HHS Warns of New Ransomware Group Attacks on Healthcare Facilities

The Clop group was active throughout 2022.

By HFT Staff


The U.S. Department of Health and Human Services (HHS) recently sent out an alert to all hospitals and other healthcare facilities about The Clop ransomware group. The group has reportedly been sending healthcare facilities ransomware-infected medical files disguised as coming from legitimate doctors, then requesting a medical appointment in hopes recipients will open and review the documents.  

The Clop was first observed in 2019 and have seen payouts of up to $500 million. The group uses a double extortion model that targets Windows systems, allowing the threat actor to encrypt and exfiltrate sensitive information. Sensitive data will be released on their dark web leak site if payment is not made. The malware was active throughout 2022 despite six of its operators getting arrested in 2021.  

These are not the only cyber criminals still targeting hospitals and other healthcare facilities. HHS recently alerted facilities regarding the Royal group, which emerged in September 2022 and appears to not have affiliates. Royal appears to be financially motivated and has exfiltrated sensitive data, leaving healthcare facilities to be seen as vulnerable. The group uses Cobalt Strike tactics to harvest credentials from healthcare networks, according to the notice. 

Not all ransomware groups have their sights set on healthcare organizations, though. HHS warned of LockBit in early 2022, despite the group claiming it does not attack healthcare organizations. But the group was linked to the recent hacking of SickKids, a major pediatric hospital in Toronto. The group apologized on behalf of the affiliate who partially disabled SickKids’ website, phone lines and corporate function lines, saying it violated the group’s rules of engagement, Techardar reported.  

"We formally apologize for the attack on si[c]kkids.ca and give back the decryptor for free. The partner who attacked this hospital violated our rules, is blocked and is no longer in our affiliate program," the group said in a screenshot posted on Twitter. 

HHS suggests healthcare facilities take these steps to reduce attack surface areas to the greatest extent possible:  

  • Use the included indicators of compromise in threat hunting and detection programs.  
  • Use multi-factor authentication and strong passwords.  
  • Establish a robust data backup program.  
  • Consider signing up for CISA’s cyber hygiene services. 


January 12, 2023


Topic Area: Information Technology , Security


Recent Posts

EV Charging Station Design: Ensuring Patient Access

The question is not whether to install charging infrastructure — the organization eventually will have to — but how to do it without disrupting patient care.


Sanford Health and Prairie Lakes Healthcare System Merge

Prairie Lakes Healthcare System will transition to the Sanford Health name and brand while preserving and expanding health services across the communities it serves.


Sedgebrook Falls Victim to Data Incident

The organization detected the event on May 5, 2025.


How Efficiency Checklists Help Hospitals Save Energy, Water and Money

Keith Edgerton explains how a simple, systematic tool can help healthcare facilities identify savings, support sustainability goals and reinvest in long-term decarbonization.


Designing with Heart: Seen Health Center Blends Cultural Warmth and Clinical Care

Case study: The Alhambra-based facility uses Wilsonart Woodgrains to create a space where comfort, tradition and durability come together for an elevated senior care experience.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.