Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues. Wherever and whenever people need us, we help them with their health – whether that’s managing chronic diseases, staying compliant with their medications or accessing affordable health and wellness services in the most convenient ways. We help people navigate the health care system – and their personal health care – by simplifying health care one person, one family and one community at a time. Follow @CVSHealth on social media.

CVS Health A.I CyberSecurity Scoring

CVS Health

Company Details

Linkedin ID:

cvshealth

Employees number:

135,996

Number of followers:

1,176,454

NAICS:

62

Industry Type:

Hospitals and Health Care

Homepage:

CVSHealth.com

IP Addresses:

745

Company ID:

CVS_1623111

Scan Status:

Completed

AI scoreCVS Health Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/cvshealth.jpeg
CVS Health Hospitals and Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreCVS Health Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/cvshealth.jpeg
CVS Health Hospitals and Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CVS Health Company CyberSecurity News & History

Past Incidents
6
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Aetna, a CVS Health CompanyBreach85412/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Landmark Settlement Forces Aetna to Cover Fertility Treatments for Same-Sex Couples Nationwide In a groundbreaking legal victory, U.S. District Judge Haywood Gilliam Jr. approved a preliminary settlement in a class action lawsuit requiring Aetna to extend fertility treatment coverage such as artificial insemination and IVF to same-sex couples on the same terms as heterosexual couples. The ruling, issued last week in the Northern District of California, marks the first time a health insurer has been legally compelled to apply such a policy nationwide, impacting an estimated 2.8 million LGBTQ members, including 91,000 Californians. The lawsuit, led by Mara Berton and June Higginbotham, a same-sex couple from California, challenged Aetna’s previous policy, which mandated that enrollees undergo 6–12 months of "unprotected heterosexual intercourse" without conceiving before qualifying for fertility benefits. For women without a male partner, the policy required 6–12 failed artificial insemination cycles a requirement plaintiffs argued was discriminatory and financially prohibitive. Berton and Higginbotham, who paid $45,000 out of pocket for treatments while heterosexual colleagues received coverage, described the experience as "dehumanizing." Under the settlement, Aetna will pay at least $2 million in damages to eligible California members, with claims due by June 29, 2026. The company stated it will comply with the ruling, emphasizing its commitment to "equal access to infertility coverage." However, experts noted the policy’s previous design appeared intended to dissuade claimants, as medical guidelines typically recommend no more than 4 artificial insemination cycles before considering IVF. The case aligns with broader shifts in reproductive health policy. In 2023, the American Society for Reproductive Medicine updated its definition of infertility to include LGBTQ individuals and single people, pressuring insurers to expand coverage. California will further mandate fertility benefits for same-sex couples and single individuals under a new law effective January 2025, though Aetna’s settlement applies independently of state regulations. Berton and Higginbotham, who now have twin daughters after a grueling IVF journey, pursued the lawsuit to prevent others from facing similar financial and emotional barriers. "I know people who wanted children but couldn’t because the treatments weren’t covered," Higginbotham said. The settlement, advocates argue, corrects a systemic inequity one that forced LGBTQ couples to either delay parenthood, limit family size, or forgo it entirely due to cost. While the ruling applies only to Aetna, reproductive rights groups hope it will set a precedent for other insurers. As Alison Tanner of the National Women’s Law Center noted, the case underscored "an issue of inequality" one that treated same-sex couples differently under the guise of medical definitions. With fertility access now expanding, the decision signals a critical step toward equitable healthcare for LGBTQ families.

CVS HealthRansomware10052/2024Change HealthcareChange Healthcare
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In February 2024, Change Healthcare, a critical division of UnitedHealth Group, fell victim to a devastating BlackCat/ALPHV ransomware attack. The assault crippled its systems, disrupting prescription processing, medical claims, and payment operations across the U.S. healthcare sector. Over 100 million individuals were impacted due to service outages, with hospitals, pharmacies, and insurers facing delays in billing, reimbursements, and patient care. The company paid a $22 million ransom, but total financial losses ballooned to an estimated $2 billion, factoring in operational downtime, recovery costs, and reputational damage. The attack exposed vulnerabilities in third-party supply chains, as the breach originated from compromised credentials in a connected vendor system. Regulatory scrutiny intensified, with federal investigations probing compliance failures under HIPAA and cybersecurity negligence. The incident underscored the escalating threat of RaaS (Ransomware-as-a-Service) models, where affiliate hackers leverage sophisticated tools to target high-value sectors like healthcare, exploiting systemic interdependencies for maximum disruption.

CVS HealthBreach25111/2023NA
Rankiteo Explanation :
Attack without any consequences

Description: The Washington State Office of the Attorney General reported a data breach involving CVS Caremark Part D Services, L.L.C. on February 23, 2024. The breach occurred on November 20, 2023, due to human error in mailing processes, affecting approximately 2,193 individuals' names and medical information.

CVS HealthBreach10045/2023NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The Missouri Attorney General’s Office reported a data breach involving Aetna Life Insurance Company on December 1, 2023. The breach occurred on May 29, 2023, and compromised the personal information of 11,893 Missouri residents, specifically exposing Social Security Numbers. This incident highlights the vulnerability of personal data and the potential consequences of such breaches on individuals' privacy and security.

CVS HealthBreach2511/2023NA
Rankiteo Explanation :
Attack without any consequences

Description: On April 8, 2024, the Maine Office of the Attorney General reported a data breach involving CVS that occurred on January 1, 2023. The breach was an internal system breach affecting a total of 10 individuals, with consumer notification conducted electronically on January 10, 2023. Identity theft protection services were offered.

CVS HealthBreach80403/2021NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Over a billion customer records of Pharmacy giant CVS were leaked on internet in a cyber incident. The exposed data included customer email addresses, device IDs, and the order histories of CVS. Upon learning about the incident CVS Health immediately worked to secure the data and informed the impacted customers to remain alert.

Aetna: IVF treatments for same-sex couples to be covered by Aetna in national settlement
Breach
Severity: 85
Impact: 4
Seen: 12/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Landmark Settlement Forces Aetna to Cover Fertility Treatments for Same-Sex Couples Nationwide In a groundbreaking legal victory, U.S. District Judge Haywood Gilliam Jr. approved a preliminary settlement in a class action lawsuit requiring Aetna to extend fertility treatment coverage such as artificial insemination and IVF to same-sex couples on the same terms as heterosexual couples. The ruling, issued last week in the Northern District of California, marks the first time a health insurer has been legally compelled to apply such a policy nationwide, impacting an estimated 2.8 million LGBTQ members, including 91,000 Californians. The lawsuit, led by Mara Berton and June Higginbotham, a same-sex couple from California, challenged Aetna’s previous policy, which mandated that enrollees undergo 6–12 months of "unprotected heterosexual intercourse" without conceiving before qualifying for fertility benefits. For women without a male partner, the policy required 6–12 failed artificial insemination cycles a requirement plaintiffs argued was discriminatory and financially prohibitive. Berton and Higginbotham, who paid $45,000 out of pocket for treatments while heterosexual colleagues received coverage, described the experience as "dehumanizing." Under the settlement, Aetna will pay at least $2 million in damages to eligible California members, with claims due by June 29, 2026. The company stated it will comply with the ruling, emphasizing its commitment to "equal access to infertility coverage." However, experts noted the policy’s previous design appeared intended to dissuade claimants, as medical guidelines typically recommend no more than 4 artificial insemination cycles before considering IVF. The case aligns with broader shifts in reproductive health policy. In 2023, the American Society for Reproductive Medicine updated its definition of infertility to include LGBTQ individuals and single people, pressuring insurers to expand coverage. California will further mandate fertility benefits for same-sex couples and single individuals under a new law effective January 2025, though Aetna’s settlement applies independently of state regulations. Berton and Higginbotham, who now have twin daughters after a grueling IVF journey, pursued the lawsuit to prevent others from facing similar financial and emotional barriers. "I know people who wanted children but couldn’t because the treatments weren’t covered," Higginbotham said. The settlement, advocates argue, corrects a systemic inequity one that forced LGBTQ couples to either delay parenthood, limit family size, or forgo it entirely due to cost. While the ruling applies only to Aetna, reproductive rights groups hope it will set a precedent for other insurers. As Alison Tanner of the National Women’s Law Center noted, the case underscored "an issue of inequality" one that treated same-sex couples differently under the guise of medical definitions. With fertility access now expanding, the decision signals a critical step toward equitable healthcare for LGBTQ families.

