Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
How a Pharmacy Cyberattack is a Warning Sign for Healthcare’s Cybersecurity Vulnerabilities
Last Updated:
March 5, 2026

How a Pharmacy Cyberattack is a Warning Sign for Healthcare’s Cybersecurity Vulnerabilities

By:
Guest Contributor
Share icon
Glitch effectGlitch effectGlitch effect

Early in 2024, the United States healthcare sector was rocked by a devastating cyberattack on Change Healthcare, a pivotal player in health technology processes nationwide. The attack completely disrupted Change Healthcare's operations and sent shockwaves throughout the healthcare sector, impacting millions of Americans who rely on services powered by the affected providers—particularly pharmacies. 

And it all stemmed from just one attack.

Months later, the repercussions still reverberate throughout the industry, highlighting the urgent need for robust cybersecurity measures in healthcare infrastructure. So, where do we go from here?


Key Takeaways

  • The 2024 Change Healthcare ransomware attack disrupted pharmacy operations nationwide, cost providers over $100 million per day in losses, and ultimately resulted in nearly $2 billion in advances paid to affected healthcare organizations.
  • Cyberattacks on healthcare organizations now affect nearly 6 in 10 providers, and the threat continues to grow more sophisticated and frequent into 2025.
  • Pharmacies are uniquely vulnerable because they sit at the intersection of sensitive patient data, financial transactions, and critical prescription workflows — making them high-value targets for ransomware groups.
  • Proactive defenses — including risk assessments, employee training, endpoint protection, and incident response planning — are the most effective tools pharmacies have to avoid becoming the next headline.


What Happened in the 2024 Pharmacy Cyberattack?

The Change Healthcare attack did not happen in isolation — it unfolded over weeks and months, with consequences that rippled across every corner of the healthcare system. Here is a breakdown of how events unfolded:

February 21, 2024 — The Attack Begins. Change Healthcare, the technology division of UnitedHealth Group responsible for healthcare billing and data systems, fell victim to a ransomware attack orchestrated by the cybercriminal group ALPHV/BlackCat. Upon discovery, UnitedHealth Group moved quickly: "Once we became aware of the outside threat, in the interest of protecting our partners and patients, we took immediate action to disconnect Change Healthcare's systems to prevent further impact."

February 22, 2024 — Pharmacy Operations Go Dark Despite the company's claims of a fast response, core functionalities — including electronic prescribing for pharmacy services — remained offline into the following day. For a company that handles approximately 15 billion transactions annually, this was just the beginning.

Late February into Early March 2024 — The Fallout Widens. The system outage blocked millions of patients from accessing vital prescriptions. Pharmacies across the country — from independent community pharmacies to major chains — could not process insurance claims or verify coverage in real time. Patients were turned away or forced to pay out of pocket for medications they depended on daily.

Mid-March 2024 — Financial Pressure Mounts. Even after systems were partially restored, many healthcare providers — especially smaller practices and independent pharmacies — continued facing challenges submitting claims and receiving payments. Giant companies like CVS Health reported ongoing issues with insurance claim processing weeks after the initial attack. Estimates suggested losses exceeding $100 million per day for healthcare providers as system problems persisted.

March 2024 — The Ransom Is Paid Reports confirmed that a ransom of approximately $22 million in Bitcoin was paid to the attackers. Despite the payment, the disruption continued, and a second ransomware group reportedly attempted to extort Change Healthcare with the same stolen data.

Through Mid-2024 — The Recovery Cost. By the time the dust settled, Change Healthcare had paid out nearly $2 billion in advances to help affected healthcare providers cover the financial gap caused by the outage — a staggering cost that does not even account for the ransom itself, legal exposure, or reputational damage. For a company serving 152 million customers, the attack was catastrophic. For the smaller healthcare entities that depended on Change Healthcare as their primary transaction and billing infrastructure, it was existential.

And it was all from just one single attack.


