Back to all incidents

Ascension Health — Black Basta ransomware

Black Basta ransomware hit Ascension Health's 140 hospitals after a contractor opened a malicious file, forcing paper-based clinical care and exposing 5.6 million patient records.

Target
Ascension Health — Black Basta ransomware
Date public
8 May 2024
Sector
Healthcare
Attack type
Ransomware
Threat actor
Black Basta
Severity
Critical
Region
United States

Ascension Health runs 140 hospitals across 19 US states. In May 2024 a ransomware group called Black Basta encrypted its core clinical systems, including the electronic health records platform that doctors and nurses depend on to see patient histories, order medications, and read lab results. When those systems went down, clinicians switched to paper charts. Ambulances were rerouted away from some hospitals. Elective procedures were postponed. The breach started with a contractor who downloaded a malicious file. That single mistake opened a path into one of the largest non-profit health systems in America. The clinical disruption lasted weeks. The data damage outlasted it: in December 2024, Ascension disclosed that the attacker had stolen personal and health information on 5.6 million current and former patients. That figure makes it the largest US healthcare ransomware breach by patient count. Ascension's incident sat in the same spring 2024 period as the Change Healthcare attack, and together the two pushed US regulators to accelerate mandatory minimum cybersecurity standards for the healthcare sector.

What happened

On 8 May 2024 Ascension Health, a Catholic non-profit health system operating 140 hospitals across 19 US states, detected a ransomware intrusion on its network. Ascension took the decision to disconnect clinical systems to contain the spread. That disconnection meant the immediate loss of electronic health record access at hospitals across the network; clinical staff reverted to paper-based processes for patient documentation, medication ordering, and test results.

The operational impact was immediate and serious. Ascension diverted inbound ambulances away from affected facilities in markets where alternatives were available. Some elective and non-urgent surgical procedures were postponed. Staff who had trained on EHR systems and had limited experience with paper workflows reported significant delays in routine clinical processes including medication dispensing, laboratory ordering and results review. In the weeks that followed, Ascension publicly stated that no patient deaths had been directly attributed to the outage, though the counterfactual difficulty of that claim was widely noted in healthcare and cybersecurity circles.

Ascension began restoring systems progressively through May and June 2024. Full restoration took several weeks. In December 2024 Ascension disclosed in a notification to affected individuals and to the HHS Office for Civil Rights that the attacker had exfiltrated personal data on approximately 5.6 million current and former patients. The compromised data included names, dates of birth, addresses, phone numbers, Social Security numbers, government identification numbers, payment information, insurance details, and for some patients, clinical information including medical record numbers, physician names, and service dates.

How it worked

Ascension identified the intrusion’s origin as a malicious file downloaded by a contractor. The file, described in Ascension’s notifications as having been downloaded accidentally — the contractor intended to download a different file — delivered initial-access malware that gave Black Basta operators a foothold in the environment. That foothold was then expanded through the standard Black Basta playbook: credential harvesting, lateral movement via legitimate administrative tools, escalation of privilege, and eventual deployment of ransomware across as many systems as possible.

Black Basta is a prolific and technically sophisticated ransomware-as-a-service operation. It emerged in 2022 and has been linked by researchers to former Conti operators following that group’s dissolution. Its intrusion methodology relies heavily on QakBot-delivered initial access and hands-on-keyboard operations once inside; the group is known for extended dwell periods and for specifically targeting backup infrastructure to maximise encryption impact and reduce victim recovery options without paying.

The contractor vector is a recurring entry point in healthcare ransomware: third-party vendors and contractors with access to clinical networks carry higher phishing risk than fully-trained full-time staff, and their accounts typically carry the network access necessary to reach clinical systems while being managed through third-party identity infrastructure that may not be enrolled in the same security controls as employee accounts. The Ascension compromise is one of the most consequential examples of this pattern.

Timeline

  • Before May 2024 — Black Basta operators deliver initial-access malware via a malicious file downloaded by an Ascension contractor; dwell period and lateral movement phase, exact duration not disclosed.
  • 8 May 2024 — Ascension detects the ransomware deployment and disconnects clinical systems. EHR access lost across the 140-hospital network; paper-based fallback procedures activated.
  • 8–10 May 2024 — Ambulance diversions begin at affected hospitals; elective procedures postponed in multiple markets.
  • May–June 2024 — Phased system restoration; Ascension works with cybersecurity firm Mandiant on incident response.
  • June 2024 — Clinical systems substantially restored across most facilities.
  • December 2024 — Ascension notifies 5.6 million affected patients and HHS OCR; discloses the range of data exfiltrated.
  • 2024–2025 — Class-action lawsuits filed; HHS accelerates rulemaking on mandatory healthcare-sector minimum cybersecurity standards.

What defenders should learn

The contractor entry point is the first and most actionable lesson from Ascension. Contractors are not an unusual or avoidable feature of complex healthcare operations — the clinical, technical and administrative complexity of running 140 hospitals across 19 states requires an extensive third-party ecosystem. But contractors present a different phishing-susceptibility profile than trained employees, and their identity and access management is frequently delegated to the contracting organisation rather than fully integrated into the health system’s own controls. The risk management implication is to treat third-party account access to clinical networks with the same identity-verification, phishing-resistant MFA, and conditional access controls applied to the highest-privilege internal accounts — because a contractor with EHR access is, from an attacker’s perspective, an employee with EHR access.

The backup and system isolation failure is the second lesson. Black Basta specifically targets backup infrastructure during its dwell period, reducing the recovery options available to the victim. Organisations that can restore from offline, immutable backups recover faster and with more leverage in the ransom negotiation. Healthcare is particularly exposed here because clinical system vendors often have complex, non-standard backup architectures that are not maintained by the health system’s own IT organisation and that may not meet the offline-backup standards that a security team would otherwise require. Testing backup recoverability for clinical systems — not just enterprise IT infrastructure — is an essential and frequently skipped step.

The paper-based fallback process deserves attention as a positive lesson from Ascension’s response. The fact that clinical care continued — imperfectly, with delays, but without confirmed fatalities — is attributable in part to Ascension having functional paper fallback procedures that staff could revert to. Healthcare organisations that have not practised or documented their downtime procedures in recent years are carrying a risk that the Ascension incident should make visible. Downtime procedures are not a legacy contingency; they are an active capability that requires regular exercise.

At the policy level, the Ascension breach, occurring in the same spring 2024 window as the Change Healthcare attack, contributed to a significant shift in HHS and Congressional attention toward mandatory minimum cybersecurity requirements for healthcare entities. The voluntary cyber performance goals that HHS had previously published began to be discussed as future regulatory minimums. Healthcare is the sector where ransomware has the clearest potential for direct patient harm, and it is the sector that has most visibly struggled to implement the basic controls — phishing-resistant MFA, network segmentation, offline backups — that reduce ransomware impact.

Sources

Back to all incidents