Security News > 2024 > March > Possible China link to Change Healthcare ransomware attack

A criminal claiming to be an ALPHV/BlackCat affiliate - the gang responsible for the widely disruptive Change Healthcare ransomware infection last month - may have ties to Chinese government-backed cybercrime syndicates.
"Some of our HUMINT sources with direct contact to Notchy says it's high probability that Notchy is associated with China Nation-State groups," Menlo's threat intel team said in a report Wednesday.
The report includes a screenshot from Ramp user Notchy claiming to be the affiliate responsible for the Change ransomware attack.
"Without more details on the Change Healthcare attack, we are unable to determine if this malware was used against them or not."
The ransomware infection, in addition to having a material impact on UnitedHealth, has had devastating effects on the US healthcare system and the patients it serves.
The association, whose members include about 5,000 US hospitals and other healthcare organizations, has urged Congress to pass a financial assistance program and provide "Immediate access to funding" for all providers impacted by what it describes as the "Worst cyberattack on our healthcare system in history." .
News URL
Related news
- China-based Silver Fox spoofs healthcare app to deliver malware (source)
- Southern Water says Black Basta ransomware attack cost £4.5M in expenses (source)
- Qilin ransomware claims attack at Lee Enterprises, leaks stolen data (source)
- Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (source)
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Hunters International ransomware claims attack on Tata Technologies (source)
- Toronto Zoo shares update on last year's ransomware attack (source)
- China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access (source)
- Feds name and charge alleged Silk Typhoon spies behind years of China-on-US attacks (source)
- Ransomware gang creates tool to automate VPN brute-force attacks (source)