Advertisement
Canada markets close in 12 minutes
  • S&P/TSX

    22,278.67
    -6.09 (-0.03%)
     
  • S&P 500

    5,302.01
    -6.14 (-0.12%)
     
  • DOW

    39,919.67
    +11.67 (+0.03%)
     
  • CAD/USD

    0.7344
    -0.0007 (-0.09%)
     
  • CRUDE OIL

    79.33
    +0.70 (+0.89%)
     
  • Bitcoin CAD

    88,817.02
    -1,655.14 (-1.83%)
     
  • CMC Crypto 200

    1,378.22
    -15.83 (-1.14%)
     
  • GOLD FUTURES

    2,383.90
    -11.00 (-0.46%)
     
  • RUSSELL 2000

    2,099.64
    -9.82 (-0.47%)
     
  • 10-Yr Bond

    4.3770
    +0.0210 (+0.48%)
     
  • NASDAQ

    16,708.82
    -33.57 (-0.20%)
     
  • VOLATILITY

    12.39
    -0.06 (-0.48%)
     
  • FTSE

    8,438.65
    -7.15 (-0.08%)
     
  • NIKKEI 225

    38,920.26
    +534.53 (+1.39%)
     
  • CAD/EUR

    0.6755
    +0.0005 (+0.07%)
     

UnitedHealth hackers used stolen login credentials to break in, CEO says

FILE PHOTO: The corporate logo of the UnitedHealth Group appears on the side of one of their office buildings in Santa Ana, California

(This April 29 story has been corrected to fix the headline and paragraph 1, and updated to clarify the breach occurred due to stolen credentials, not a Citrix vulnerability, in paragraphs 5 and 6)

By Zeba Siddiqui

SAN FRANCISCO (Reuters) - Hackers breached UnitedHealth's tech unit on Feb. 12 by using stolen login credentials that gave them remote access to its network, the largest U.S. health insurer will testify before a House panel this week.

UnitedHealth CEO Andrew Witty's testimony before the House Energy and Commerce Committee will follow weeks of disruption to American healthcare since the insurer's Change Healthcare unit was hacked.

ADVERTISEMENT

On the morning of Feb. 21, the cybercriminal gang AlphV, aka BlackCat, locked up Change Healthcare's systems and demanded a ransom to unlock them, Witty will tell the House panel, according to a copy of his written testimony posted to the panel's website on Monday.

"Not knowing the entry point of the attack at the time, we immediately severed connectivity with Change’s data centers to eliminate the potential for further infection," the testimony says.

The criminals used compromised login credentials to remotely access a Change Healthcare Citrix portal that did not have multi-factor authentication, according to the testimony. That portal, offered by the private tech company Citrix Systems, allows for remote access to an organisation's desktops.

Multi-factor authentication is a widely prescribed layer of security that prevents hackers from using stolen passwords to break into systems. It's unclear why the Change Healthcare portal did not have this security measure, and a UnitedHealth spokesperson did not respond to questions about it.

A Citrix spokesman didn't immediately respond to a request for comment. U.S. officials issued multiple warnings about security loopholes in Citrix tools late last year, some of which were being used to breach healthcare groups.

The hearing before the panel's subcommittee on oversight and investigations will focus on the cyberattack's impact on patients and providers.

UnitedHealth has been working with the FBI and prominent cybersecurity firms to investigate the hack. Security experts from Google, Microsoft, Cisco and Amazon worked with teams from Mandiant and Palo Alto Networks to secure Change Healthcare's systems after the breach, according to the testimony.

Last week, Witty said the company had paid the hackers a ransom to ensure the decryption of Change Healthcare's systems, although the size of the payment is not known.

The company has been scrambling to contain the hit to healthcare payment processing across the country. Change processes 50% of all medical claims in the United States.

As of April 26, UnitedHealth Group had provided more than $6.5 billion in accelerated payments and no-interest, no-fee loans to thousands of healthcare providers, according to Witty's testimony.

(Reporting by Zeba Siddiqui in San Francisco; Editing by Michael Erman)