The numbers are staggering. The consequences are deadly. In 2025, ransomware groups launched 1,174 publicly disclosed attacks—a 49% year-over-year increase—and healthcare bore the heaviest burden. With 22% of all ransomware attacks targeting medical organizations, hospitals and health systems have become ground zero for cybercrime. But this isn’t just a story about encrypted files and ransom demands. It’s about patients who can’t get chemotherapy treatments. Emergency rooms that divert ambulances. Medical records sold to criminals who exploit vulnerable people for decades. This is the healthcare ransomware crisis of 2026, and the stakes are literal lives.


Executive Summary

The healthcare sector experienced its most devastating year for ransomware in 2025. According to BlackFog’s 2025 State of Ransomware Report, publicly disclosed ransomware attacks surged 49% year-over-year to a record 1,174 incidents globally. Healthcare accounts for 22% of all disclosed ransomware attacks, making it the single most-targeted sector for cybercriminals.

The consequences extend far beyond financial damage. Ransomware attacks on healthcare organizations cause:

  • 67% of incidents result in longer patient hospital stays
  • 50% of attacks force emergency department diversions
  • 19 days average of treatment disruptions per incident
  • 35-40% of breached small practices close within two years

Major 2025-2026 breaches include the catastrophic Conduent incident affecting 25+ million Americans, the ApolloMD breach impacting 626,540 patients, and the still-reverberating Change Healthcare attack that exposed 192.7 million records—the largest healthcare breach in U.S. history.

HHS enforcement is intensifying, with 8 of 14 enforcement actions in 2025 directly involving ransomware attacks. The proposed 2026 HIPAA Security Rule update would mandate MFA, encryption, and network segmentation—transforming recommendations into requirements.

This article examines the scope of the crisis, profiles major breaches, explains why healthcare remains the top target, documents the human cost, analyzes the regulatory response, and provides actionable defense recommendations.


Part I: The Crisis in Numbers

49% Year-Over-Year Increase

BlackFog’s 2025 State of Ransomware Report presents a sobering picture of ransomware’s explosive growth. The headline statistic—1,174 publicly disclosed ransomware attacks in 2025—represents a 49% increase from the previous year. But this number tells only part of the story.

The reality is far worse. According to BlackFog’s analysis, an estimated 86% of ransomware attacks are never publicly disclosed. When factoring in attacks announced only on dark web leak sites, the true scale reaches approximately 7,079 victims in 2025 alone.

“The global impact of ransomware across 2025 has been unprecedented. From high street chains to hospitals, ransomware doesn’t respect borders, the size of organization, or the sector you’re in. It’s brought vital services, established companies—and the smaller partners who depend on them—to a grinding halt.”

Dr. Darren Williams, Founder and CEO of BlackFog

The ransomware ecosystem is also becoming more diverse. In 2025, 130 different ransomware groups carried out attacks—with 52 new groups emerging during the year alone, a 9% increase from 2024. This proliferation reflects the continued profitability of the ransomware-as-a-service model and lowers barriers to entry for cybercriminals.

Healthcare: 22% of All Attacks

When examining ransomware targeting by sector, healthcare stands alone at the top. The sector absorbs 22% of all publicly disclosed ransomware attacks, making it the most-targeted vertical industry globally.

SectorShare of Disclosed AttacksYear-Over-Year Trend
Healthcare22%Consistently #1
ServicesGrowing+118% YoY (largest increase)
RetailGrowingHigh-profile luxury brand attacks
EducationDeclining-12% YoY (only sector with decrease)

Within healthcare, the targeting patterns reveal nuanced trends:

  • Healthcare provider attacks remained consistent: 437 in 2024 → 445 in 2025
  • Healthcare business attacks increased 25%: 153 in 2024 → 191 in 2025
  • Q4 2025 alone saw 190 healthcare ransomware incidents—the highest quarterly total recorded

This shift toward healthcare businesses—vendors, service providers, billing companies, and technology partners—reflects attackers’ recognition that supply chain compromises offer greater returns. A single healthcare business breach can cascade across hundreds of hospitals and millions of patients.

Geographic Distribution

The United States bears the overwhelming burden of healthcare ransomware attacks:

Healthcare Providers:

Country2025 AttacksYear-Over-Year Change
United States29266% of total
Australia16+60%
United Kingdom12Flat
Germany11-35%
France10+150%
Canada10-44%

Healthcare Businesses:

Country2025 Attacks
United States97
India9
Italy8
Canada8
Germany6
Spain5

Most Active Ransomware Groups Targeting Healthcare

GroupHealthcare Provider ClaimsHealthcare Business ClaimsTotal
Qilin663096
INC451257
SafePay2929
Sinobi2424
Akira1919
Medusa1818

Part II: Major Breaches - The Damage Done

Conduent: 25+ Million Americans Exposed

In January 2025, SafePay ransomware breached Conduent, a major government services technology provider. Initial reports suggested approximately 4 million affected individuals in Texas. Then the numbers began to climb.