The Continued Fallout

As you might imagine, the system outage affected millions, temporarily blocking access to vital prescriptions. But even after systems were fully restored, many healthcare providers, especially smaller ones, continued to face challenges in submitting claims and receiving payments well into the middle of March. Even giant companies like CVS Health reported issues with processing insurance claims for weeks after the ransomware attack. Plus, the outage's financial toll was staggering, with some estimates suggesting losses of over $100 million per day for healthcare providers as the system issues persisted. 

By the time it was all over, ChangeHealth had paid nearly $2 billion in advances to help affected healthcare providers—and that’s aside from the ransom amount that totaled roughly $22 million in Bitcoin. So, yes, for a company with 152 million customers, the ransomware attack was devastating. But it was also catastrophic for the huge number of healthcare entities relying on them for their main transactions and processes. 

And, again, it was all from just one single attack. 

__wf_reserved_inherit


The Response

It’s not a secret that cyber attacks on healthcare organizations skyrocketed during the onset of the COVID-19 pandemic. But even after the pandemic's peak, attacks have persisted and intensified, now affecting nearly 6 in 10 healthcare organizations. Cyber attacks have become more frequent and sophisticated, targeting sensitive patient data, disrupting critical healthcare services, and jeopardizing patient care.

The Change Healthcare cyberattack is yet another example, but the backlash has been much more urgent and far-reaching than previous notable attacks. The attack on Change Healthcare triggered strong responses from prominent figures like Senate Majority Leader Chuck Schumer and leading medical organizations such as the American Medical Association (AMA) and the American Hospital Association (AHA). Each issued urgent calls to action, emphasizing the breach's massive impact on physicians and healthcare delivery nationwide.


New Government Action 

Unsurprisingly, ransomware attacks like the one on Change Healthcare have spurred the Department of Health and Human Services (HHS) to further intensify its evolving cybersecurity guidelines. These new directives stress proactive approaches like risk assessments, employee training, and more robust incident response plans. 

HHS now requires faster reporting of ransomware incidents, imposing penalties for non-compliance. Penalties have become more of a focus for the department recently. In a notable case in late 2023, HHS settled its first HIPAA violation linked to ransomware with Doctors’ Management Services. This Massachusetts-based medical management firm faced a $100,000 fine for insufficient security measures and failure to comply with HIPAA regulations. And while that’s definitely a hefty fine, expect it to be small compared to future punishments—HHS has vowed to bolster penalties and enforcement efforts, signaling stricter consequences for compliance violations stemming from ransomware attacks.

How to Protect Your Pharmacy from Cyberattacks

Pharmacies occupy a uniquely vulnerable position in the healthcare ecosystem. They manage sensitive patient health data, process high volumes of financial transactions, and rely on interconnected systems — from pharmacy management software to insurance billing platforms — that create multiple potential entry points for attackers.

Here is what pharmacies can do right now to reduce their exposure:

1. Conduct Regular Risk Assessments

You cannot defend what you do not understand. A thorough risk assessment identifies your most vulnerable systems, surfaces gaps in your security posture, and helps you prioritize where to invest your defenses. This is not a one-time exercise — it should be conducted at least annually and after any significant change to your technology environment.

2. Train Your Staff — Consistently

Human error remains one of the leading causes of successful cyberattacks. Phishing emails, social engineering, and credential theft all rely on someone in your organization making a mistake. Regular, role-specific cybersecurity training helps your team recognize threats before they become incidents. Make security awareness training part of your culture, not just an annual checkbox.

3. Implement Multi-Factor Authentication (MFA) Everywhere

The Change Healthcare attack reportedly gained initial access through stolen credentials in the absence of MFA. Implementing MFA across all systems — including remote access tools, email, and pharmacy management platforms — is one of the most effective and low-cost defensive steps available. There is very little justification for not having it in place.

4. Invest in Endpoint Detection and Response (EDR)

Pharmacies typically run a mix of older and newer devices, many of which may not receive consistent security updates. Endpoint detection and response tools monitor devices in real time, flagging suspicious activity before it can spread. This is especially critical for pharmacies using legacy systems that may not receive regular patches from vendors.