Change Healthcare (UnitedHealth Group)
Ransomware
Severity: 100
Impact: 5
Seen: 2/2024
Blog:
Supply Chain Source: Change HealthcareChange Healthcare
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In February 2024, Change Healthcare, a critical division of UnitedHealth Group, fell victim to a devastating BlackCat/ALPHV ransomware attack. The assault crippled its systems, disrupting prescription processing, medical claims, and payment operations across the U.S. healthcare sector. Over 100 million individuals were impacted due to service outages, with hospitals, pharmacies, and insurers facing delays in billing, reimbursements, and patient care. The company paid a $22 million ransom, but total financial losses ballooned to an estimated $2 billion, factoring in operational downtime, recovery costs, and reputational damage. The attack exposed vulnerabilities in third-party supply chains, as the breach originated from compromised credentials in a connected vendor system. Regulatory scrutiny intensified, with federal investigations probing compliance failures under HIPAA and cybersecurity negligence. The incident underscored the escalating threat of RaaS (Ransomware-as-a-Service) models, where affiliate hackers leverage sophisticated tools to target high-value sectors like healthcare, exploiting systemic interdependencies for maximum disruption.

CVS Caremark Part D Services, L.L.C.
Breach
Severity: 25
Impact: 1
Seen: 11/2023
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack without any consequences

Description: The Washington State Office of the Attorney General reported a data breach involving CVS Caremark Part D Services, L.L.C. on February 23, 2024. The breach occurred on November 20, 2023, due to human error in mailing processes, affecting approximately 2,193 individuals' names and medical information.

Aetna Life Insurance Company
Breach
Severity: 100
Impact: 4
Seen: 5/2023
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The Missouri Attorney General’s Office reported a data breach involving Aetna Life Insurance Company on December 1, 2023. The breach occurred on May 29, 2023, and compromised the personal information of 11,893 Missouri residents, specifically exposing Social Security Numbers. This incident highlights the vulnerability of personal data and the potential consequences of such breaches on individuals' privacy and security.

CVS
Breach
Severity: 25
Impact: 1
Seen: 1/2023
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack without any consequences

Description: On April 8, 2024, the Maine Office of the Attorney General reported a data breach involving CVS that occurred on January 1, 2023. The breach was an internal system breach affecting a total of 10 individuals, with consumer notification conducted electronically on January 10, 2023. Identity theft protection services were offered.

CVS Health
Breach
Severity: 80
Impact: 4
Seen: 03/2021
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Over a billion customer records of Pharmacy giant CVS were leaked on internet in a cyber incident. The exposed data included customer email addresses, device IDs, and the order histories of CVS. Upon learning about the incident CVS Health immediately worked to secure the data and informed the impacted customers to remain alert.

Ailogo

CVS Health Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CVS Health

Incidents vs Hospitals and Health Care Industry Average (This Year)

No incidents recorded for CVS Health in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for CVS Health in 2026.

Incident Types CVS Health vs Hospitals and Health Care Industry Avg (This Year)

No incidents recorded for CVS Health in 2026.

Incident History — CVS Health (X = Date, Y = Severity)

CVS Health cyber incidents detection timeline including parent company and subsidiaries

CVS Health Company Subsidiaries

SubsidiaryImage

CVS Health is the leading health solutions company, delivering care like no one else can. We reach more people and improve the health of communities across America through our local presence, digital channels and over 300,000 dedicated colleagues. Wherever and whenever people need us, we help them with their health – whether that’s managing chronic diseases, staying compliant with their medications or accessing affordable health and wellness services in the most convenient ways. We help people navigate the health care system – and their personal health care – by simplifying health care one person, one family and one community at a time. Follow @CVSHealth on social media.

Loading...
similarCompanies

CVS Health Similar Companies

Fortis Healthcare

Fortis Healthcare Group is a leading integrated healthcare provider operating across the Asia Pacific region. With more than 20,000 employees and growing, Fortis Helathcare is currently present in Australia, Canada, Hong Kong SAR, India, Mauritius, New Zealand, Singapore, Sri Lanka, UAE, and Vietnam

Sanford Health

Sanford Health is the largest rural health system in the U.S. Our organization is dedicated to transforming the health care experience and providing access to world-class health care in America’s heartland. Headquartered in Sioux Falls, South Dakota, we serve more than one million patients and 220,0

Brigham and Women's Hospital

Boston's Brigham and Women's Hospital (BWH) is an international leader in virtually every area of medicine and has been the site of pioneering breakthroughs that have improved lives around the world. A major teaching hospital of Harvard Medical School, BWH has a legacy of excellence that continues t

Allegheny Health Network

Allegheny Health Network is an integrated health care delivery system serving the greater Western Pennsylvania region. More than 2,600 physicians and 21,000 employees serve the system's 14 hospitals as well as its ambulatory medical and surgery centers, Health + Wellness Pavilions, and hundreds of p

HCA Healthcare

HCA Healthcare is dedicated to giving people a healthier tomorrow. As one of the nation’s leading providers of healthcare services, HCA Healthcare is comprised of 188 hospitals and 2,400+ sites of care in 20 states and the United Kingdom. In addition to hospitals, sites of care include surgery cen

Hospital for Special Surgery

HSS is the world’s leading academic medical center focused on musculoskeletal health. At its core is Hospital for Special Surgery, nationally ranked No. 1 in orthopedics (for the 16th consecutive year), No. 3 in rheumatology by U.S. News & World Report (2025-2026), and the best pediatric orthopedic

University Hospitals

Founded in 1866, University Hospitals serves the needs of patients through an integrated network of 23 hospitals (including 5 joint ventures), more than 50 health centers and outpatient facilities, and over 200 physician offices in 16 counties throughout northern Ohio. The system’s flagship quaterna

Community Health Systems

Community Health Systems is one of the nation’s leading healthcare providers. Developing and operating healthcare delivery systems across 14 states, CHS is committed to helping people get well and live healthier. CHS affiliates operate 70 acute-care hospitals and more than 1,000 other sites of care,

R1 RCM

R1 is the leader in healthcare revenue management, helping providers achieve new levels of performance through smart orchestration. A pioneer in the industry, R1 created the first Healthcare Revenue Operating System: a modular, intelligent platform that integrates automation, AI, and human expertise

newsone

CVS Health CyberSecurity News

March 18, 2026 01:05 PM
This Week’s Health IT Jobs – March 18, 2026

It can be very overwhelming scrolling through job board after job board in search of a position that fits your wants and needs.

March 03, 2026 08:00 AM
List of Fortune 500 Chief Information Security Officers

Every one of our nation's biggest businesses has a cybersecurity leader. Scroll down the list to see who's who.

February 26, 2026 08:00 AM
Trends In Healthcare Data Breach Statistics

Our healthcare data breach statistics clearly show an upward trend in data breaches since 2009, when OCR first started publishing data...

February 20, 2026 08:00 AM
The Resilience of a Healthcare Titan: A Deep Dive into UnitedHealth Group (UNH) in 2026

As of February 20, 2026, UnitedHealth Group (NYSE: UNH) finds itself at a historic crossroads. For decades, the Minnetonka-based behemoth...

January 10, 2026 08:00 AM
HIPAA Compliance for Pharmacies - 2026 Update

HIPAA compliance for pharmacies is a complex subject to tackle - provided the pharmacy qualifies as a HIPAA Covered Entity.

December 30, 2025 08:00 AM
Codoxo’s Oversubscribed Series C Led by CVS Health Ventures | Mass General Brigham Announces New AI Company

Check out today's featured companies who have recently raised a round of funding, and be sure to check out the full list of past healthcare...

December 29, 2025 08:00 AM
Healthcare Cybersecurity – 2026 Health IT Predictions

As we wrap up another year and get ready for 2026 to begin, it is once again time for everyone's favorite annual tradition of Health IT...

December 10, 2025 08:00 AM
Is AI Headed for a Blockchain-Style Letdown? CVS Health’s Tilak Mandadi Doesn’t Think So

Will AI follow blockchain's path from hype to disappointment, or is healthcare finally ready for real change? Tilak Mandadi of CVS Health...

November 17, 2025 08:00 AM
Nebraska AG’s Lawsuit Against Change Healthcare Survives Motion to Dismiss

A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CVS Health CyberSecurity History Information

Official Website of CVS Health

The official website of CVS Health is http://CVSHealth.com.