By February 2026, the true scope emerged:

  • Texas: 15.4 million individuals affected (revised from 4 million)
  • Oregon: 10.5 million individuals affected
  • Additional states: Delaware, Massachusetts, New Hampshire, and others report hundreds of thousands each
  • Total: 25+ million Americans with sensitive data stolen

The SafePay group exfiltrated 8.5 terabytes of data including:

  • Full names and Social Security Numbers
  • Medical diagnoses and treatment records
  • Health insurance information
  • Addresses and contact information

The Conduent breach exemplifies the third-party risk nightmare: a single vendor compromise affects government programs across multiple states, exposing tens of millions of Americans who never directly interacted with the breached company.

Change Healthcare: The $22 Million Ransom and 192.7 Million Records

While technically occurring in February 2024, the Change Healthcare breach cast a long shadow over 2025 and remains the largest healthcare data breach in American history.

The Attack Timeline:

  1. Initial access: BlackCat/ALPHV ransomware operators accessed a remote access server lacking multi-factor authentication
  2. Lateral movement: 9 days of undetected movement through Change Healthcare’s network
  3. Data exfiltration: 6 terabytes of highly sensitive data stolen
  4. Ransomware deployment: Systems encrypted, operations halted
  5. Ransom payment: UnitedHealth Group (Change Healthcare’s parent) paid $22 million
  6. Recovery: Months of disruption to U.S. healthcare claims processing

The Aftermath:

  • 192.7 million individuals affected—the most ever from a single healthcare breach
  • Pharmacy operations disrupted nationwide
  • Claims processing halted for weeks
  • Small medical practices faced cash flow crises
  • Some practices were unable to pay staff
  • Regulatory investigations continue

The Change Healthcare attack demonstrated how a single vulnerability—one server without MFA—can threaten the operational viability of the entire U.S. healthcare system.

ApolloMD: 626,540 Patients Across 11 Practices

On May 22-23, 2025, Qilin ransomware operators breached ApolloMD, a physician staffing and practice management company. The attack exposed 626,540 patients across 11 affiliated physician practices.

The 4-month gap between Qilin’s public announcement and patient notification raises serious questions about breach disclosure practices. During those 120+ days, stolen patient data could be—and likely was—monetized on criminal markets while affected individuals remained unaware.


Part III: Why Healthcare Remains Ground Zero

The $260 Medical Record: Dark Web Economics

Why do ransomware groups disproportionately target healthcare? The answer lies in the unique value proposition of medical data.

Dark Web Data Pricing Comparison:

Data TypeDark Web PriceExploitation Window
Credit card (with CVV)$10-$40Hours to days
Social Security Number$1-$6Weeks
Email/password combo$5-$15Weeks
”Fullz” identity package$20-$100Months
Complete medical record$260-$500+Years to decades

Medical records command a 10x premium over credit cards for a simple reason: they are permanent and immutable. You cannot change your Social Security Number, date of birth, medical history, biometric markers, or insurance identifiers.

This permanence enables “long-tail fraud”—criminal exploitation that recurs for years or decades after the initial breach.

The AI Amplification Effect:

2025 saw AI dramatically increase the exploitation value of stolen medical records:

  • Voice cloning fraud: +475% YoY success rate
  • Synthetic identity creation: +27% fraud value per SSN
  • AI-enhanced phishing: +40% click-through rate

Operational Pressure: When Downtime Threatens Lives

Unlike retailers who can temporarily close stores or manufacturers who can halt production lines, hospitals cannot simply “go offline.” When ransomware strikes a hospital:

  • Emergency departments may close or divert patients
  • Critical surgeries get postponed
  • Chemotherapy treatments are delayed
  • Medication dispensing becomes manual and error-prone
  • Diagnostic imaging goes dark
  • Laboratory results are unavailable

Documented Patient Care Impacts:

ImpactPercentage of Incidents
Longer patient hospital stays67%
Patient diversions to other facilities50%
Procedures or tests delayed64%
Increases in patient complications17%
Increases in patient mortalityDocumented in multiple studies

The average healthcare ransomware incident causes 19 days of emergency department closures or significant treatment delays.

