Healthcare ransomware reached crisis levels in 2024-2025, with attacks affecting 93% of healthcare organizations and causing billions in losses. The Ascension Health attack—resulting in a $1.8 billion operating loss and 5.6 million affected patients—exemplifies the sector’s vulnerability and the devastating consequences of successful intrusions.

Healthcare ransomware by the numbers

MetricValue
Healthcare orgs attacked (2024-2025)93%
Average incidents per organization43
Incidents disrupting patient care72%
EHR systems compromised52%
Average recovery time19-23 days
2024 healthcare breaches (US)725+
Individuals affected (2024)180+ million

Ascension Health attack deep dive

Organization profile

AttributeDetails
TypeNonprofit Catholic health system
Hospitals140
States19
Employees150,000+
Annual revenue$28 billion
RankOne of largest US health systems

Attack timeline

DateEvent
February 29, 2024Initial compromise via malicious file download
February-May 2024Attackers maintain access, move laterally
May 8, 2024IT team detects unusual network activity
May 8, 2024Core systems begin failing
May 9, 2024Ascension confirms ransomware attack
May 9, 2024EMS diversions begin
May-June 2024Paper-based operations across 140 hospitals
Late June 2024EHR systems restored (~6 weeks)
December 2024Full scope disclosed: 5.6M individuals affected
January 2025Second credit monitoring program launched

Root cause

FactorDetails
Initial accessEmployee downloaded malicious file
Dwell time~2 months before detection
AttackerBlack Basta ransomware group
Servers accessed7 of 25,000
Primary EHRNot directly compromised
Data stolenFiles from ancillary servers

Operational impact

SystemStatus during attackRecovery time
Electronic Health RecordsOffline~6 weeks
Pharmacy systemsOffline4+ weeks
LaboratoryDegraded3+ weeks
Radiology/imagingDegraded3+ weeks
SchedulingOffline3+ weeks
Revenue cycleDisruptedMonths

Patient care disruption

ImpactDetails
EMS diversionsAmbulances rerouted from affected facilities
Surgery postponementsElective procedures delayed
Medication verificationManual processes required
Paper chartingAll patient documentation
Test delaysLab and imaging backlogs
Volume decline8-12% reduction May-June 2024

Financial impact

CategoryAmount
FY2024 operating loss$1.8 billion
Volume decline impactSignificant (May-June)
Incident response costsNot disclosed separately
Credit monitoringTwo programs for 5.6M individuals
Legal exposureClass action lawsuits filed

Data breach scope

MetricValue
Individuals affected5,599,699
Breach rank (2024)Third largest healthcare
Data typesPHI from ancillary servers
NotificationDecember 2024

Black Basta profile

AttributeDetails
EmergenceEarly 2022
Suspected originConti ransomware offshoot
ModelDouble extortion (encrypt + steal)
Estimated extortion$100+ million since emergence
Primary languageRussian
Healthcare targetingFrequent

Black Basta tactics

TechniqueDescription
Initial accessPhishing, credential purchase, vulnerability exploitation
Lateral movementValid credentials, RDP
Data exfiltrationBefore encryption
EncryptionCustom ransomware
ExtortionLeak site threats
PaymentCryptocurrency

Major 2024-2025 healthcare attacks

OrganizationDateAttackerImpact
Change HealthcareFeb 2024ALPHV/BlackCat$22M ransom, 100M individuals, $2.5B+ costs
Ascension HealthMay 2024Black Basta$1.8B loss, 5.6M individuals
Kaiser Foundation2024Tracking breach13.4M individuals
Lurie Children’s HospitalJan 2024Unknown800,000 patients
CommonSpirit HealthOct 2022Unknown140 hospitals, $160M costs
Covenant Health2025Qilin480,000 patients

Why healthcare is targeted

FactorAttacker benefit
Life-safety urgencyPressure to pay quickly
High data valuePHI commands premium prices
Aging IT infrastructureMore vulnerabilities
Complex environmentsDifficult to secure
Regulatory pressureHIPAA violations add leverage
24/7 operationsDowntime intolerable
Limited security budgetsEspecially smaller facilities
Legacy medical devicesOften unpatchable

Attack evolution

Security researchers note concerning trends in healthcare ransomware:

TrendImplication
Backup targetingAttackers corrupt/encrypt backups first
Infrastructure destructionBeyond encryption to system damage
Longer dwell timesMore data exfiltration before detection
Third-party targetingAttack vendors to reach healthcare clients
AI-enhanced attacksMore sophisticated social engineering

“We will see more disruptive attacks masquerading as traditional ransomware events. Attackers shifting from simply encrypting data to corrupting backups, damaging infrastructure, or compromising clinical systems in ways that prolong downtime.”

