The Change Healthcare Cyberattack: A Case for a Distributed Approach to Healthcare Integration

March 28, 2024  |  Beth Crocker  |  ,

The Change Healthcare Cyberattack: A Case for a Distributed Approach to Healthcare Integration

On February 21st, Change Healthcare – a titan in the healthcare sector – experienced one of the worst cyber-attacks in recent history, bringing the industry to its knees, disrupting patient care, and cutting off critical cashflow for millions of providers.  According to an AHA survey, 94% of hospitals are experiencing financial impact from the incident, with more than half reporting “significant or serious” impact. We extend our sympathies to Change Healthcare, and the businesses, providers and patients affected by this attack.  

While the devastating consequences of cyberattacks have become all too familiar in the healthcare industry, this cyber assault didn’t just disrupt operations; it tore through the very fabric of the industry, halting workflow, leaving providers without access to critical patient information, and cutting off cashflow to hospitals, clinics, and a vast network of ancillary providers such as labs, imaging, pharmacies and so on.  

The aftermath of this catastrophic outage underscores a critical imperative: the pressing need for a new distributed approach to integration to safeguard against pervasive threats to healthcare. 

Change Healthcare is the nation’s largest provider of revenue and payment cycle management solutions, connecting payers, providers, and patients across the U.S. healthcare ecosystem via a comprehensive network of connected systems and data. As Washington Post writer Joseph Menn wrote, “[a] single medical service can feature innumerable participants — doctors and hospitals, insurance companies, drugmakers, pharmacies and platforms like Change Healthcare — all of which connect electronically. That makes each piece, with its own technology and priorities, a potential gateway to the whole medical universe. So, when hackers break into providers or others, encrypting health and billing records and demanding money to unlock them, they can also get into adjacent targets.” 

A ransomware attack on a company like Change Healthcare not only has the potential to expose millions of patients’ personal and medical information, but it can also render the software and systems connected to the software unusable for an extended period of time. In this case, the attack cut off the digital bridge that connects providers to their insurance payment system. Attacks like this one exploit vulnerabilities within a centralized integration system, enabling hackers to block access to critical information, often in exchange for a hefty ransom. In these instances, relying on a single behemoth centralized integration model, with countless entry points, can pose a significant risk to all users, leaving the healthcare industry vulnerable. 

Why did this attack happen, and what lessons can we learn from it? 

1. The healthcare industry is a prime target for cybercriminals due to the vast amount of valuable data it holds.  

  • Patient records, medical histories, and financial information are incredibly lucrative on the black market, making healthcare organizations attractive targets. 
  • With the increasing digitization of healthcare systems and the adoption of electronic health records (EHRs), the attack surface has expanded, providing adversaries with more entry points to exploit. 

2. Centralized integration systems present a single point of failure where a single hack can cause a multi-billion dollar impact.  

  • By concentrating critical data and workflows within a central infrastructure, organizations become more susceptible to large-scale breaches.  
  • Cybercriminals understand this vulnerability and target centralized systems precisely for their high-value payload potential.  
  • In the case of Change Healthcare, the attackers exploited weaknesses in the centralized integration architecture to gain initial access, and wreak havoc. 

3. The healthcare industry would benefit from adopting a distributed approach to integration.  

  • Unlike centralized systems, which consolidate data and processes into a single repository, distributed integration disperses these components across multiple nodes or endpoints.  
  • Decentralization offers several advantages in terms of cybersecurity resilience and operational efficiency including data minimization and granular access control 

Shadowbox approaches integration by isolating the exchange of data to the single desktop of an authenticated user.   Our technology facilitates the transfer of sensitive information from healthcare systems like Electronic Health Records (EHRs), Revenue Cycle Management (RCM), Laboratory Information Management Systems (LIMS), and the like, limiting the sharing of data to the end user’s machine.  Transferred data is never stored, and the exchange is completely localized. 

“A distributed integration approach reduces the impact of a potential breach by compartmentalizing data and workflows,” shared Shadowbox Executive VP, Engineering, Emily Deere. “Even if one node is compromised, the damage is limited to that specific segment, preventing hackers from accessing the entire system. This isolation mechanism enhances our security posture and mitigates the risk of large-scale data breaches, not only for Shadowbox, but for our clients and their clients.” 

Distributed integration not only mitigates large-scale security breaches, but also fosters agility and scalability, allowing organizations to adapt to evolving business needs and technological advancements, at a fraction of the cost. With the federal government contemplating stricter cybersecurity policies in the wake of the Change Healthcare incident, cash strapped providers will be forced to tighten their security processes. By leveraging Shadowbox’s microservices architecture and containerization, companies can build modular, interoperable systems that facilitate seamless communication between disparate applications and platforms, without increasing their vulnerability. This flexibility enables faster development cycles, easier maintenance, and greater innovation potential. 

Additionally, distributed integration enhances data privacy and regulatory compliance by adhering to principles such as data minimization and granular access control. With sensitive information distributed across multiple endpoints, organizations can implement stringent security measures tailored to each data segment, reducing the likelihood of regulatory violations and penalties. 

The cyberattack on Change Healthcare serves as a stark reminder of the cybersecurity challenges facing the healthcare industry. To mitigate risks and safeguard sensitive data, businesses must embrace a distributed approach to integration that prioritizes resilience, agility, and compliance. By decentralizing critical infrastructure and adopting modern architectural paradigms, companies can fortify their defenses against evolving cyber threats and build a more secure future for healthcare and beyond. 

Beth is co-founder and CFO of Shadowbox. She has spent over three decades leading finance teams for tech companies, including Rovi Corporation (now Tivo), McAfee, CrossWorlds Software, uCast Global, and IDG Books Worldwide and provided M&A services for public companies such as Digital Realty and PriceSmart. Her track record includes two successful IPOs and over 30 M&A transactions.

Additional articles by Beth Crocker