Ransomware Activity in Healthcare: Trends and Threats in 2025
From January 1 to May 15, 2025, there have been 3,194 documented ransomware and data extortion incidents globally. Among these, 194 targeted the healthcare sector, reflecting a continued and growing focus on this critical industry by cybercriminal groups.
Healthcare organizations remain particularly susceptible to these attacks due to the combination of complex IT environments, regulatory constraints, and the high value of operational continuity. Threat actors are aware that operational downtime can be used as leverage for payments, making them a frequent target for threat actors seeking both financial gain and strategic disruption.
Key Threat Actors Targeting Healthcare
Three ransomware groups have been the most active within the healthcare sector during this period:
- Qilin – 24 incidents
- IncRansom – 21 incidents
- Ransomhub – 18 incidents
These three groups combined account for 1/3rd of all ransomware and data extortion attacks in the healthcare sector.
Of these three, Qilin currently leads in overall ransomware activity across all sectors, with 204 incidents attributed to them in 2025 alone. Their 24 attacks against healthcare organizations also make them the most prominent threat group in this sector so far this year. This equates to Qilin completing one successful attack in the healthcare sector every 5.5 days.
Notably, there is growing evidence that Qilin has been operating in coordination with Moonstone Sleet, a threat group linked to North Korea. This collaboration is believed to have started in February 2025, raising further concern given the intersection of cybercrime and state-aligned operations.Shape
Vulnerabilities Exploited
The groups targeting healthcare organizations are not relying solely on phishing or opportunistic entry points. Instead, they are actively exploiting known vulnerabilities, including:
- CVE-2023-4966 (CitrixBleed) – A vulnerability in Citrix NetScaler ADC and Gateway that allows session hijacking.
- CVE-2023-27532 – An issue in Veeam Backup software that enables unauthorized access to stored credentials.
- CVE-2025-31161 – An authentication bypass flaw in CrushFTP affecting secure file transfer configurations.
- CVE-2025-31324 – A vulnerability in SAP NetWeaver permitting unrestricted file uploads, which may lead to code execution.
These vulnerabilities are being used to gain initial access, move laterally within networks, and escalate privileges before deploying ransomware payloads or exfiltrating data.
Additionally, a coordinated exploit chain targeting SimpleHelp RMM has been active since January 2025, involving:
- CVE-2024-57726 – Abuse of API key generation to gain elevated permissions.
- CVE-2024-57727 – A path traversal flaw allowing arbitrary file downloads.
- CVE-2024-57728 – A file upload vulnerability that can result in remote code execution.
These chained vulnerabilities provide threat actors with a reliable method for establishing persistence and executing attacks with minimal detection.
Operational Tactics and Infrastructure
While technical analysis of Qilin’s toolset continues, available evidence indicates they are employing a mix of custom malware and LOLbins to evade detection and reduce forensic visibility. Data exfiltration precedes encryption, aligning with broader trends toward double extortion tactics.
Infrastructure supporting these operations includes anonymized hosting, the use of virtual private servers in offshore jurisdictions, and obfuscation techniques such as domain shadowing and fast-flux DNS configurations.
For MITRE IDs, see the TTPs section at the end of this report.
Implications for Healthcare Organizations
The data from the first five months of 2025 underscores the continued need for proactive cybersecurity measures in the healthcare industry. Immediate priorities should include:
- Prioritizing patching of publicly known vulnerabilities.
- Implementation of robust access controls, particularly for third-party tools and RMM platforms.
- Regular security assessments, including penetration testing and incident response simulations.
Healthcare remains a high-value target due to the critical nature of its services and the sensitivity of its data. The threat landscape is evolving, and maintaining resilience requires continuous adaptation of both technical defenses and organizational readiness.
Indicators of Compromise
IP Addresses
109.107.173.60
186.2.163.10
109.70.100.1
92.119.159.30
128.127.180.156
180.131.145.73
184.174.96.74
184.174.96.70
5.101.179.214
SHA256
e06cdab4eab5c570266a6ccdf4667e2f4087491c764d907b07c6869b6414199e
0e2aca92bb5ac8b1cd9635be395dc6c65f13f732dc5f0f90d6fe1a8f67542bfe
144c30c39ba1589a1a9478e40e23d68dacc1ae6794198058de0c403d8a1ddf5a
b3d6983fc1ad3abc74cc47fed2ba5d07a2788a214eb6d3f5b10ff98483846d4a
41f9079162752634318f638cdf354eb6aebcc3fe5b589a4f35a12a295f9d6eb5
ef40057c0a5784ed71b745826c84c2a4d52bf9f50cc6ca4b723716a0be4ce521
Domains
account.microsoftonline.com.ms
auth-securelink.help
cloud.screenconnect.*
cloud.screenconnect.cl
cloud.screenconnect.is
Cloud.screenconnect.com.*
cloud.screenconnect.com.ms
cloud.screenconnect.com.bo
cloud.screenconnect.com.cm
cloud.screenconnect.com.am
cloud.screenconnect.com.ly
cloud.screenconnect.com.mx
cloud.screenconnect.eu
*.designstore.ru
70bf4d17-5688-437f-b4a0-362ca5098476.designstore.ru
map.designstore.ru
sitemap.designstore.ru
lisikh.designstore.ru
cureimap.designstore.ru
forums.designstore.ru
sci-hub.red
2024.sci-hub.red
account.microsoftonline.com.*
account.microsoftonline.com.ec
top.toppam.top
toppam.top
mail.darteks.eu
darteks.eu
s2fb61de7.fastvps-server.com
TTPs
Kill Chain Stage |
MITRE ID |
Name |
---|---|---|
Initial Access | T1566 | Phishing |
T1190 | Exploit Public-Facing Applications | |
T1133 | External Remote Services | |
T1078 | Valid Accounts | |
T1078.002 | Valid Accounts: Domain Accounts | |
Execution | T1204.001 | User Execution: Malicious Links |
T1053.005 | Scheduled Tasks / Jobs | |
T1059 | Command and Scripting Interpreter | |
T1218.011 | System Binary Proxy Execution: Rundll32 | |
T1480 | Execution Guardrails | |
Persistence | T1037 | Boot or Logon Initialization Scripts |
T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | |
T1053.005 | Scheduled Tasks / Jobs | |
Privilege Escalation | T1068 | Exploitation for Privilege Escalation |
T1548 | Abuse Elevation Control Mechanism | |
T1134 | Access Token Manipulation | |
T1055 | Process Injection | |
T1055.001 | Process Injection: Dynamic-link Library Injection | |
Defense Evasion | T1027 | Obfuscated Files or Information |
T1014 | Rootkit | |
T1070.001 | Clear Windows Event Logs | |
T1070.004 | File Deletion | |
T1211 | Modify Registry | |
T1484.001 | Exploitation for Defense Evasion | |
T1484.001 | Group Policy Modification | |
T1562.001> | Disable or Modify System Firewall | |
T1562.002 | Disable Windows Event Logging | |
T1562.009 | Safe Mode Boot | |
T1574.010 | Services File Permissions Weakness | |
Credential Access | T1003.001 | LSASS Memory |
T1552.001 | Credentials in Files | |
T1552.006 | Group Policy Preferences | |
Discovery | T1010 | Application Window Discovery |
T1012 | Query Registry | |
T1018 | Remote System Discovery | |
T1046 | Network Service Discovery | |
T1082 | System Information Discovery | |
T1087.002 | Domain Account Discovery | |
T1614.001 | System Language Discovery | |
Lateral Movement | T1021.001 | Remote Desktop Protocol |
T1021.002 | SMB/Windows Admin Shares | |
T1021.004 | SSH |