CVS Health’s AI-Generated Cybersecurity Score

According to Rankiteo, CVS Health’s AI-generated cybersecurity score is 677, reflecting their Weak security posture.

How many security badges does CVS Health’ have ?

According to Rankiteo, CVS Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has CVS Health been affected by any supply chain cyber incidents ?

According to Rankiteo, CVS Health has been affected by a supply chain cyber incident involving Change Healthcare, with the incident ID CHA455090325.

Does CVS Health have SOC 2 Type 1 certification ?

According to Rankiteo, CVS Health is not certified under SOC 2 Type 1.

Does CVS Health have SOC 2 Type 2 certification ?

According to Rankiteo, CVS Health does not hold a SOC 2 Type 2 certification.

Does CVS Health comply with GDPR ?

According to Rankiteo, CVS Health is not listed as GDPR compliant.

Does CVS Health have PCI DSS certification ?

According to Rankiteo, CVS Health does not currently maintain PCI DSS compliance.

Does CVS Health comply with HIPAA ?

According to Rankiteo, CVS Health is not compliant with HIPAA regulations.

Does CVS Health have ISO 27001 certification ?

According to Rankiteo,CVS Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of CVS Health

CVS Health operates primarily in the Hospitals and Health Care industry.

Number of Employees at CVS Health

CVS Health employs approximately 135,996 people worldwide.

Subsidiaries Owned by CVS Health

CVS Health presently has no subsidiaries across any sectors.

CVS Health’s LinkedIn Followers

CVS Health’s official LinkedIn profile has approximately 1,176,454 followers.

NAICS Classification of CVS Health

CVS Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.

CVS Health’s Presence on Crunchbase

No, CVS Health does not have a profile on Crunchbase.

CVS Health’s Presence on LinkedIn

Yes, CVS Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cvshealth.

Cybersecurity Incidents Involving CVS Health

As of March 30, 2026, Rankiteo reports that CVS Health has experienced 6 cybersecurity incidents.

Number of Peer and Competitor Companies

CVS Health has an estimated 32,295 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at CVS Health ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach and Ransomware.

What was the total financial impact of these incidents on CVS Health ?

Total Financial Loss: The total financial loss from these incidents is estimated to be $632.26 million.

How does CVS Health detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with immediately worked to secure the data, and communication strategy with informed the impacted customers to remain alert, and communication strategy with consumer notification conducted electronically, and incident response plan activated with change healthcare (2024, unitedhealth group), incident response plan activated with cdk global (2024, $25m ransom paid), incident response plan activated with colonial pipeline (2021, $4.4m ransom paid), incident response plan activated with jbs (2021, $11m ransom paid), incident response plan activated with cognizant (2020, $50m–$70m losses), incident response plan activated with baltimore (2019, $18m recovery cost), incident response plan activated with commonspirit health (2022, $160m losses), incident response plan activated with medibank (2022, 9.7m records at risk), and third party assistance with cybersecurity firms (e.g., for colonial pipeline, change healthcare), third party assistance with doj/europol (qakbot takedown, 2025), third party assistance with insurance providers (e.g., syracuse city school district, 2019), and law enforcement notified with colonial pipeline (fbi recovered $2.3m in bitcoin), law enforcement notified with qakbot (doj seized $24m, 2025), law enforcement notified with danabot (16 russian nationals indicted, 2025), law enforcement notified with washington dc police (babuk leak, 2021), and containment measures with network isolation (e.g., change healthcare, cdk global), containment measures with system shutdowns (e.g., baltimore, 2019), containment measures with disabling rdp access (common in smbs), containment measures with patching zero-days (e.g., moveit, 2023), and remediation measures with data recovery from backups (e.g., sky lakes medical center, 7 months), remediation measures with decryption tools (e.g., wannacry kill switch, 2017), remediation measures with rebuilding systems (e.g., garmin, 2020), remediation measures with credential resets (e.g., after stolen credentials used), and recovery measures with immutable backups (4x faster recovery, 50% less likely to pay ransom), recovery measures with cyber insurance claims (58% of large-value claims in h1 2024), recovery measures with manual processes (e.g., university hospital center zagreb, 2024), recovery measures with third-party forensic investigations, and communication strategy with public disclosures (e.g., colonial pipeline, change healthcare), communication strategy with customer notifications (e.g., patelco credit union, healthcorps), communication strategy with regulatory filings (e.g., sensata technologies, sec), communication strategy with press releases (e.g., british library, 2023), and network segmentation with recommended in mitigation strategies, and enhanced monitoring with recommended post-incident, and third party assistance with legal representation (national women's law center, class action lawyers), and containment measures with policy change to cover fertility treatments for same-sex couples, and remediation measures with settlement requiring national policy change and payment of damages, and communication strategy with public statements and interviews with plaintiffs and legal representatives..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: CVS Data Leak Incident

Description: Over a billion customer records of Pharmacy giant CVS were leaked on the internet in a cyber incident.

Type: Data Breach

Incident : Data Breach

Title: CVS Data Breach

Description: A data breach involving CVS was reported by the Maine Office of the Attorney General, affecting 10 individuals.

Date Detected: 2023-01-01

Date Publicly Disclosed: 2024-04-08

Type: Data Breach

Attack Vector: Internal System Breach

Incident : Data Breach

Title: Aetna Life Insurance Company Data Breach

Description: The Missouri Attorney General’s Office reported a data breach involving Aetna Life Insurance Company on December 1, 2023. The breach occurred on May 29, 2023, and compromised the personal information of 11,893 Missouri residents, specifically exposing Social Security Numbers.

Date Detected: 2023-12-01

Date Publicly Disclosed: 2023-12-01

Type: Data Breach

Incident : Data Breach

Title: CVS Caremark Part D Services Data Breach

Description: The Washington State Office of the Attorney General reported a data breach involving CVS Caremark Part D Services, L.L.C. on February 23, 2024. The breach occurred on November 20, 2023, due to human error in mailing processes, affecting approximately 2,193 individuals' names and medical information.

Date Detected: 2023-11-20

Date Publicly Disclosed: 2024-02-23

Type: Data Breach

Attack Vector: Human Error

Vulnerability Exploited: Mailing Processes

Incident : ransomware

Title: Ransomware Attacks Overview (2011–2025)

Description: The last decade has seen a steep increase in ransomware attacks across healthcare, medicine, and supply chains. Threat actors now use RaaS, triple extortion, supply chain attacks, and phishing to coerce companies into paying ransoms. Notable incidents include WannaCry (2017), Colonial Pipeline (2021), MOVEit (2023), Change Healthcare (2024), and CDK Global (2024). Ransom payments and financial losses have surged, with the average ransom payment reaching $2.73M in 2024. Industries like healthcare, education, and financial services remain top targets, while AI-driven phishing and zero-day exploits are rising trends.

Type: ransomware

Attack Vector: phishing emails (67% of attacks in North America)software vulnerabilities (32% of attacks)RDP compromise (30% in SMBs)stolen credentials (29%)unmanaged third-party integrations (25%)zero-day exploits (e.g., MOVEit)RaaS (Ransomware-as-a-Service)botnet malware (e.g., Qakbot, DanaBot)AI-generated phishing luresunpatched systems

Vulnerability Exploited: EternalBlue (WannaCry, 2017)unpatched Windows SMB flaw (WannaCry)MOVEit Transfer zero-day (Clop gang, 2023)third-party compromises (35.5% of breaches in 2024)200+ vulnerabilities in CISA’s KEV catalog (2024–2025)

Threat Actor: LockBit (most prolific in 2025, $91M in payments)RansomHub (most active in 2024–2025)Clop (MOVEit breach, 2023)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, Okta, 2022)Babuk (Washington DC Police, 2021)Scattered Spider (Marks & Spencer, 2025)Russian-linked groups (e.g., DanaBot, Qakbot)State-sponsored actors (e.g., 16 Russian nationals indicted for DanaBot)

Motivation: financial gain (ransom payments, data extortion)disruption of critical infrastructure (e.g., healthcare, supply chains)data theft for dark web sales (e.g., PII, medical records)espionage (e.g., state-linked DanaBot attacks)reputation damage (e.g., leaking sensitive data)

Incident : Discrimination in Healthcare Policy

Title: Aetna Fertility Treatment Policy Discrimination Against Same-Sex Couples

Description: A class action lawsuit against Aetna alleged that the health insurer's fertility treatment policy discriminated against same-sex couples by requiring them to pay out-of-pocket for treatments like artificial insemination or IVF, while heterosexual couples had these costs covered. The lawsuit resulted in a landmark settlement requiring Aetna to cover fertility treatments for same-sex couples nationally.

