From Digital Age to Nano Age. WorldWide.

Tag: UnitedHealth Group

Robotic Automations

UnitedHealth data breach should be a wakeup call for the UK and NHS | TechCrunch


The ransomware attack that has engulfed U.S. health insurance giant UnitedHealth Group and its tech subsidiary Change Healthcare is a data privacy nightmare for millions of U.S. patients, with CEO Andrew Witty confirming this week that it may impact as much as one-third of the country.

But it should also serve as a wakeup call for countries everywhere, including the U.K. where UnitedHealth now plies its trade via the recent acquisition of a company that manages data belonging to millions of NHS (National Health Service) patients.

As one of the largest health care companies in the U.S., UnitedHealth is well known domestically, intersecting with every facet of the healthcare industry from insurance and billing and winding all the way through the physician and pharmacy networks — it’s a $500 billion juggernaut, and the 11th largest company globally by revenue. But in the U.K., UnitedHealth is practically unknown, mostly because it’s not had much business across the pond — until six months ago.

After a 16-month regulatory process ending in October, UnitedHealth subsidiary Optum UK, via an affiliate called Bordeaux UK Holdings II Limited, finally took ownership of EMIS Health in a $1.5 billion deal. EMIS Health provides software that connects doctors with patients, allowing them to book appointments, order repeat prescriptions, and more. One of these services is Patient Access, which claims some 17 million registered users who collectively made 1.4 million family doctor appointments through the app last year and ordered north of 19 million repeat prescriptions.

There’s nothing to suggest that U.K. patient data is at risk here — these are different subsidiaries, with different setups, under different jurisdictions. But according to his senate testimony on Wednesday, Witty blamed the hack on the fact that since UnitedHealth acquired Change Healthcare in 2022, it hadn’t updated its systems — and within those systems was a server that didn’t have multi-factor authentication (MFA) enabled.

We know that hackers stole health data using “compromised credentials” to access a Change Healthcare Citrix portal which had been intended for employees to access internal networks remotely. Incredibly, Witty said that the company was still working to understand why MFA wasn’t enabled, two months after the attack. This doesn’t inspire a great deal of confidence for U.K. health care professionals and patients using EMIS Health under the auspices of its new owners.

This isn’t an isolated case.

Separately this week, 25-year-old hacker Aleksanteri Kivimäki was jailed for more than six years for infiltrating a company called Vastaamo in 2020, stealing health care data belonging to thousands of Finnish patients and attempting to extort and blackmail both the company and affected patients.

Whether ransom attacks prove successful or not, they are ultimately lucrative — payments to perpetrators reportedly doubled to more than $1 billion in 2023, a record-breaking year by many accounts. During his testimony, Witty confirmed previous reports that UnitedHealth made a $22 million ransom payment to its hackers.

Health data as valuable commodity

But the biggest takeaway from all this is that personal data — particularly health data — is a huge global commodity, and it should be protected accordingly. However, we keep seeing incredibly poor cybersecurity hygiene, which should be a concern for everyone.

As TechCrunch wrote a couple of months back, it’s getting increasingly difficult to access even the most basic form of healthcare on the state-funded NHS without agreeing to give private companies access to your data — whether that’s a billion-dollar multinational, or a venture-backed startup.

There might be legitimate operational and practical reasons why working with the private sector makes sense, but the reality is such partnerships increase the attack surface that bad actors can target — regardless of whatever obligations, policies and promises a company might have in place.

Many U.K. family doctor surgeries now require patients to use third-party triaging software to make appointments, and unless you peruse the fine print of the privacy policies with a fine-toothed comb, it’s often not clear who the patient is actually doing business with.

Digging into the privacy policy of one triaging service provider called Patchs Health, which says it supports over 10 million patients across the NHS, reveals that it is merely the data “sub-processor” responsible for developing and maintaining the software. The main data processor contracted to deliver the service is actually rivate equity-backed company called Advanced, which was hit by a ransomware attack two years ago, forcing NHS services offline. Similar to the UnitedHealth attack, legitimate credentials were used to access a Citrix server.

You don’t have to squint to see the parallels between what has happened with UnitedHealth, and what could happen in the U.K. with the myriad private companies striking partnerships with the NHS.

Finland also serves as a prescient reminder as the NHS creeps deeper into the private realm. Dubbed one of the country’s biggest ever crimes, the Vastaamo data breach came about after a now-defunct private psychotherapy company was sub-contracted by Finland’s public health care system. Aleksanteri Kivimäki infiltrated an insecure Vastaamo database, and after Vastaamo refused to pay a reported €450,000 Bitcoin ransom, Kivimäki attempted to blackmail thousands of patients, threatening to release intimate therapy notes.

In the investigation that followed, Vastaamo was found to have wholly inadequate security processes in place. Its patient database was exposed to the open internet, including unencrypted sensitive data such as contact information, social security numbers, and therapist notes. The Finnish data protection ombudsman noted that the most likely cause for the breach was an “unprotected MySQL port in the database,” where the root user account wasn’t password protected. This account enabled unbridled database access from any IP address, and the server had no firewall in place.

In the U.K., there have been well-vocalized concerns around how the NHS is opening access to data. The most high-profile partnership came just last year, when Peter Thiel-backed big data analytics company Palantir was awarded massive contracts by NHS England to help it transition to a new Federated Data Platform (FDP) — much to the chagrin of doctors and data privacy advocates across the country.

It all seems somewhat inevitable though. Privacy advocates shout and scream, but big companies with lots of cash keep getting the keys to sensitive data belonging to millions of people. Promises are made, assurances given, processes implemented — then someone forgets to set up basic MFA, or they leave an encryption key under the doormat, and everything blows up.

Rinse and repeat.




Software Development in Sri Lanka

Robotic Automations

Haun Ventures is riding the bitcoin high | TechCrunch


Blockchain startups were red-hot when Katie Haun left Andreessen Horowitz in 2021 to launch her own crypto-focused venture firm. But shortly after Haun announced that Huan Ventures’ two funds totalled $1.5 billion, cryptocurrency prices cratered, and FTX collapsed. 

Despite having a massive arsenal of dry powder, Haun Ventures didn’t rush to scoop up stakes in crypto and web3 on the cheap, and many observers wondered when the firm would pick up its deployment pace.

While Haun Ventures says it wasn’t exactly sitting on its hands (and capital) through crypto’s downturn, the firm was perhaps more cautious than it initially intended. 

But now that bitcoin prices have rebounded to their previous highs, Haun Ventures’ investment activity is increasing dramatically. Including some of its token positions, the firm has made 48 investments across its early-stage $500 million and $1 billion later-stage acceleration funds, Haun Ventures told TechCrunch. 

The firm’s latest investment is Agora, an app that streamlines voting and other decision-making for decentralized autonomous organizations. The firm led a $5 million seed round into Agora on Tuesday, with participation from Seed Club, Coinbase Ventures, Balaji Srinivasan and others.

Sam Rosenblum, a partner and investment team lead at Haun Ventures, said that a significant impediment to DAO participation had been the lack of a simple user interface that allows members to approve (or vote on) the implementation of software upgrades to the protocols they are governing.

The process was highly fragmented. Certain decisions were made in a separate Discord channel, then “you then [the community would] go somewhere else to take a vote on allocating dollars in the treasury towards a certain project,” Rosenblum said. 

Agora solves this issue for DAO members by providing an easy-to-use community and protocol governance solution. “Historically, if you wanted to participate in resource allocation of a protocol treasury, you had to do a bunch of on-chain actions yourself, which probably means you have hardware and software setup that most people don’t have,” Rosenblum said. 

Agora is supposed to make DAO participation straightforward for non-technical users. Rosenblum compared it to Coinbase, which simplified coin trading for most people.

The company was founded in 2022 by Charlie Feng, who co-founded fintech Clearco; Coinbase product designer Yitong Zhang; and software engineer Kent Fenwick. 

Agora, which is essentially a SaaS offering, is already used by protocols such as Optimism, ENS and Uniswap.

Rosenblum explained that these protocols are happy to pay for Agora because it helps lower the barrier to participation in their community. 

While activity is certainly accelerating in the crypto world, Rosenblum didn’t say exactly when Haun Ventures will be done deploying its current fund. But he did say that investing will continue into next year.


Software Development in Sri Lanka

Robotic Automations

UnitedHealth CEO tells Senate all systems now have multi-factor authentication after hack | TechCrunch


UnitedHealth Group Chief Executive Officer Andrew Witty told senators on Wednesday that the company has now enabled multi-factor authentication on all the company’s systems exposed to the internet in response to the recent cyberattack against its subsidiary Change Healthcare.

The lack of multi-factor authentication was at the center of the ransomware attack that hit Change Healthcare earlier this year, which impacted pharmacies, hospitals and doctors’ offices across the United States. Multi-factor authentication, or MFA, is a basic cybersecurity mechanism that prevents hackers from breaking into accounts or systems with a stolen password by requiring a second code to log in.

In a written statement submitted on Tuesday ahead of two congressional hearings, Witty revealed that hackers used a set of stolen credentials to access a Change Healthcare server, which he said was not protected by multi-factor authentication. After breaking into that server, the hackers were then able to move into other company systems to exfiltrate data, and later encrypt it with ransomware, Witty said in the statement.

Today, during the first of those two hearings, Witty faced questions about the cyberattack from senators on the Finance Committee. In response to questions by Sen. Ron Wyden, Witty said that “as of today, across the whole of UHG, all of our external-facing systems have got multi-factor authentication enabled.”

“We have an enforced policy across the organization to have multi-factor authentication on all of our external systems, which is in place,” Witty said.

When asked to confirm Witty’s statement, UnitedHealth Group’s spokesperson Anthony ​​Marusic told TechCrunch that Witty “was very clear with his statement.”

Witty blamed the fact that Change Healthcare’s systems had not yet been upgraded after UnitedHealth Group acquired the company in 2022.

“We were in the process of upgrading the technology that we had acquired. But within there, there was a server, which I’m incredibly frustrated to tell you, was not protected by MFA,” Witty said. “That was the server through which the cybercriminals were able to get into Change. And then they led off a ransomware attack, if you will, which encrypted and froze large parts of the system.”

Contact Us

Do you have more information about the Change Healthcare ransomware attack? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.

Witty also said that the company is still working on understanding exactly why that server did not have multi-factor authentication enabled.

Wyden criticized the company’s failure to upgrade the server. “We heard from your people that you had a policy, but you all weren’t carrying it out. And that’s why we have the problem,” Wyden said.

UnitedHealth has yet to notify people that were impacted by the cyberattack, Witty said during the hearing, arguing that the company still needs to determine the extent of the hack and the stolen information. As of now, the company has only said that hackers stole personal and health information data of “a substantial proportion of people in America.”

Last month, UnitedHealth said that it paid $22 million to the hackers who broke into the company’s systems. Witty confirmed that payment during the Senate hearing.

On Tuesday afternoon, Witty also appeared in a House Energy and Commerce committee, where he revealed that “maybe a third” of Americans had their personal health information stolen by the hackers


Software Development in Sri Lanka

Robotic Automations

United HealthCare CEO says 'maybe a third' of U.S. citizens were affected by recent hack | TechCrunch


Two months after hackers broke into Change Healthcare systems stealing and then encrypting company data, it’s still unclear how many Americans were impacted by the cyberattack.

Last month, Andrew Witty, the CEO of Change Healthcare’s parent company UnitedHealth Group, said that the stolen files include the personal health information of “a substantial proportion of people in America.”

On Wednesday, during a House hearing, when Witty was pushed to give a more definitive answer, testifying that the breach impacted “I think, maybe a third [of Americans] or somewhere of that level.”

Witty said he was reluctant to give a more precise answer because the company is still investigating the breach and trying to figure out exactly how many people were affected.

UnitedHealth’s spokesperson Anthony Marusic did not immediately respond to a request for comment on Witty’s estimate.

During a hearing in the Senate earlier on Wednesday, Witty said that it will likely take “several months,” before the company can begin notifying victims of the data breach.

In a written statement filed by Witty ahead of the two hearings, the CEO wrote that “so far, we have not seen evidence of exfiltration of materials such as doctors’ charts or full medical histories among the data.”

According to Witty’s testimony, the hackers “used compromised credentials to remotely access a Change Healthcare Citrix portal,” which was not protected by multi-factor authentication, a basic cybersecurity measure that adds an extra step to log into accounts and systems.

Had that portal had multi-factor authentication enabled, the breach may not have happened. Several Senators grilled Witty on that failure, asking him whether UnitedHealth and Change Healthcare systems are now protected with multi-factor authentication.

During the Senate hearing, Witty said: “We have an enforced policy across the organization to have multi factor authentication on all of our external systems, which is in place.”

The House hearing is underway as of this writing, and we will update this story as more information becomes available.


Software Development in Sri Lanka

Back
WhatsApp
Messenger
Viber