5. Have an Incident Response Plan — and Test It

When an attack happens, the first 30 minutes matter enormously. Organizations that have a practiced, documented incident response plan contain damage faster and recover more quickly than those that are figuring it out in real time. Your plan should define who gets called, what systems get isolated, how you communicate with patients and staff, and how you engage outside cybersecurity expertise.

6. Understand Your Third-Party Risk

Change Healthcare was a third-party vendor. So was UNFI. Your pharmacy's security is only as strong as the weakest link in your vendor ecosystem. Know what third-party platforms you rely on, what data they access, and what their security posture looks like. Ask vendors about their incident response capabilities and ensure contracts address data security responsibilities clearly.

7. Back Up Your Data — and Keep Backups Offline

Ransomware works by encrypting your data and demanding payment to restore access. Organizations with clean, recent, offline backups have far more leverage in a ransomware situation — they can restore operations without paying the ransom. Test your backups regularly to ensure they are actually recoverable when you need them.

8. Stay Current on Compliance Requirements

HHS is actively strengthening HIPAA enforcement related to ransomware and cybersecurity incidents. Staying ahead of compliance requirements is not just about avoiding fines — it is about building the security foundation that actually protects your patients and your business.



Now What?

The cyber attack on Change Healthcare was not the first of 2024, and it definitely won’t be the last. In late April, Canadian pharmacy chain London Drugs was forced to close all 79 locations as a precaution after what they described as a “cybersecurity incident.” Despite the shutdown, the chain assured customers and employees there was no evidence of any compromise to their data. According to a statement, the company “undertook countermeasures to protect its network and data, including retaining leading third-party cybersecurity experts to assist with containment, remediation and to conduct a forensic investigation.” London Drugs’ prompt and proactive response likely averted what could’ve been a much different outcome. 

The ransomware attack on Change Healthcare and others in the healthcare sector serves as a wake-up call to the pressing need for improved cybersecurity within the healthcare industry. After all, at this point, cybersecurity isn’t just a technological issue; it’s a matter of your health and safety. It's crucial that healthcare organizations prioritize and invest in cybersecurity defenses to safeguard patient data and critical systems. This includes implementing comprehensive risk management strategies, regular security assessments, and employee training programs to enhance security awareness. 

Find out how the Huntress Security Platform can help safeguard patient data, protect critical infrastructure, and ensure the integrity of the healthcare system in the midst of constant threats. 

Request a free demo to see for yourself. 


Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • A Wake-Up Call for Healthcare Cybersecurity

    Discover how the Health Infrastructure Security and Accountability Act aims to enforce stricter cybersecurity standards across the healthcare sector.
  • Cybersecurity Threats in Healthcare: The 2025 Huntress Report

    These are the top cybersecurity threats in healthcare, according to Huntress’s 2025 survey of IT pros. Read the full report and learn how to avoid them.
  • Healthcare Held Hostage: Fighting the Plague of Ransomware

    Ransomware is spreading like wildfire. Learn about its growing threat to healthcare, its impact on patient care, and how Huntress managed solutions can better protect your organization from cyberattacks.
  • Interconnected Devices Inject Risk into Patient Safety

    By adopting a managed EDR and partnering with experts like Huntress, healthcare providers can safeguard patient data and ensure uninterrupted patient care.
  • Deceitful Tactics and Honest Mistakes: Remedying Human Error Amid the Rise of Social Engineering Across Healthcare

    Understand the impact of human error across healthcare, and discover how Huntress’ managed solutions can better defend your organization from social engineering scams.
  • Examining the Impact of Ransomware on the Healthcare Sector and New HHS Guidelines

    Learn what’s causing a surge in ransomware attacks on healthcare organizations and find out how new guidelines from HHS are addressing the problem.
  • The Health Sector is Under Attack. But You Can Fight Back.

    Healthcare organizations are facing cyber threats at an alarming rate, and as the U.S. Department of Health and Human Services (HHS) introduces new measures for cybersecurity, it’s also time for small- and mid-sized organizations to be proactive in their defense.
  • First, Do No Harm: When and Where SIEM Fits in Healthcare IT Settings

    Understanding SIEM’s benefits, limitations, and best applications in a strong healthcare security stack

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy