UnitedHealth hackers took advantage of Citrix vulnerabilty to break in, CEO says


FILE PHOTO: The corporate logo of the UnitedHealth Group appears on the side of one of their office buildings in Santa Ana, California, U.S., April 13, 2020. REUTERS/Mike Blake/File Photo

SAN FRANCISCO (Reuters) - Hackers broke into UnitedHealth's tech unit on Feb. 12 by exploiting a security vulnerability in software from private IT company Citrix that allows employees remote access to their desktop computers, the largest U.S. health insurer will testify before a House panel this week.

UnitedHealth CEO Andrew Witty's testimony before the House Energy and Commerce Committee, slated for Wednesday, will follow weeks of disruption to American healthcare since the insurer's Change Healthcare unit was hacked.

On the morning of Feb. 21, the cybercriminal gang AlphV, aka BlackCat, locked up Change Healthcare's systems and demanded a ransom to unlock them, Witty will tell the House panel, according to a copy of his written testimony posted to the panel's website on Monday.

"Not knowing the entry point of the attack at the time, we immediately severed connectivity with Change’s data centers to eliminate the potential for further infection," the testimony says.

The criminals used compromised login credentials to remotely access a Change Healthcare Citrix portal that did not have multi-factor authentication, according to the testimony.

A Citrix spokesman didn't immediately respond to a request for comment. It's unclear which specific security flaw at Citrix was exploited by AlphV, but U.S. officials issued multiple warnings about security loopholes in Citrix tools late last year, some of which were being used to breach healthcare groups.

The hearing before the panel's subcommittee on oversight and investigations will focus on the cyberattack's impact on patients and providers.

UnitedHealth has been working with the FBI and prominent cybersecurity firms to investigate the hack. Security experts from Google , Microsoft , Cisco and Amazon worked with teams from Mandiant and Palo Alto Networks to secure Change Healthcare's systems after the breach, according to the testimony.

Last week, Witty said the company had paid the hackers a ransom to ensure the decryption of Change Healthcare's systems, although the size of the payment is not known.

The company has been scrambling to contain the hit to healthcare payment processing across the country. Change processes 50% of all medical claims in the United States.

As of April 26, UnitedHealth Group had provided more than $6.5 billion in accelerated payments and no-interest, no-fee loans to thousands of health-care providers, according to Witty's testimony.

(Reporting by Zeba Siddiqui in San Francisco; Editing by Michael Erman)

Follow us on our official WhatsApp channel for breaking news alerts and key updates!

   

Next In Tech News

US sues Photoshop maker Adobe for hiding fees, making it hard to cancel
Tesla sues ex-supplier Matthews over EV battery trade secrets
Tesla kicks off legal fight to reinstate Musk's pay
YouTube tests context 'notes' feature for videos
US Surgeon General calls for social media warning labels to protect adolescents
Starboard Value discloses Autodesk stake, plans lawsuit to delay annual meeting
US Supreme Court to hear Nvidia bid to scuttle shareholder lawsuit
You.com startup is raising $50 million as it targets AI-assistant market, says source
Naver's Webtoon Entertainment aims up to $2.67 billion valuation in US IPO
GameStop's fans await shareholder meeting, after high demand derailed first attempt

Others Also Read