Date Resolved: 2024-06

Type: Discrimination in Healthcare Policy

Motivation: Policy-based discrimination against LGBTQ+ individuals

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through phishing emails (67% of attacks)unpatched vulnerabilities (32%)RDP compromise (30% in SMBs)stolen credentials (29%)third-party software (25%)malicious ads/websites (e.g., Fake Chrome updates for Spora)botnets (e.g., Necurs for Locky and Qakbot for ransomware delivery).

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach CVS153930322

Data Compromised: Customer email addresses, Device ids, Order histories

Incident : Data Breach AET411072725

Data Compromised: Social security numbers

Incident : Data Breach CVS1026072725

Data Compromised: Names, Medical information

Incident : ransomware CHA455090325

Financial Loss: $4B (WannaCry, 2017)$18M (Baltimore, 2019)$50M–$70M (Cognizant, 2020)$4.4M (Colonial Pipeline) + $11M (JBS, 2021)$1.1B (MOVEit breaches, 2023)$22M ransom + $2B losses (Change Healthcare, 2024)$25M (CDK Global, 2024)$160M (CommonSpirit Health, 2022)$300M (Marks & Spencer, 2024–2025)$4B (Sensata Technologies, 2025)Average ransom payment: $2.73M (2024, up from $1.5M in 2023)Average cost per attack: $5.13M (2025, +574% since 2019)

Data Compromised: 93.3m individuals (moveit, 2023), 9.7m medical records (medibank, 2022), 5.6m patient records (healthcorps, 2024), 726k customers (patelco credit union, 2024), 254k users (kadokawa/niconico, 2024), 500gb (spanish tax agency, 2024), 1tb (nvidia, 2022), 190gb (samsung, 2022), 65gb (british library, university of hawaii, 2023), Pii, payment info, medical records, corporate secrets (e.g., apple blueprints via quanta, 2021)

Systems Affected: 300K+ computers (WannaCry, 150+ countries, 2017)650 servers + 150 apps (Sky Lakes Medical Center, 2021)800 servers (Costa Rica government, 2022)10TB data (Canon, 2020)740GB (Toshiba, 2021)1.4M patient records (Lubbock County, 2019)Port of Nagoya (10% of Japan’s trade disrupted, 2023)thousands of dealerships (CDK Global, 2024)US fuel supply (Colonial Pipeline, 2021)US meat supply (JBS, 2021)

Downtime: ['1 month (Baltimore, 2019)', '7 months (Sky Lakes Medical Center, 2021)', 'prolonged disruptions (Change Healthcare, CDK Global, 2024)', 'manual processes (University Hospital Center Zagreb, 2024)']

Operational Impact: fuel shortages (Colonial Pipeline, 2021)meat supply disruption (JBS, 2021)healthcare service outages (CommonSpirit, Change Healthcare)auto sales halted (CDK Global, 2024)container operations destroyed (Port of Nagoya, 2023)online retail disruptions (Marks & Spencer, 2024–2025)government crises (Costa Rica, 2022)

Revenue Loss: ['$2B (Change Healthcare, 2024)', '$300M (Marks & Spencer, 2024–2025)', '$160M (CommonSpirit Health, 2022)', 'stock price drops (e.g., Carnival Corp, 2020)', 'market cap drop of £1B (Marks & Spencer, 2025)']

Brand Reputation Impact: leaked sensitive data (e.g., Washington DC Police, British Library)loss of trust in healthcare (e.g., Medibank, Healthcorps)publicized breaches (e.g., Christie’s, 2025)

Legal Liabilities: fines for regulatory violations (e.g., GDPR, HIPAA)lawsuits from affected customers (e.g., patients, credit union members)SEC disclosures (e.g., Sensata Technologies, 2025)

Identity Theft Risk: ['9.7M medical records (Medibank, 2022)', '5.6M patient records (Healthcorps, 2024)', '726K customers (Patelco Credit Union, 2024)', '500K clients (Christie’s, 2025)']

Payment Information Risk: ['credit card data (e.g., Patelco Credit Union, 2024)', 'financial records (e.g., Spanish Tax Agency, 2024)', 'cryptocurrency theft (e.g., CoinDash, 2017)']

Incident : Discrimination in Healthcare Policy AET1766440692

Financial Loss: $45,000 (out-of-pocket costs for plaintiffs)

Customer Complaints: Class action lawsuit filed

Brand Reputation Impact: Negative publicity and reputational damage due to discriminatory policy

Legal Liabilities: At least $2 million in damages to California-based members

What is the average financial loss per incident ?

Average Financial Loss: The average financial loss per incident is $105.38 million.

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer Email Addresses, Device Ids, Order Histories, , Social Security Numbers, Names, Medical Information, , Pii (E.G., Medibank, Patelco Credit Union), Medical Records (E.G., Commonspirit, Healthcorps), Payment Information (E.G., Spanish Tax Agency), Corporate Secrets (E.G., Apple Blueprints Via Quanta), Government Data (E.G., Washington Dc Police, Costa Rica), Student/Employee Data (E.G., Munster Technological University), Customer Data (E.G., Christie’S, Marks & Spencer) and .

Which entities were affected by each incident ?

Incident : Data Breach CVS153930322

Entity Name: CVS

Entity Type: Pharmacy

Industry: Healthcare

Size: Large

Customers Affected: Over a billion

Incident : Data Breach CVS910072525

Entity Name: CVS

Entity Type: Company

Industry: Healthcare

Customers Affected: 10

Incident : Data Breach AET411072725

Entity Name: Aetna Life Insurance Company

Entity Type: Insurance Company

Industry: Health Insurance

Location: Missouri

Customers Affected: 11893

Incident : Data Breach CVS1026072725

Entity Name: CVS Caremark Part D Services, L.L.C.

Entity Type: Company

Industry: Healthcare

Customers Affected: 2193

Incident : ransomware CHA455090325

Entity Name: Change Healthcare (UnitedHealth Group)

Entity Type: healthcare

Industry: healthcare IT

Location: USA

Size: large (100M+ people affected)

Customers Affected: 100M+

Incident : ransomware CHA455090325

Entity Name: CDK Global

Entity Type: corporation

Industry: automotive retail

Location: USA, Canada

Size: large

Customers Affected: thousands of dealerships

Incident : ransomware CHA455090325

Entity Name: Colonial Pipeline

Entity Type: corporation

Industry: energy/oil

Location: USA

Size: large

Customers Affected: US East Coast fuel supply

Incident : ransomware CHA455090325

Entity Name: JBS S.A.

Entity Type: corporation

Industry: food/agriculture

Location: global (HQ: Brazil)

Size: large

Customers Affected: global meat supply chain

Incident : ransomware CHA455090325

Entity Name: MOVEit (Progress Software)

Entity Type: corporation

Industry: software/IT

Location: global

Size: large

Customers Affected: 2,700+ organizations, 93.3M individuals

Incident : ransomware CHA455090325

Entity Name: Marks & Spencer

Entity Type: corporation

Industry: retail

Location: UK

Size: large

Incident : ransomware CHA455090325

Entity Name: CommonSpirit Health

Entity Type: healthcare

Industry: healthcare

Location: USA

Size: large

Incident : ransomware CHA455090325

Entity Name: Medibank Private

Entity Type: healthcare

Industry: health insurance

Location: Australia

Size: large

Customers Affected: 9.7M

Incident : ransomware CHA455090325

Entity Name: Cognizant

Entity Type: corporation

Industry: IT services

Location: global (HQ: USA)

Size: large

Incident : ransomware CHA455090325

Entity Name: Baltimore City Government

Entity Type: government

Industry: public administration

Location: USA (Maryland)

Size: municipal

Customers Affected: residents

Incident : ransomware CHA455090325

Entity Name: University Hospital Center Zagreb

Entity Type: healthcare

Industry: healthcare

Location: Croatia

Size: large (largest in Croatia)

Incident : ransomware CHA455090325

Entity Name: Kadokawa Corporation

Entity Type: corporation

Industry: publishing/media

Location: Japan

Size: large

Customers Affected: 254K users (Niconico)

