Strictly Confidential — Material Disclosure Under Executed Mutual NDA Only
SECTOR / 06 · HOSPITALS & HEALTH SYSTEMS

Hospitals. The only sector where a successful adversary affects mortality statistics.

276 million healthcare records were breached in 2024 — 81% of the US population, in a single year. The Change Healthcare attack alone affected 192 million individuals. Healthcare carries the highest single-incident breach cost of any industry, for the 14th year running. PULSE engineers infrastructure in which protected health information cannot be exfiltrated by an adversary that has already breached the perimeter.

Hospitals & Health Systems — 2024 Threat Profile

2024 was the worst year on record for breached healthcare records — by a margin of 64% over the previous record.

276M
Healthcare records breached, exposed, or impermissibly disclosed in 2024 — 81% of the population of the United States. A 64% increase over 2023's previous record-breaking total.
HIPAA Journal 2024 Healthcare Data Breach Report
USD 9.77M
Average breach cost in healthcare in 2024 — the highest of any industry sector, for the 14th consecutive year. Despite a 10.6% year-on-year reduction, healthcare retains the highest absolute cost.
IBM Cost of a Data Breach 2024
192M
Individuals affected by the Change Healthcare ransomware attack (February 2024) — the largest single healthcare data breach in history, affecting an estimated one in three Americans.
HHS OCR breach portal
14mega
Healthcare data breaches affecting more than 1 million records each, in 2024 alone — collectively exposing the records of 237.9 million US residents (69.97% of the US population).
HIPAA Journal 2024 report
Threat Landscape

Healthcare carries the highest single-incident breach cost of any industry. And the consequences are not measurable in dollars alone.

The 2024 healthcare cybersecurity year is defined by a single event: the February 2024 ransomware attack on Change Healthcare, a UnitedHealth Group subsidiary that processes approximately one in three US healthcare claims. The attackers — affiliated with the BlackCat / ALPHV ransomware-as-a-service operation — gained access on February 12, encrypted files on February 21, and exfiltrated the protected health information of an estimated 192.7 million individuals. The breach took out the country's largest healthcare claims-processing platform for over a month, disrupting prescription processing, insurance verification, and provider payment across the entire US healthcare system. [01]

The Change Healthcare incident accounted for 69% of the year's total breached records. Even excluding that single incident, 2024 saw approximately 85 million healthcare records breached — itself a record-equivalent year. The 14 mega-breaches affecting more than 1 million records each collectively exposed 237.9 million records, equivalent to 69.97% of the US population. [02]

In 2024, healthcare breaches affected an average of 792,226 individuals every day. In 2024, healthcare cybersecurity spend rose. The two facts coexist.

The Verizon 2024 DBIR identified errors as responsible for 45% of healthcare-industry breaches, with personal health information commonly exposed. Misuse of privilege was also significant. Hacking and other IT incidents dominated, accounting for 81.2% of large 2024 breaches and at least 259 million breached records. The average size of a hacking incident in 2024 was 439,796 records.

The threat-actor profile in healthcare differs from finance. Where financial-sector adversaries are dominantly financially motivated criminal groups, healthcare attracts a wider mix: financially motivated ransomware operators (who pay attention to the sector's reduced ability to refuse payment given patient-safety implications), nation-state actors (who target pharmaceutical R&D and clinical-trial data), and insiders.

Common Attack Vectors

Healthcare attacks concentrate in vectors amplified by sector-specific operational realities.

The combination of life-critical operational continuity, regulatory complexity, and structural underinvestment in cybersecurity (relative to financial services) produces a target profile uniquely advantageous to attackers.

VECTOR / 01

Ransomware Targeting Operational Systems

Healthcare ransomware operators specifically target electronic medical record (EMR) systems, prescription processing, and laboratory ordering — knowing that hospitals cannot operate without them and patient-safety considerations increase pressure to pay. The 2024 Ascension Health attack took its EMR offline for over a month.

278% increase in healthcare ransomware attacks (2018–2023) — HHS OCR
VECTOR / 02

Business Associate Compromise

HIPAA "business associates" — third-party service providers handling PHI — are responsible for an outsized share of breach impact. The Change Healthcare incident affected 192M individuals via a single business associate. The Eye Care Leaders ransomware attack (2022) affected 39+ HIPAA-covered entities through a single EMR vendor.

56% of breached records came via business associates in 2024 — HIPAA Journal
VECTOR / 03

Phishing as Initial Access

In a recent ransomware report cited by HHS, phishing was the most common initial access vector for ransomware attacks (45% of respondents identifying phishing as the entry point in at least one of their attacks). Healthcare workforce training and email security have not reduced the success rate sufficient to materially lower breach incidence.

45% of ransomware attacks initiated via phishing — sector survey
VECTOR / 04

MOVEit / Cl0p Mass Exploitation

The 2023 Cl0p mass-exploitation campaign of MOVEit Transfer affected the healthcare sector heavily — 20.1% of MOVEit-affected organisations were in health, second only to education at 39.1%. The campaign demonstrated that supply-chain compromise of file-transfer infrastructure could affect hundreds of healthcare organisations simultaneously.

20.1% of MOVEit-affected organisations in health — Emsisoft
Operational and Patient-Safety Impact

In healthcare, the breach extends to patient outcomes.

