent company UnitedHealth. https://t.co/9XaBJO7n6R
Change Healthcare hackers broke in using stolen credentials — and no MFA, says UHG CEO: https://t.co/xkI3r9C7oA by TechCrunch #infosec #cybersecurity #technology #news
Change Healthcare hackers broke in using stolen credentials — and no MFA, says UHG CEO https://t.co/by9rdodhZd
In Congressional testimony, UnitedHealth CEO Andrew Witty plans to say that hackers exploited a Citrix vulnerability to breach UnitedHealth on February 12 (@zebatweets / Reuters) https://t.co/j37qbZkb8y 📫 Subscribe: https://t.co/OyWeKSRpIM https://t.co/RqJ01QqC0p
UnitedHealth hackers took advantage of Citrix vulnerabilty to break in, CEO says https://t.co/Lh4CanGt7x https://t.co/D0kQl69XSb