Incident : ransomware CHA455090325

Entity Name: Patelco Credit Union

Entity Type: financial

Industry: banking

Location: USA

Size: medium

Customers Affected: 726K

Incident : ransomware CHA455090325

Entity Name: Spanish Tax Agency (Agencia Tributaria)

Entity Type: government

Industry: public administration

Location: Spain

Size: large

Incident : ransomware CHA455090325

Entity Name: Port of Nagoya

Entity Type: infrastructure

Industry: logistics/trade

Location: Japan

Size: large (10% of Japan’s trade)

Incident : ransomware CHA455090325

Entity Name: British Library

Entity Type: public institution

Industry: education/culture

Location: UK

Size: large

Incident : ransomware CHA455090325

Entity Name: Sensata Technologies

Entity Type: corporation

Industry: technology/manufacturing

Location: USA

Size: large

Incident : ransomware CHA455090325

Entity Name: Christie’s

Entity Type: corporation

Industry: auction/art

Location: global (HQ: UK)

Size: large

Customers Affected: 500K clients

Incident : Discrimination in Healthcare Policy AET1766440692

Entity Name: Aetna

Entity Type: Health Insurance Company

Industry: Healthcare/Insurance

Location: United States

Size: Large (2.8 million LGBTQ members affected)

Customers Affected: 2.8 million LGBTQ members, including 91,000 Californians

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach CVS153930322

Incident Response Plan Activated: True

Containment Measures: Immediately worked to secure the data

Communication Strategy: Informed the impacted customers to remain alert

Incident : Data Breach CVS910072525

Communication Strategy: Consumer notification conducted electronically

Incident : ransomware CHA455090325

Incident Response Plan Activated: ['Change Healthcare (2024, UnitedHealth Group)', 'CDK Global (2024, $25M ransom paid)', 'Colonial Pipeline (2021, $4.4M ransom paid)', 'JBS (2021, $11M ransom paid)', 'Cognizant (2020, $50M–$70M losses)', 'Baltimore (2019, $18M recovery cost)', 'CommonSpirit Health (2022, $160M losses)', 'Medibank (2022, 9.7M records at risk)']

Third Party Assistance: Cybersecurity Firms (E.G., For Colonial Pipeline, Change Healthcare), Doj/Europol (Qakbot Takedown, 2025), Insurance Providers (E.G., Syracuse City School District, 2019).

Law Enforcement Notified: Colonial Pipeline (FBI recovered $2.3M in Bitcoin), Qakbot (DOJ seized $24M, 2025), DanaBot (16 Russian nationals indicted, 2025), Washington DC Police (Babuk leak, 2021),

Containment Measures: network isolation (e.g., Change Healthcare, CDK Global)system shutdowns (e.g., Baltimore, 2019)disabling RDP access (common in SMBs)patching zero-days (e.g., MOVEit, 2023)

Remediation Measures: data recovery from backups (e.g., Sky Lakes Medical Center, 7 months)decryption tools (e.g., WannaCry kill switch, 2017)rebuilding systems (e.g., Garmin, 2020)credential resets (e.g., after stolen credentials used)

Recovery Measures: immutable backups (4x faster recovery, 50% less likely to pay ransom)cyber insurance claims (58% of large-value claims in H1 2024)manual processes (e.g., University Hospital Center Zagreb, 2024)third-party forensic investigations

Communication Strategy: public disclosures (e.g., Colonial Pipeline, Change Healthcare)customer notifications (e.g., Patelco Credit Union, Healthcorps)regulatory filings (e.g., Sensata Technologies, SEC)press releases (e.g., British Library, 2023)

Network Segmentation: ['recommended in mitigation strategies']

Enhanced Monitoring: recommended post-incident

Incident : Discrimination in Healthcare Policy AET1766440692

Third Party Assistance: Legal representation (National Women's Law Center, class action lawyers)

Containment Measures: Policy change to cover fertility treatments for same-sex couples

Remediation Measures: Settlement requiring national policy change and payment of damages

Communication Strategy: Public statements and interviews with plaintiffs and legal representatives

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Change Healthcare (2024, UnitedHealth Group), CDK Global (2024, $25M ransom paid), Colonial Pipeline (2021, $4.4M ransom paid), JBS (2021, $11M ransom paid), Cognizant (2020, $50M–$70M losses), Baltimore (2019, $18M recovery cost), CommonSpirit Health (2022, $160M losses), Medibank (2022, 9.7M records at risk), .

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through cybersecurity firms (e.g., for Colonial Pipeline, Change Healthcare), DOJ/Europol (Qakbot takedown, 2025), insurance providers (e.g., Syracuse City School District, 2019), , Legal representation (National Women's Law Center, class action lawyers).

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach CVS153930322

Type of Data Compromised: Customer email addresses, Device ids, Order histories

Number of Records Exposed: Over a billion

Incident : Data Breach CVS910072525

Number of Records Exposed: 10

Incident : Data Breach AET411072725

Type of Data Compromised: Social Security Numbers

Number of Records Exposed: 11893

Sensitivity of Data: High

Personally Identifiable Information: Social Security Numbers

Incident : Data Breach CVS1026072725

Type of Data Compromised: Names, Medical information

Number of Records Exposed: 2193

Sensitivity of Data: High

Incident : ransomware CHA455090325

Type of Data Compromised: Pii (e.g., medibank, patelco credit union), Medical records (e.g., commonspirit, healthcorps), Payment information (e.g., spanish tax agency), Corporate secrets (e.g., apple blueprints via quanta), Government data (e.g., washington dc police, costa rica), Student/employee data (e.g., munster technological university), Customer data (e.g., christie’s, marks & spencer)

Number of Records Exposed: 93.3M (MOVEit, 2023), 9.7M (Medibank, 2022), 5.6M (Healthcorps, 2024), 726K (Patelco Credit Union, 2024), 254K (Kadokawa/Niconico, 2024), 500K (Christie’s, 2025), 1.4M (Lubbock County, 2019), 70K (Nvidia, 2022)

Sensitivity of Data: high (PII, medical, financial, corporate secrets)

Data Exfiltration: MOVEit (Clop gang, 2023)BlackCat/ALPHV (Change Healthcare, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, 2022)Babuk (Washington DC Police, 2021)Rhysida (British Library, 2023)

Data Encryption: ['WannaCry (2017, 300K+ computers)', 'Colonial Pipeline (2021)', 'CDK Global (2024)', 'Change Healthcare (2024)', 'Port of Nagoya (2023)']

File Types Exposed: databases (e.g., patient records, customer data)documents (e.g., corporate secrets, legal files)emails (e.g., phishing lures, credentials)source code (e.g., Samsung, Nvidia)financial records (e.g., Spanish Tax Agency)

Personally Identifiable Information: names, addresses, SSNs (e.g., Patelco Credit Union)medical histories (e.g., Medibank, Healthcorps)payment card data (e.g., retail breaches)biometric data (e.g., healthcare breaches)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: data recovery from backups (e.g., Sky Lakes Medical Center, 7 months), decryption tools (e.g., WannaCry kill switch, 2017), rebuilding systems (e.g., Garmin, 2020), credential resets (e.g., after stolen credentials used), , Settlement requiring national policy change and payment of damages.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by immediately worked to secure the data, network isolation (e.g., change healthcare, cdk global), system shutdowns (e.g., baltimore, 2019), disabling rdp access (common in smbs), patching zero-days (e.g., moveit, 2023), and policy change to cover fertility treatments for same-sex couples.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : ransomware CHA455090325

Ransom Demanded: ['$4.4M (Colonial Pipeline, 2021)', '$11M (JBS, 2021)', '$50M (Acer, Quanta, 2021)', '$40M (CNA Financial, 2021)', '$22M (Change Healthcare, 2024)', '$25M (CDK Global, 2024)', '$38M (Spanish Tax Agency, 2024)', '$50M (Apple supplier Quanta, 2021)', '$42M (Grubman Shire Meislas, 2020)', '$1.14M (UCSF, 2020)', '$400K–$600K (Florida municipalities, 2019)']

Ransom Paid: $4.4M (Colonial Pipeline, 2021)$11M (JBS, 2021)$40M (CNA Financial, 2021)$22M (Change Healthcare, 2024)$25M (CDK Global, 2024)$5M (Rackspace, 2022)$1.14M (UCSF, 2020)$2.3M (Travelex, 2020)$460K (Lake City, FL, 2019)$600K (Rivera Beach, FL, 2019)$400K (Jackson County, GA, 2019)

Ransomware Strain: WannaCry (2017)LockBit (2025, $91M in payments)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)Clop (MOVEit, 2023)REvil (JBS, Kaseya, 2021)Maze (Cognizant, Canon, 2020)Ryuk (Onslow Water, 2019)NetWalker (UCSF, 2020)Sodinokibi (Travelex, 2020)Babuk (Washington DC Police, 2021)Lapsus$ (Nvidia, Samsung, 2022)Rhysida (British Library, 2023)NoEscape (University of Hawaii, 2023)

Data Encryption: ['widespread across most attacks']

Data Exfiltration: ['common in double/triple extortion (e.g., Clop, BlackCat)']

How does the company recover data encrypted by ransomware ?