Financial Devastation:

  • Average healthcare breach cost: $9.8-10 million (highest across any sector for 14 consecutive years)
  • 35-40% of breached small practices close within two years
  • Notable permanent closures: Wood Ranch Medical, ENT Clinic of Michigan, and others

Legacy Systems and the Medical Device Nightmare

Internet of Medical Things (IoMT) Vulnerability Statistics:

MetricFinding
Hospitals with vulnerable IoMT99% have at least one KEV device
Vulnerabilities per device6.2 average
End-of-life devices60% no longer receive patches
Default/weak passwords21% of devices
Devices with known critical CVE53%
Devices supporting endpoint securityOnly 13%
Publicly accessible medical devices1.2 million (3x growth since 2021)

Third-Party and Supply Chain Risk

  • 76%+ of medical devices are impacted by third-party vulnerabilities
  • Over 80% of stolen PHI records were stolen from third-party vendors, not hospitals directly
  • Over 90% of hacked health records are stolen outside the EHR system

Part IV: The Human Cost - When Cybersecurity Becomes Life Safety

The 213-Day Window

Healthcare organizations take longer to identify and contain breaches than any other sector:

MetricHealthcare Average
Time to identify breach93 days
Time to contain breach120 days
Total breach lifecycle213 days

For more than seven months, on average, patient data circulates through criminal networks while victims remain unaware.

“Every day of delayed disclosure is a day stolen identities are monetized. Every vague notification leaves patients defenseless. Every quarter of regulatory silence sustains a billion-dollar black market.”

Patient Protect, 2025

Small Practices: Death by Ransomware

While headlines focus on hospital system breaches, small practices face existential threats:

  • 35-40% of breached small practices close within two years
  • Limited IT resources make recovery difficult
  • Insurance coverage may be inadequate
  • Patient trust, once lost, doesn’t return
  • Regulatory penalties add to financial strain

Part V: HIPAA and HHS Enforcement - The Regulatory Response

2025 Enforcement Statistics

The HHS Office for Civil Rights (OCR) dramatically increased enforcement activity in 2025:

Metric2025 Data
Average enforcement fine$486,000
Enforcement actions citing ransomware8 of 14 (57%)
Actions citing Risk Analysis failure12 of 14 (86%)
Penalty range$25,000 - $3,000,000
Total ransomware enforcement actions to date15

A consistent theme emerges from enforcement actions: ransomware attacks trigger investigations, but the penalties result from underlying compliance failures—particularly the absence of comprehensive risk analyses.

Proposed 2026 HIPAA Security Rule Updates

On January 6, 2025, HHS published proposed updates to the HIPAA Security Rule—the most significant revision since the rule’s inception. The comment period closed March 7, 2025, with a final rule expected in May 2026 and a compliance deadline 6 months after publication.

Key Proposed Requirements:

ControlCurrent StatusProposed Status
Multi-factor authentication (MFA)AddressableMANDATORY
Encryption (at rest and in transit)AddressableMANDATORY
Network segmentationNot specifiedMANDATORY
Regular penetration testingNot specifiedMANDATORY
Anti-malware softwareAddressableMANDATORY
Data backup and recoveryAddressableMANDATORY
Real-time monitoringNot specifiedMANDATORY
Software Bill of Materials (SBOM)Not specifiedRequired for medical devices

The rule would transform many “addressable” safeguards—which organizations could decline to implement with documented justification—into absolute requirements.

What Regulators Look For

Organizations preparing for potential HHS investigation should understand the enforcement focus areas:

  1. Enterprise-wide Risk Analysis: The #1 cited violation. OCR expects documented, comprehensive assessment of all systems containing ePHI.
  2. Risk Management Plans: Identifying risks isn’t sufficient; organizations must document and implement plans to address identified vulnerabilities.
  3. Access Controls: Particularly MFA. The Change Healthcare breach began with a single server lacking MFA.
  4. Encryption: Both data at rest and in transit.
  5. Staff Training: Documented, regular security awareness training.
  6. Business Associate Agreements: Proper contracts with all vendors handling PHI.
  7. Incident Response Plans: Documented procedures for breach detection, containment, and notification.

Part VI: Defense Recommendations - Building Resilience

Tier 1: Immediate/Foundational Controls

Multi-Factor Authentication (MFA)

The Change Healthcare breach began with a single server lacking MFA. This vulnerability enabled a $22 million ransom payment and the largest healthcare breach in history.

Implementation Priorities:

  • Mandate MFA everywhere—no exceptions for “internal” or “legacy” systems
  • Deploy phishing-resistant MFA (FIDO2/WebAuthn) where possible
  • Implement context-aware MFA that triggers additional verification for unusual locations, devices, or access patterns
  • Eliminate SMS-based MFA (susceptible to SIM swapping) for high-privilege accounts

Network Segmentation

Implementation Priorities:

  • Isolate medical devices onto dedicated VLANs with restricted communication paths
  • Segment clinical networks from administrative networks
  • Separate guest WiFi from all internal networks
  • Implement microsegmentation for high-value systems
  • Apply zero trust architecture principles

Backup and Recovery

Implementation Priorities:

  • Deploy immutable backup solutions that prevent encryption or deletion
  • Maintain offline/air-gapped backup copies physically disconnected from production networks
  • Test recovery procedures quarterly—untested backups aren’t backups
  • Ensure backup administration paths are isolated and require separate MFA

Tier 2: Risk Management and Visibility

Enterprise Risk Analysis

With 86% of enforcement actions citing risk analysis failures, this is both a security and compliance imperative.