The IBM 2024 study found 70% of breached organisations reported significant or moderate operational disruption. In healthcare, the operational disruption translates to deferred surgeries, ambulance diversion, and extended emergency-department wait times. A 2023 study published in JAMA Network Open found statistically significant increases in 30-day mortality at hospitals affected by ransomware, although the precise causal mechanism remains debated.

The regulatory framework is dense. In the United States, HIPAA imposes a 60-day breach notification requirement for breaches involving 500+ individuals (with HHS OCR notification, individual notification, and media notification all required). State-level breach notification laws apply in parallel. The 2024 proposed update to the HIPAA Security Rule would mandate multi-factor authentication, encryption at rest and in transit, network segmentation, and other measures — bringing HIPAA Security closer to the controls expected in financial services.

In the European Union, GDPR Article 33 imposes a 72-hour breach notification window. The EU's Network and Information Systems Directive (NIS2), effective October 2024, designates healthcare as an "essential entity" sector with specific cybersecurity-governance and incident-reporting obligations. The 2024 European Health Data Space (EHDS) regulation creates a new harmonised framework for health-data exchange across EU member states.

In Australia, the Privacy Act 1988 imposes notification obligations through the Notifiable Data Breaches scheme, with maximum penalties of AUD 50 million for serious or repeated interference with privacy following the Privacy Legislation Amendment (Enforcement and Other Measures) Act 2022. The Australian Cyber Security Centre's Annual Cyber Threat Report consistently ranks healthcare among the most-targeted sectors.

Reframing

Hospital cybersecurity is the only domain in which a successful adversary directly affects mortality statistics. The architectural answer should match the stake.

The PULSE Position

In a PULSE-substrate hospital environment, protected health information cannot be exfiltrated by an adversary that has already breached the perimeter.

The principal target of healthcare-sector attack is the protected health information of the institution's patients. PHI is functionally non-replaceable: a leaked record of a cancer diagnosis, a substance-use treatment, a reproductive-health procedure, or a mental-health admission cannot be unleaked. The harm to the affected individual extends across the rest of their life. The harm to the institution's relationship with that individual is similarly permanent.

HIPAA Security Rule §164.312(a)(2)(iv) requires covered entities to implement encryption of electronic PHI as an addressable safeguard. The implicit assumption is that "encrypted PHI" is a recoverable state — the data exists, in protected form, on the institution's infrastructure. The Change Healthcare breach, the Ascension breach, the Anthem breach, and every major healthcare breach of the past decade have all involved environments in which the data the adversary sought existed in some recoverable form.

PULSE proposes a different architectural commitment. In a PULSE-substrate hospital environment, the protected health information of any specific patient at any specific moment exists only in the form, location, and access scope necessary for the specific clinical operation in question. An adversary infiltrating the EMR, the claims-processing platform, the imaging archive, or the business-associate chain does not encounter encrypted PHI they cannot read. They encounter the absence of recoverable PHI entirely.

The means is the trade secret. We disclose it under executed NDA only.

Strategic Briefing — Available Under NDA

Hospital and health-system PULSE deployment, HIPAA / NIS2 / EHDS alignment, and quantified breach-residual model.

Architectural-fit assessment for academic medical centres, integrated delivery networks, multi-hospital systems, and specialty providers. Quantified residual-PHI-disclosure model under PULSE substrate. Cross-jurisdictional regulatory alignment matrix (HIPAA Security Rule / EU NIS2 / EU EHDS / Australia Privacy Act / Singapore PHMC). Reference architecture for EMR substrate, claims-processing infrastructure, and clinical-trial data exchange.

Available under executed NDA →
Sources

All statistics on this page are drawn from publicly available reports issued by recognised industry bodies, regulators, and security research organisations. References are listed below for verification.

  1. [01]HIPAA Journal 2024 Healthcare Data Breach Report (analysis of US Department of Health and Human Services Office for Civil Rights breach portal data, January 2025).
  2. [02]UnitedHealth Group 8-K SEC filing on Change Healthcare ransomware incident (February 2024) and subsequent OCR breach portal disclosure of 192.7 million affected individuals.
  3. [03]IBM Cost of a Data Breach Report 2024 (Ponemon Institute, sponsored by IBM, July 2024) — covering 604 organisations across 16 countries and 17 industries between March 2023 and February 2024.
  4. [04]Verizon 2024 Data Breach Investigations Report — analysis of 30,458 security incidents and 10,626 confirmed breaches across 94 countries.
  5. [05]Verizon 2024 DBIR — Healthcare Industry Snapshot.
  6. [06]Emsisoft analysis of the Cl0p / MOVEit Transfer mass-exploitation campaign (CVE-2023-34362) — affected sectors and victim count breakdown.
  7. [07]US Department of Health and Human Services Office for Civil Rights — HIPAA Security Rule, 45 CFR §§ 164.302–164.318.
  8. [08]US Department of Health and Human Services — Proposed update to HIPAA Security Rule (December 2024).
  9. [09]European Union — Network and Information Systems Directive 2 (NIS2), Directive (EU) 2022/2555, applicable from October 2024.
  10. [10]European Health Data Space Regulation (EHDS), Regulation (EU) 2025/327.

PULSE Digital Security cites these sources for context only. Citation does not imply endorsement of, or affiliation with, any cited organisation. All trademarks remain the property of their respective owners.