Data Recovery from Ransomware: The company recovers data encrypted by ransomware through immutable backups (4x faster recovery, 50% less likely to pay ransom), cyber insurance claims (58% of large-value claims in H1 2024), manual processes (e.g., University Hospital Center Zagreb, 2024), third-party forensic investigations, .

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : ransomware CHA455090325

Regulations Violated: GDPR (e.g., European data breaches), HIPAA (e.g., healthcare breaches like Medibank, Change Healthcare), state data breach laws (e.g., California, New York), SEC disclosure rules (e.g., Sensata Technologies, 2025),

Legal Actions: lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims),

Regulatory Notifications: HHS Office for Civil Rights (healthcare breaches)FBI IC3 (cybercrime reporting)SEC filings (public companies)GDPR notifications (EU breaches)

Incident : Discrimination in Healthcare Policy AET1766440692

Regulations Violated: Discrimination under healthcare equity laws

Legal Actions: Class action lawsuit settlement

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims), , Class action lawsuit settlement.

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : ransomware CHA455090325

Lessons Learned: RaaS and affiliate models enable rapid scaling of attacks., Triple extortion (encryption + data theft + DDoS) increases pressure to pay., Supply chain attacks (e.g., MOVEit, Kaseya) amplify impact., Unpatched vulnerabilities remain a top entry point., AI and phishing lures are evolving faster than defenses., Immutable backups and segmentation reduce ransom payments., Cyber insurance is critical but increasingly expensive., Public-sector targets (e.g., municipalities, healthcare) face severe operational disruptions., Regulatory fines and legal liabilities extend financial impact beyond ransoms., Collaboration with law enforcement (e.g., Qakbot takedown) can disrupt threat actors.

Incident : Discrimination in Healthcare Policy AET1766440692

Lessons Learned: Health insurers must ensure equitable access to fertility treatments for all individuals, regardless of sexual orientation or marital status. Policies should align with updated medical definitions of infertility.

What recommendations were made to prevent future incidents ?

Incident : ransomware CHA455090325

Recommendations: Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.Implement **immutable backups** and test recovery processes regularly., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Deploy **Multi-Factor Authentication (MFA)** across all access points., Segment networks to **limit lateral movement**., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Apply the **principle of least privilege** to minimize attack surfaces., Train employees on **phishing awareness** and social engineering., Monitor **dark web** for leaked credentials or data., Develop and **test incident response plans** annually., Invest in **threat intelligence** to preempt zero-day exploits., Evaluate **cyber insurance** coverage for ransomware scenarios., Isolate **third-party integrations** and vet vendors rigorously., Disable **RDP** where possible; use VPNs with MFA., Prepare for **double/triple extortion** with data leak response plans., Engage **red team exercises** to simulate ransomware attacks.

Incident : Discrimination in Healthcare Policy AET1766440692

Recommendations: Review and update insurance policies to comply with non-discrimination laws and medical definitions of infertility., Provide training for staff on equitable healthcare access., Monitor and audit policy implementation to prevent discriminatory practices., Engage with LGBTQ+ advocacy groups to ensure policies meet community needs.Review and update insurance policies to comply with non-discrimination laws and medical definitions of infertility., Provide training for staff on equitable healthcare access., Monitor and audit policy implementation to prevent discriminatory practices., Engage with LGBTQ+ advocacy groups to ensure policies meet community needs.Review and update insurance policies to comply with non-discrimination laws and medical definitions of infertility., Provide training for staff on equitable healthcare access., Monitor and audit policy implementation to prevent discriminatory practices., Engage with LGBTQ+ advocacy groups to ensure policies meet community needs.Review and update insurance policies to comply with non-discrimination laws and medical definitions of infertility., Provide training for staff on equitable healthcare access., Monitor and audit policy implementation to prevent discriminatory practices., Engage with LGBTQ+ advocacy groups to ensure policies meet community needs.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are RaaS and affiliate models enable rapid scaling of attacks.,Triple extortion (encryption + data theft + DDoS) increases pressure to pay.,Supply chain attacks (e.g., MOVEit, Kaseya) amplify impact.,Unpatched vulnerabilities remain a top entry point.,AI and phishing lures are evolving faster than defenses.,Immutable backups and segmentation reduce ransom payments.,Cyber insurance is critical but increasingly expensive.,Public-sector targets (e.g., municipalities, healthcare) face severe operational disruptions.,Regulatory fines and legal liabilities extend financial impact beyond ransoms.,Collaboration with law enforcement (e.g., Qakbot takedown) can disrupt threat actors.Health insurers must ensure equitable access to fertility treatments for all individuals, regardless of sexual orientation or marital status. Policies should align with updated medical definitions of infertility.

References

Where can I find more information about each incident ?

Incident : Data Breach CVS910072525

Source: Maine Office of the Attorney General

Date Accessed: 2024-04-08

Incident : Data Breach AET411072725

Source: Missouri Attorney General’s Office

Date Accessed: 2023-12-01

Incident : Data Breach CVS1026072725

Source: Washington State Office of the Attorney General

Date Accessed: 2024-02-23

Incident : ransomware CHA455090325

Source: Statista

URL: https://www.statista.com

Incident : ransomware CHA455090325

Source: Sophos State of Ransomware 2024

URL: https://www.sophos.com/en-us/state-of-ransomware

Incident : ransomware CHA455090325

Source: IBM Security X-Force Threat Intelligence

URL: https://www.ibm.com/security

Incident : ransomware CHA455090325

Source: Chainalysis 2025 Crypto Crime Report

URL: https://www.chainalysis.com

Incident : ransomware CHA455090325

Source: Verizon 2025 Data Breach Investigations Report (DBIR)

URL: https://www.verizon.com/business/resources/reports/dbir/

Incident : ransomware CHA455090325

Source: CISA Known Exploited Vulnerabilities (KEV) Catalog

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Incident : ransomware CHA455090325

Source: FBI Internet Crime Complaint Center (IC3)

URL: https://www.ic3.gov

Incident : ransomware CHA455090325

Source: The Business Research Company (Ransomware Market Report)

URL: https://www.thebusinessresearchcompany.com

Incident : ransomware CHA455090325

Source: PurpleSec Ransomware Statistics 2025

URL: https://purplesec.us/ransomware-statistics/

Incident : ransomware CHA455090325

Source: DOJ Press Release: Qakbot Takedown (2025)

URL: https://www.justice.gov

Incident : ransomware CHA455090325

Source: Cybersecurity Dive

URL: https://www.cybersecuritydive.com

Incident : ransomware CHA455090325

Source: BlackKite Ransomware Report 2025

URL: https://www.blackkite.com

Incident : Discrimination in Healthcare Policy AET1766440692

Source: CalMatters

Incident : Discrimination in Healthcare Policy AET1766440692

Source: The Associated Press

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-04-08, and Source: Missouri Attorney General’s OfficeDate Accessed: 2023-12-01, and Source: Washington State Office of the Attorney GeneralDate Accessed: 2024-02-23, and Source: StatistaUrl: https://www.statista.com, and Source: Sophos State of Ransomware 2024Url: https://www.sophos.com/en-us/state-of-ransomware, and Source: IBM Security X-Force Threat IntelligenceUrl: https://www.ibm.com/security, and Source: Chainalysis 2025 Crypto Crime ReportUrl: https://www.chainalysis.com, and Source: Verizon 2025 Data Breach Investigations Report (DBIR)Url: https://www.verizon.com/business/resources/reports/dbir/, and Source: CISA Known Exploited Vulnerabilities (KEV) CatalogUrl: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, and Source: FBI Internet Crime Complaint Center (IC3)Url: https://www.ic3.gov, and Source: The Business Research Company (Ransomware Market Report)Url: https://www.thebusinessresearchcompany.com, and Source: PurpleSec Ransomware Statistics 2025Url: https://purplesec.us/ransomware-statistics/, and Source: DOJ Press Release: Qakbot Takedown (2025)Url: https://www.justice.gov, and Source: Cybersecurity DiveUrl: https://www.cybersecuritydive.com, and Source: BlackKite Ransomware Report 2025Url: https://www.blackkite.com, and Source: CalMatters, and Source: The Associated Press.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : ransomware CHA455090325