Third-Party Risk Management

Over 80% of stolen PHI comes from third-party vendors. Your security is only as strong as your weakest vendor.

Implementation Priorities:

  • Inventory all business associates and vendors with PHI access
  • Verify vendor security controls through questionnaires, audits, or certifications
  • Require SOC 2 Type II or equivalent attestations
  • Implement least privilege access for all third parties
  • Use time-bound access with automatic expiration

Continuous Monitoring

  • Deploy Endpoint Detection and Response (EDR) on all systems supporting it
  • Implement Security Information and Event Management (SIEM) for log correlation
  • Establish or contract 24/7 Security Operations Center (SOC) monitoring
  • Deploy specialized IoMT monitoring platforms (Claroty, Cynerio, Medigate)

Tier 3: Medical Device Security

  • Create comprehensive inventory of all IoMT devices
  • Identify and prioritize end-of-life devices for replacement
  • Change all default passwords—21% of devices still use factory defaults
  • Conduct specialized IoMT penetration testing annually

Tier 4: Organizational Resilience

  • Develop IoMT-specific incident response plans addressing clinical continuity
  • Practice tabletop exercises quarterly with both clinical and administrative staff
  • Recognize that phishing-resistant MFA > phishing simulation training
  • Document regular penetration testing for cyber insurance requirements
  1. HHS Cybersecurity Performance Goals (CPGs): Developed with AHA and HSCC, tailored for healthcare
  2. Healthcare Industry Cybersecurity Practices (HICP): CISA and HHS collaboration
  3. NIST Cybersecurity Framework 2.0: Comprehensive risk management guidance
  4. IEC 81001-5-1: Medical device security standard

“If you follow a good cybersecurity framework and develop a program around general security, any regulation that comes out, you’re going to be OK with.”

Monte Coulter, CISO, OU Health


Part VII: Looking Forward - What 2026 Holds

Regulatory Evolution

The proposed HIPAA Security Rule updates will likely become final in mid-2026, with a 6-month compliance window. Organizations should:

  • Begin implementing MFA, encryption, and segmentation now
  • Document current security posture to establish baseline
  • Budget for necessary technology and staffing investments

Threat Evolution

AI-Enhanced Attacks: Ransomware groups are adopting AI to generate more convincing phishing content, automate victim research and targeting, and scale operations while reducing personnel.

Supply Chain Focus: Following successful attacks on Change Healthcare and Conduent, expect continued focus on healthcare technology vendors, billing and claims processors, and cloud service providers.

Nation-State Involvement: Healthcare infrastructure increasingly attracts nation-state attention for intelligence collection, economic disruption, and research theft.


Conclusion: Security Is Patient Safety

The numbers are stark: 1,174 ransomware attacks publicly disclosed in 2025. A 49% year-over-year increase. Healthcare absorbing 22% of all attacks. Tens of millions of patient records stolen. Emergency departments closed. Treatments delayed. Lives endangered.

But this is not a problem without solutions. The controls that prevent ransomware attacks are well-understood: multi-factor authentication, network segmentation, immutable backups, risk analysis, vendor management. The challenge is implementation—and the will to prioritize security investment.

For healthcare organizations, cybersecurity has transcended IT concerns to become a patient safety imperative. Every dollar invested in security controls is a dollar invested in protecting patients.

The regulatory environment is evolving to match the threat landscape. Organizations that implement these controls now will be ahead of compliance requirements. Those that delay will face both increased breach risk and regulatory exposure.

The criminals targeting healthcare have made their priorities clear. The question for healthcare organizations is whether they will match that intensity in defense.

The stakes, after all, are literal lives.


References and Further Reading

Primary Research Sources

  1. BlackFog 2025 State of Ransomware Report
  2. Health-ISAC Q4 2025 Threat Report
  3. Comparitech Healthcare Ransomware Roundup 2025
  4. HIPAA Journal Healthcare Sector Analysis

Regulatory Guidance

  1. HHS HIPAA Security Rule NPRM (January 2025)
  2. Ogletree Enforcement Trends 2025
  3. AHA 2025 Cybersecurity Year in Review

Defense Frameworks

  1. HHS Cybersecurity Performance Goals (CPGs)
  2. Healthcare Industry Cybersecurity Practices (HICP)
  3. NIST Cybersecurity Framework 2.0
  4. IEC 81001-5-1 Medical Device Security Standard

This article is provided for informational purposes only and does not constitute legal or compliance advice. Organizations should consult qualified legal counsel and compliance professionals for guidance on HIPAA requirements and regulatory obligations.