Third-party risk

Third-party outages are emerging as the most significant operational resilience risk:

DependencyRisk
Cloud-hosted EHRVendor compromise affects all customers
Imaging platformsSingle points of failure
Revenue cycle managementFinancial operations disrupted
Telehealth servicesPatient access interrupted
Lab interfacesDiagnostic delays

The Change Healthcare attack demonstrated cascading impacts when a central service provider is compromised.

Regulatory response

HHS enforcement

YearHIPAA penalties
2024$42 million (record)
2025Trend continuing

OCR has increased enforcement actions specifically targeting organizations that failed to implement basic controls:

Control gapEnforcement focus
Missing MFAPriority target
Poor segmentationCited in settlements
Delayed patchingContributing factor
Inadequate backupsAggravating factor

HIPAA Security Rule update

The proposed rule (late 2025) would mandate:

RequirementCurrent status
MFA for all ePHI accessOften optional
Network segmentationRecommended, not required
Encryption (at rest and in transit)Limited exceptions
72-hour incident reporting to HHSNot currently required
Annual security risk assessmentsRequired but often inadequate
Mandatory vulnerability scanningNot currently specified
Patch management timelinesNot currently specified

Healthcare industry groups support the intent but raise concerns about compliance costs for smaller providers and rural hospitals.

Recommendations

For healthcare organizations

Technical controls

ControlPurpose
Offline, immutable backupsSurvive ransomware encryption
EDR on all devicesDetect lateral movement
MFA on all remote accessPrevent credential-based intrusion
Network segmentationLimit blast radius
Privileged access managementControl administrative credentials
Email securityBlock initial phishing attempts

Operational resilience

PracticeImplementation
Clinical continuity plansPaper-based procedures ready
Staff trainingDowntime procedure familiarity
Communication plansPatient and staff notification
Vendor relationshipsIR firms and law enforcement contacts
Tabletop exercisesTest EHR downtime regularly
Third-party assessmentEvaluate vendor security

For patients

If your healthcare provider experiences a ransomware attack:

ActionReason
Continue seeking careFacilities remain operational
Expect delaysManual processes are slower
Bring medicationsPaper records may not show current Rx
Monitor for identity theftHealthcare data is valuable
Review EOB statementsWatch for fraudulent claims
Enroll in credit monitoringIf offered by provider

Federal resources

AgencyResource
CISAHealthcare Cybersecurity Toolkit
HHS HC3Threat briefings and advisories
FBIIC3 reporting, field office coordination
H-ISACHealthcare sector information sharing

Healthcare organizations should build relationships with FBI and CISA field offices before an incident occurs.

Context

Healthcare ransomware is not a technology problem alone—it’s a patient safety crisis. The 72% of attacks that disrupt patient care represent real risks:

RiskConsequence
Delayed diagnosesWorse outcomes
Medication errorsPatient harm
Diverted ambulancesDelayed emergency care
Postponed proceduresDisease progression
Lost recordsCare continuity gaps

The proposed HIPAA Security Rule update acknowledges that voluntary security improvements have not kept pace with the threat. Mandatory controls, while costly, may be necessary to raise the baseline across an industry that remains critically vulnerable.

The Ascension attack—with its $1.8 billion loss, six-week recovery, and 5.6 million affected individuals—demonstrates the catastrophic potential of healthcare ransomware. Yet it was only the third-largest healthcare breach of 2024, behind Change Healthcare’s 100 million affected individuals.

Until healthcare organizations implement robust security controls and the industry develops genuine resilience, ransomware will continue to endanger both organizations and the patients who depend on them.