Investigation Status: ['Ongoing for recent attacks (e.g., Change Healthcare, CDK Global)', 'Resolved for older cases (e.g., WannaCry, NotPetya)', 'Law enforcement actions (e.g., Qakbot, DanaBot takedowns)', 'Private forensic investigations (e.g., CommonSpirit, Medibank)']

Incident : Discrimination in Healthcare Policy AET1766440692

Investigation Status: Resolved (settlement approved)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Informed the impacted customers to remain alert, Consumer notification conducted electronically, Public Disclosures (E.G., Colonial Pipeline, Change Healthcare), Customer Notifications (E.G., Patelco Credit Union, Healthcorps), Regulatory Filings (E.G., Sensata Technologies, Sec), Press Releases (E.G., British Library, 2023) and Public statements and interviews with plaintiffs and legal representatives.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach CVS153930322

Customer Advisories: Informed the impacted customers to remain alert

Incident : Data Breach CVS910072525

Customer Advisories: Identity theft protection services were offered

Incident : ransomware CHA455090325

Stakeholder Advisories: Unitedhealth Group (Change Healthcare Breach Updates), Cdk Global Customer Notifications (2024), Hhs Advisories For Healthcare Sector (2024–2025), Cisa Alerts On Ransomware Trends (E.G., #Stopransomware), Fbi Warnings On Raas And Phishing (2025).

Customer Advisories: Credit monitoring for affected individuals (e.g., Patelco Credit Union, Healthcorps)Password reset recommendations (e.g., after credential leaks)Fraud alerts for financial data exposure (e.g., Spanish Tax Agency)Healthcare providers’ notifications to patients (e.g., Medibank, CommonSpirit)

Incident : Discrimination in Healthcare Policy AET1766440692

Stakeholder Advisories: Aetna committed to equal access to infertility and reproductive health coverage for all members.

Customer Advisories: Eligible California-based members must submit a claim for damages by June 29, 2026.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Informed the impacted customers to remain alert, Identity theft protection services were offered, Unitedhealth Group (Change Healthcare Breach Updates), Cdk Global Customer Notifications (2024), Hhs Advisories For Healthcare Sector (2024–2025), Cisa Alerts On Ransomware Trends (E.G., #Stopransomware), Fbi Warnings On Raas And Phishing (2025), Credit Monitoring For Affected Individuals (E.G., Patelco Credit Union, Healthcorps), Password Reset Recommendations (E.G., After Credential Leaks), Fraud Alerts For Financial Data Exposure (E.G., Spanish Tax Agency), Healthcare Providers’ Notifications To Patients (E.G., Medibank, Commonspirit), , Aetna committed to equal access to infertility and reproductive health coverage for all members., Eligible California-based members must submit a claim for damages by June 29 and 2026..

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : ransomware CHA455090325

Entry Point: Phishing Emails (67% Of Attacks), Unpatched Vulnerabilities (32%), Rdp Compromise (30% In Smbs), Stolen Credentials (29%), Third-Party Software (25%), Malicious Ads/Websites (E.G., Fake Chrome Updates For Spora), Botnets (E.G., Necurs For Locky, Qakbot For Ransomware Delivery),

Reconnaissance Period: ['weeks to months (e.g., APT-style attacks)', 'rapid exploitation (e.g., zero-days like MOVEit)']

Backdoors Established: ['common in RaaS attacks (e.g., LockBit, BlackCat)', 'persistent access via RDP or VPN flaws']

High Value Targets: Healthcare (E.G., Change Healthcare, Medibank), Critical Infrastructure (E.G., Colonial Pipeline, Port Of Nagoya), Supply Chain Providers (E.G., Moveit, Kaseya), Municipalities (E.G., Baltimore, Lake City),

Data Sold on Dark Web: Healthcare (E.G., Change Healthcare, Medibank), Critical Infrastructure (E.G., Colonial Pipeline, Port Of Nagoya), Supply Chain Providers (E.G., Moveit, Kaseya), Municipalities (E.G., Baltimore, Lake City),

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach CVS1026072725

Root Causes: Human Error in Mailing Processes

Incident : ransomware CHA455090325

Root Causes: Unpatched Vulnerabilities (E.G., Eternalblue, Moveit), Lack Of Mfa (E.G., Rdp Compromises), Poor Segmentation (E.G., Lateral Movement In Colonial Pipeline), Inadequate Backups (E.G., Baltimore’S $18M Recovery), Third-Party Risks (E.G., Supply Chain Attacks), Human Error (E.G., Phishing Clicks), Insufficient Employee Training (E.G., Recognizing Phishing),

Corrective Actions: Mandatory **Mfa** Implementation, Accelerated **Patch Management** For Kev Vulnerabilities, **Network Segmentation** To Limit Blast Radius, **Immutable Backups** With Offline Storage, **Incident Response Drills** Quarterly, **Threat Hunting** For Early Detection, **Vendor Risk Assessments** For Third Parties, **Dark Web Monitoring** For Leaked Credentials, **Ai-Driven Anomaly Detection** (E.G., For Phishing), **Cyber Insurance** Policy Reviews,

Incident : Discrimination in Healthcare Policy AET1766440692

Root Causes: Outdated policy requiring heterosexual intercourse as a prerequisite for fertility treatment coverage, excluding same-sex couples and single individuals.

Corrective Actions: Policy updated to cover fertility treatments for same-sex couples and single individuals nationally. Payment of damages to affected members.

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity Firms (E.G., For Colonial Pipeline, Change Healthcare), Doj/Europol (Qakbot Takedown, 2025), Insurance Providers (E.G., Syracuse City School District, 2019), , Recommended Post-Incident, , Legal representation (National Women's Law Center, class action lawyers).

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Mandatory **Mfa** Implementation, Accelerated **Patch Management** For Kev Vulnerabilities, **Network Segmentation** To Limit Blast Radius, **Immutable Backups** With Offline Storage, **Incident Response Drills** Quarterly, **Threat Hunting** For Early Detection, **Vendor Risk Assessments** For Third Parties, **Dark Web Monitoring** For Leaked Credentials, **Ai-Driven Anomaly Detection** (E.G., For Phishing), **Cyber Insurance** Policy Reviews, , Policy updated to cover fertility treatments for same-sex couples and single individuals nationally. Payment of damages to affected members..

Additional Questions

General Information

Has the company ever paid ransoms ?

Ransom Payment History: The company has Paid ransoms in the past.

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was ['$4.4M (Colonial Pipeline, 2021)', '$11M (JBS, 2021)', '$50M (Acer, Quanta, 2021)', '$40M (CNA Financial, 2021)', '$22M (Change Healthcare, 2024)', '$25M (CDK Global, 2024)', '$38M (Spanish Tax Agency, 2024)', '$50M (Apple supplier Quanta, 2021)', '$42M (Grubman Shire Meislas, 2020)', '$1.14M (UCSF, 2020)', '$400K–$600K (Florida municipalities, 2019)'].

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an LockBit (most prolific in 2025, $91M in payments)RansomHub (most active in 2024–2025)Clop (MOVEit breach, 2023)BlackCat/ALPHV (Change Healthcare, 2024)BlackSuit (CDK Global, Kadokawa, 2024)REvil (JBS, Kaseya, 2021)Lapsus$ (Nvidia, Samsung, Okta, 2022)Babuk (Washington DC Police, 2021)Scattered Spider (Marks & Spencer, 2025)Russian-linked groups (e.g., DanaBot, Qakbot)State-sponsored actors (e.g. and 16 Russian nationals indicted for DanaBot).

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023-01-01.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-02-23.

What was the most recent incident resolved ?

