Change Healthcare: A $22 Billion Company Brought Down by Missing MFA

In February 2024, Change Healthcare was breached using stolen credentials on a system with no MFA. One-third of all Americans' health data was exposed. KAVI requires no MFA — identity IS the authentication.
The Breach
On February 21, 2024, the ALPHV/BlackCat ransomware gang breached Change Healthcare — a subsidiary of UnitedHealth Group that processes 15 billion healthcare transactions annually. The entry point: stolen credentials on a Citrix remote access portal that had no multi-factor authentication.
UnitedHealth CEO Andrew Witty confirmed this during Senate testimony: a single set of stolen credentials, no MFA, full access.
The Impact
- 100+ million Americans' health data exposed — the largest healthcare breach in U.S. history
- $22 million ransom paid to ALPHV
- Weeks of healthcare payment disruptions nationwide
- Pharmacies couldn't process prescriptions, hospitals couldn't verify insurance
- Small healthcare providers faced cash flow crises
- Total estimated cost: $1.6 billion+
Why Traditional Authentication Failed
This breach is almost embarrassingly simple:
- Stolen credentials: Username and password obtained (likely from a prior breach)
- No MFA: The Citrix portal — a critical remote access system — had no second factor
- Static trust: Once authenticated, the attacker had persistent access to move laterally
The CEO of a $22 billion company had to explain to the U.S. Senate why a critical system lacked basic MFA. The answer is systemic: MFA is a bolt-on, not a foundation. It must be actively deployed, maintained, and enforced — and when it's missing from even one system, the entire organization is exposed.
How KAVI Protocol Prevents This
Authentication IS Identity
KAVI doesn't add MFA on top of passwords. It replaces the entire model. There is no password to steal, and there is no MFA to forget to enable. Your behavioral identity is the authentication. It cannot be optional, cannot be misconfigured, cannot be "not yet deployed" on a legacy system.
No Citrix Portal Vulnerability
Under KAVI, a remote access portal authenticates users through their Surprise Signature. An attacker with stolen credentials would fail immediately — their behavioral pattern would not match the legitimate user's signature. No amount of correct usernames and passwords can overcome this.
Continuous Verification Stops Lateral Movement
Even if initial access were somehow obtained, KAVI's continuous authentication would detect the behavioral anomaly during lateral movement. The attacker's interaction patterns — how they navigate systems, the rhythm of their commands, their decision-making cadence — would deviate from the legitimate user's model.
Conclusion
Change Healthcare proves that optional security measures will inevitably be omitted. MFA was available but not deployed. KAVI's behavioral authentication isn't an optional layer — it's the foundation. You can't forget to enable something that's inherent to the protocol itself.
References & Citations
- U.S. Senate Finance Committee (2024). Testimony of Andrew Witty, CEO UnitedHealth Group.
- CISA (2024). "#StopRansomware: ALPHV Blackcat." Advisory AA23-353A.
- UnitedHealth Group (2024). SEC Form 8-K Filing, February 2024.
Related Posts

Colonial Pipeline: How a Single Stolen Password Shut Down America's Fuel Supply
In May 2021, a single compromised VPN password led to the largest fuel pipeline shutdown in U.S. history. DarkSide ransomware demanded $4.4 million. KAVI Protocol would have made this attack structurally impossible.

3 Billion Accounts: The Yahoo Breach That Proved Passwords Cannot Scale
The largest data breach in history exposed every single Yahoo account — 3 billion credentials. Bcrypt couldn't save them. KAVI's zero-storage model means there's nothing to breach.

LastPass: When the Password Manager Itself Gets Breached
In 2022, LastPass — trusted by 33 million users to protect their passwords — was breached. Encrypted vaults were stolen. The guardian of secrets became the single point of failure.