Change Healthcare’s ransomware attack in February 2024 plunged hospitals into chaos. Ninety-two million calls failed, including 25,000 emergency 911 calls. One hundred ninety million patient records were locked and sometimes exfiltrated. Billing, labs, and patient-care systems ground to a halt for weeks. Cleanup and legal costs soared into the billions, while public trust evaporated.
The FCC’s 2025 report blamed three critical failings: delayed detection, fractured coordination, and missing automation. With HIPAA fines and 2025’s DORA resilience rules looming, every healthcare organization must overhaul its incident response.
Attackers slipped in on February 18 via a phishing email to a vendor. Without automated alerts, the ransomware spread to core servers before any alarm. Staff discovered encrypted files only when they could not access patient charts. Billing and lab reporting halted immediately. Clinics resorted to paper records. Full restoration took six weeks and cost over $1.5 billion in lost revenue, compliance penalties, and remediation.
Key points to note: the lack of early warning, the broad blast radius across multiple systems, and the cascading patient-care disruptions.
Without a shared severity scale, the full incident plan did not kick in swiftly, costing precious hours.
IT, security, legal, and clinical operations all scrambled independently. Email threads piled up with conflicting updates. No single incident commander steered the response. Emergency-department teams diverted ambulances without knowing when systems would return. In a crisis, shared situational awareness is critical. A unified command structure—combining decision-making, technical direction, and communications- ensures every function moves together, not at cross purposes.
Staying on top of these mandates avoids steep fines and preserves credibility with regulators and patients alike.
Relying on PDFs and printed checklists is a recipe for error. During the breach, teams rifled through intranet folders for the right playbook version. Any out-of-date step caused delays. Modern incident response requires orchestration platforms that automate routine actions, like isolating infected servers or spinning up clean backups, so human teams can focus on critical decisions. Monthly verification drills keep those automated playbooks up to date and reliable.

When Colonial Pipeline faced ransomware in 2021, they restored most systems within six hours. Their success came from prebuilt scripts that isolated infected segments and activated clean standby environments automatically. Healthcare can adopt the same approach. Identify your top three critical applications, electronic health records, lab systems, and billing, and create scripts to isolate, restore, and reroute traffic within minutes. Including these “isolate and restore” steps in tabletop exercises reveals hidden dependencies and dramatically cuts real outage time.
NIST’s 2025 incident guide calls for quarterly plan tests and automatic evidence capture. ISO 22301 demands regular impact analyses and staff training. After every real incident or drill, hold a lessons-learned session and update your playbooks, scripts, and communication plans. Automate evidence snapshots at the moment an incident is declared, including configuration files, logs, and network states. Feed those into your governance system so updates move from workshop to live plan within days.
Change Healthcare’s breach proved that every minute of hesitation costs millions and erodes trust. By automating classification, unifying command structures, tracking compliance in real-time, and utilizing orchestration scripts for containment and recovery, you can maintain patient services online when attackers strike.
Contact iRM to build your AI-powered incident response framework, so your next breach becomes a minor hiccup, not a headline crisis.