Most Recent Incident Resolved: The most recent incident resolved was on 2024-06.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were customer email addresses, device IDs, order histories, , Social Security Numbers, , Names, Medical Information, , 93.3M individuals (MOVEit, 2023), 9.7M medical records (Medibank, 2022), 5.6M patient records (Healthcorps, 2024), 726K customers (Patelco Credit Union, 2024), 254K users (Kadokawa/Niconico, 2024), 500GB (Spanish Tax Agency, 2024), 1TB (Nvidia, 2022), 190GB (Samsung, 2022), 65GB (British Library, University of Hawaii, 2023), PII, payment info, medical records, corporate secrets (e.g., Apple blueprints via Quanta, 2021) and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident were 300K+ computers (WannaCry, 150+ countries, 2017)650 servers + 150 apps (Sky Lakes Medical Center, 2021)800 servers (Costa Rica government, 2022)10TB data (Canon, 2020)740GB (Toshiba, 2021)1.4M patient records (Lubbock County, 2019)Port of Nagoya (10% of Japan’s trade disrupted, 2023)thousands of dealerships (CDK Global, 2024)US fuel supply (Colonial Pipeline, 2021)US meat supply (JBS, 2021).

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity firms (e.g., for colonial pipeline, change healthcare), doj/europol (qakbot takedown, 2025), insurance providers (e.g., syracuse city school district, 2019), , Legal representation (National Women's Law Center, class action lawyers).

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Immediately worked to secure the data, network isolation (e.g., Change Healthcare, CDK Global)system shutdowns (e.g., Baltimore, 2019)disabling RDP access (common in SMBs)patching zero-days (e.g., MOVEit, 2023) and Policy change to cover fertility treatments for same-sex couples.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were order histories, 254K users (Kadokawa/Niconico, 2024), customer email addresses, Names, 93.3M individuals (MOVEit, 2023), Social Security Numbers, device IDs, 9.7M medical records (Medibank, 2022), 5.6M patient records (Healthcorps, 2024), 500GB (Spanish Tax Agency, 2024), 65GB (British Library, University of Hawaii, 2023), PII, payment info, medical records, corporate secrets (e.g., Apple blueprints via Quanta, 2021), Medical Information, 1TB (Nvidia, 2022), 726K customers (Patelco Credit Union, 2024), 190GB (Samsung and 2022).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 3.8K.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was ['$4.4M (Colonial Pipeline, 2021)', '$11M (JBS, 2021)', '$50M (Acer, Quanta, 2021)', '$40M (CNA Financial, 2021)', '$22M (Change Healthcare, 2024)', '$25M (CDK Global, 2024)', '$38M (Spanish Tax Agency, 2024)', '$50M (Apple supplier Quanta, 2021)', '$42M (Grubman Shire Meislas, 2020)', '$1.14M (UCSF, 2020)', '$400K–$600K (Florida municipalities, 2019)'].

What was the highest ransom paid in a ransomware incident ?

Highest Ransom Paid: The highest ransom paid in a ransomware incident was ['$4.4M (Colonial Pipeline, 2021)', '$11M (JBS, 2021)', '$40M (CNA Financial, 2021)', '$22M (Change Healthcare, 2024)', '$25M (CDK Global, 2024)', '$5M (Rackspace, 2022)', '$1.14M (UCSF, 2020)', '$2.3M (Travelex, 2020)', '$460K (Lake City, FL, 2019)', '$600K (Rivera Beach, FL, 2019)', '$400K (Jackson County, GA, 2019)'].

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was lawsuits from affected individuals (e.g., patients, customers), DOJ indictments (e.g., 16 Russian nationals for DanaBot, 2025), class-action suits (e.g., data breach victims), , Class action lawsuit settlement.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Collaboration with law enforcement (e.g., Qakbot takedown) can disrupt threat actors., Health insurers must ensure equitable access to fertility treatments for all individuals, regardless of sexual orientation or marital status. Policies should align with updated medical definitions of infertility.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Segment networks to **limit lateral movement**., Develop and **test incident response plans** annually., Isolate **third-party integrations** and vet vendors rigorously., Implement **immutable backups** and test recovery processes regularly., Engage **red team exercises** to simulate ransomware attacks., Apply the **principle of least privilege** to minimize attack surfaces., Invest in **threat intelligence** to preempt zero-day exploits., Provide training for staff on equitable healthcare access., Engage with LGBTQ+ advocacy groups to ensure policies meet community needs., Review and update insurance policies to comply with non-discrimination laws and medical definitions of infertility., Evaluate **cyber insurance** coverage for ransomware scenarios., Monitor and audit policy implementation to prevent discriminatory practices., Use **Endpoint Detection and Response (EDR)** and **extended detection (XDR)**., Patch systems promptly, prioritizing **CISA KEV vulnerabilities**., Monitor **dark web** for leaked credentials or data., Deploy **Multi-Factor Authentication (MFA)** across all access points., Train employees on **phishing awareness** and social engineering., Disable **RDP** where possible; use VPNs with MFA. and Prepare for **double/triple extortion** with data leak response plans..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Washington State Office of the Attorney General, Statista, The Business Research Company (Ransomware Market Report), Chainalysis 2025 Crypto Crime Report, PurpleSec Ransomware Statistics 2025, IBM Security X-Force Threat Intelligence, The Associated Press, Maine Office of the Attorney General, Missouri Attorney General’s Office, DOJ Press Release: Qakbot Takedown (2025), Sophos State of Ransomware 2024, FBI Internet Crime Complaint Center (IC3), Cybersecurity Dive, Verizon 2025 Data Breach Investigations Report (DBIR), CalMatters, CISA Known Exploited Vulnerabilities (KEV) Catalog and BlackKite Ransomware Report 2025.

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.statista.com, https://www.sophos.com/en-us/state-of-ransomware, https://www.ibm.com/security, https://www.chainalysis.com, https://www.verizon.com/business/resources/reports/dbir/, https://www.cisa.gov/known-exploited-vulnerabilities-catalog, https://www.ic3.gov, https://www.thebusinessresearchcompany.com, https://purplesec.us/ransomware-statistics/, https://www.justice.gov, https://www.cybersecuritydive.com, https://www.blackkite.com .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is ['Ongoing for recent attacks (e.g., Change Healthcare, CDK Global)', 'Resolved for older cases (e.g., WannaCry, NotPetya)', 'Law enforcement actions (e.g., Qakbot, DanaBot takedowns)', 'Private forensic investigations (e.g., CommonSpirit, Medibank)'].

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was UnitedHealth Group (Change Healthcare breach updates), CDK Global customer notifications (2024), HHS advisories for healthcare sector (2024–2025), CISA alerts on ransomware trends (e.g., #StopRansomware), FBI warnings on RaaS and phishing (2025), Aetna committed to equal access to infertility and reproductive health coverage for all members., .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Informed the impacted customers to remain alert, Identity theft protection services were offered, Credit monitoring for affected individuals (e.g., Patelco Credit Union, Healthcorps)Password reset recommendations (e.g., after credential leaks)Fraud alerts for financial data exposure (e.g., Spanish Tax Agency)Healthcare providers’ notifications to patients (e.g., Medibank, CommonSpirit), Eligible California-based members must submit a claim for damages by June 29 and 2026.

Initial Access Broker

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was weeks to months (e.g., APT-style attacks)rapid exploitation (e.g., zero-days like MOVEit).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Human Error in Mailing Processes, unpatched vulnerabilities (e.g., EternalBlue, MOVEit)lack of MFA (e.g., RDP compromises)poor segmentation (e.g., lateral movement in Colonial Pipeline)inadequate backups (e.g., Baltimore’s $18M recovery)third-party risks (e.g., supply chain attacks)human error (e.g., phishing clicks)insufficient employee training (e.g., recognizing phishing), Outdated policy requiring heterosexual intercourse as a prerequisite for fertility treatment coverage, excluding same-sex couples and single individuals..

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was mandatory **MFA** implementationaccelerated **patch management** for KEV vulnerabilities**network segmentation** to limit blast radius**immutable backups** with offline storage**incident response drills** quarterly**threat hunting** for early detection**vendor risk assessments** for third parties**dark web monitoring** for leaked credentials**AI-driven anomaly detection** (e.g., for phishing)**cyber insurance** policy reviews, Policy updated to cover fertility treatments for same-sex couples and single individuals nationally. Payment of damages to affected members..

cve

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=cvshealth' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge