Back to Blog

Change Healthcare: A $22 Billion Company Brought Down by Missing MFA

Prateek SinghFebruary 11, 202611 min read
Change Healthcare: A $22 Billion Company Brought Down by Missing MFA

In February 2024, Change Healthcare was breached using stolen credentials on a system with no MFA. One-third of all Americans' health data was exposed. KAVI requires no MFA — identity IS the authentication.

The Breach

On February 21, 2024, the ALPHV/BlackCat ransomware gang breached Change Healthcare — a subsidiary of UnitedHealth Group that processes 15 billion healthcare transactions annually. The entry point: stolen credentials on a Citrix remote access portal that had no multi-factor authentication.

UnitedHealth CEO Andrew Witty confirmed this during Senate testimony: a single set of stolen credentials, no MFA, full access.

The Impact

  • 100+ million Americans' health data exposed — the largest healthcare breach in U.S. history
  • $22 million ransom paid to ALPHV
  • Weeks of healthcare payment disruptions nationwide
  • Pharmacies couldn't process prescriptions, hospitals couldn't verify insurance
  • Small healthcare providers faced cash flow crises
  • Total estimated cost: $1.6 billion+

Why Traditional Authentication Failed

This breach is almost embarrassingly simple:

  1. Stolen credentials: Username and password obtained (likely from a prior breach)
  2. No MFA: The Citrix portal — a critical remote access system — had no second factor
  3. Static trust: Once authenticated, the attacker had persistent access to move laterally

The CEO of a $22 billion company had to explain to the U.S. Senate why a critical system lacked basic MFA. The answer is systemic: MFA is a bolt-on, not a foundation. It must be actively deployed, maintained, and enforced — and when it's missing from even one system, the entire organization is exposed.

How KAVI Protocol Prevents This

Authentication IS Identity

KAVI doesn't add MFA on top of passwords. It replaces the entire model. There is no password to steal, and there is no MFA to forget to enable. Your behavioral identity is the authentication. It cannot be optional, cannot be misconfigured, cannot be "not yet deployed" on a legacy system.

No Citrix Portal Vulnerability

Under KAVI, a remote access portal authenticates users through their Surprise Signature. An attacker with stolen credentials would fail immediately — their behavioral pattern would not match the legitimate user's signature. No amount of correct usernames and passwords can overcome this.

Continuous Verification Stops Lateral Movement

Even if initial access were somehow obtained, KAVI's continuous authentication would detect the behavioral anomaly during lateral movement. The attacker's interaction patterns — how they navigate systems, the rhythm of their commands, their decision-making cadence — would deviate from the legitimate user's model.

Conclusion

Change Healthcare proves that optional security measures will inevitably be omitted. MFA was available but not deployed. KAVI's behavioral authentication isn't an optional layer — it's the foundation. You can't forget to enable something that's inherent to the protocol itself.

References & Citations

  • U.S. Senate Finance Committee (2024). Testimony of Andrew Witty, CEO UnitedHealth Group.
  • CISA (2024). "#StopRansomware: ALPHV Blackcat." Advisory AA23-353A.
  • UnitedHealth Group (2024). SEC Form 8-K Filing, February 2024.
Share this article

Related Posts