Is Change Healthcare Liable for Millions in Ransomware Losses?

Is Change Healthcare Liable for Millions in Ransomware Losses?

Simon Glairy is a distinguished authority in insurance law and cybersecurity litigation, possessing deep expertise in the intricate mechanics of risk management and the evolving world of Insurtech. With a career focused on how digital failures translate into massive legal liabilities, he has become a go-to strategist for navigating the fallout of systemic cyber events. In light of the high-profile litigation surrounding the 2024 ransomware incident that paralyzed critical healthcare infrastructure, Glairy offers a masterclass in understanding how a single point of failure can lead to a multi-million dollar subrogation claim.

In this discussion, we explore the specific security lapses that allowed a low-level credential to compromise an entire network, the contractual safeguards businesses must adopt to protect against vendor shutdowns, and the legal strategies insurance carriers are using to recover massive payouts. Glairy also provides a detailed look at the logistical nightmare faced by healthcare companies when their “digital plumbing”—from claims processing to check mailing—is suddenly severed.

A single leaked password from a low-level employee can lead to a massive system shutdown. What specific security protocols prevent a basic account from gaining administrative privileges, and how can organizations better monitor forums where stolen credentials are traded?

The most critical protocol to prevent this type of escalation is the Principle of Least Privilege, which ensures that even a customer support employee cannot create accounts with administrative rights. In the case we are seeing unfold, a basic username and password for a Citrix portal was posted in a Telegram group chat dedicated to stolen credentials, providing a wide-open door for threat actors. To stop this, organizations must implement robust Identity and Access Management (IAM) systems that flag and block the creation of any new administrative account that does not follow a strict, multi-person approval workflow. Beyond internal controls, companies need to deploy active “dark web” monitoring services that scan platforms like Telegram and other underground forums for their specific domain credentials. When a hit is found, it should trigger an immediate, automated password reset and a forced session termination for that user to prevent the “entirely foreseeable” infiltration that allows attackers to exfiltrate terabytes of sensitive data.

When critical healthcare vendors suddenly go offline due to a cyberattack, clients often face immense costs for temporary labor and manual processing. What contractual protections should companies demand to cover these sudden expenses, and how do you evaluate the reliability of a vendor’s backup infrastructure?

Companies must insist on specific “Business Continuity” clauses within their Business Services Payer Agreements that go beyond simple uptime guarantees. These clauses should explicitly require the vendor to reimburse the insured for “increased costs of working,” such as the $1,000,000-plus expense incurred by Avesis for retaining alternate vendors and manual internal labor when their primary systems went dark. You evaluate reliability by auditing their “electronic claims clearinghouse” redundancy; if the vendor intentionally makes applications inoperable to contain a breach, they must have a pre-verified secondary site that can handle printing and mailing of Provider Termination Letters or Member ID cards. It is not enough for a vendor to have a backup of the data; they must prove they have the physical capacity to mail Medicare Denial Notices and Explanations of Benefits when their primary digital pipes are severed. The suddenness of a shutdown can feel like a betrayal of trust, so the contract should mandate a transition period or immediate financial penalties to fund the migration to a competitor.

Insurance companies are increasingly taking legal action against third-party vendors to recover payouts made to their policyholders. How does this trend of subrogation change the risk landscape for tech providers, and what specific evidence is necessary to prove “gross negligence” in a cybersecurity context?

This trend essentially turns insurance carriers into aggressive litigants who “step into the shoes” of their insured to hunt down negligent vendors, as seen with Allied World’s recent $1 million federal filing. For tech providers, this means that a single security lapse is no longer just a PR crisis, but a direct financial threat from a well-funded insurance company looking for a refund. To prove “gross negligence” or “willful misconduct,” lawyers look for a total failure to implement industry-standard safeguards, such as the absence of multi-factor authentication (MFA) on a portal that provides access to the core network. When a vendor knows that their services reach large portions of the healthcare industry and yet ignores the most basic security hygiene, it creates a trail of reckless disregard that is hard to defend in court. The emotional toll on the affected business, which has to scramble to mail checks to providers while their vendor stays silent, often serves as a powerful narrative in these complaints to illustrate the severity of the vendor’s breach of duty.

High-profile breaches often reveal that multi-factor authentication was missing on sensitive portals. Beyond MFA, what secondary layers of defense are essential for protecting large-scale data clearinghouses, and how should companies audit the security practices of their business associates to ensure compliance?

Beyond the foundational layer of MFA, large-scale clearinghouses must employ behavioral analytics that can detect when a customer support account starts behaving like a system administrator. If an account suddenly begins moving terabytes of data—a volume that far exceeds a normal employee’s daily tasks—the system should automatically sever the connection and enter a lock-down state. Companies must audit their associates by demanding regular, third-party “Right to Audit” inspections and reviewing Business Associate Agreements (BAA) to ensure they meet the rigorous standards of healthcare privacy laws. These audits should involve “penetration testing” that specifically mimics the path taken by the attackers in recent incidents, such as trying to escalate a low-level login into a full-scale system takeover. It is chilling to realize how much sensitive data can be exfiltrated unnoticed when these secondary layers, such as data loss prevention (DLP) tools, are absent or poorly configured.

When a vendor intentionally suspends services to contain a breach, it can disrupt essential functions like claims processing and check mailing. How should a business prepare for an indefinite loss of external plumbing services, and what are the logistical steps for migrating to alternate vendors?

A business must treat its external vendors as “digital plumbing” that can burst at any moment, necessitating a “break-glass” plan for immediate migration. The first logistical step is maintaining an updated, offline repository of all critical templates, such as Utilization Management Letters and Medicare notices, so they can be handed off to a secondary print-and-mail house within 24 hours. Second, businesses should have pre-negotiated “on-call” contracts with alternate clearinghouses that can step in to process claims and payments to providers if the primary vendor becomes inoperable. The transition is often messy and involves a high sensory overload—phones ringing with provider complaints and the physical stress of manually processing checks—so having a dedicated internal response team trained in these “manual workarounds” is vital. This preparation prevents the “sudden and without warning” service stop from turning into a total business collapse, even if it leads to increased internal expenses.

What is your forecast for the future of liability in the healthcare technology sector as more vendors face multi-district litigation over data security failures?

I forecast a massive shift toward “accountability by default,” where healthcare tech vendors will no longer be able to hide behind limited liability clauses in their contracts. As cases like the one in the District of Minnesota move forward under MDL 3108, we will see a new legal standard emerge where the failure to implement MFA on critical infrastructure is legally equivalent to leaving the front door of a hospital unlocked. Insurance companies will become even more selective, likely refusing to cover vendors who cannot prove “zero-trust” architectures, while subrogation suits will become the primary mechanism for the industry to police itself. We are entering an era where the financial consequences of a “foreseeable and preventable” ransomware incident will be so high that only the most secure vendors will survive the scrutiny of both the courts and the insurance carriers. The days of “security as an afterthought” are officially over, replaced by a landscape where a single leaked password can lead to years of federal litigation and millions in damages.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later