// Healthcare Threat Intelligence

Healthcare Threat Feed

Curated, manually-vetted threat intelligence focused exclusively on ransomware groups, malware, and incidents targeting healthcare organizations. Updated by Code Blue Security as new intelligence is confirmed.

Feed StatusLive
Total Entries5
Active Threats4
Last UpdatedMar 19, 2026 at 08:56 UTC
All intelligence is manually curated from public sources (CISA, HHS HC3, published security research).
// Ransomware Groups

Active & Recent Threat Actors

Known ransomware groups currently or recently targeting healthcare — TTPs, targeting patterns, and operational status.

CriticalActive
Nov 13, 2025

Akira

aka Akira

Uses exploitation of exposed services, lateral movement, data exfiltration, and ransomware encryption with double-extortion.

Primary TargetsHealthcare Government Manufacturing Education Critical Infrastructure Technology
Initial AccessVuln
First SeenJan 2023
Last ActiveJan 2025
Group StatusActive
SystemsWindows VMware / ESXi Hypervisors VPN appliances Active Directory Backup servers
RegionGlobal
SectorHospital
MITRE ATT&CKT1566T1059T1105T1486T1048T1490T1562
// Detection Guidance

Patch exposed services Enable MFA Restrict remote access Monitor logs Segment networks Maintain offline backups

CriticalActive
Mar 12, 2025

Medusa

aka Medusa started as RaaS in 2021

Uses exploitation of exposed services, credential dumping, lateral movement, data exfiltration, and ransomware encryption.

Primary TargetsHealthcare Government Education Legal Technology Manufacturing
Initial AccessVuln
First SeenJan 2021
Last ActiveJan 2025
Group StatusActive
SystemsWindows Active Directory Remote services Public-facing servers VPN / RDP
RegionGlobal
SectorHospital
MITRE ATT&CKT1566T1059T1105T1486T1048T1490
// Detection Guidance

Patch exposed systems Enable MFA Restrict remote access Monitor logs Use network segmentation Maintain backups

CriticalActive
Feb 19, 2025

Ghost (Cring)

Primary TargetsHealthcare Government Education Critical Infrastructure Technology Manufacturing
Initial AccessPhishing
First SeenJan 2021
Last ActiveJan 2025
Group StatusActive
SystemsWindows Active Directory Exchange SharePoint Fortinet ColdFusion
RegionGlobal
SectorHospital
MITRE ATT&CKT1566T1059T1105T1486T1048T1490
// Detection Guidance

Patch internet-facing systems Enable MFA Monitor logs for unusual activity Segment networks Maintain offline backups

CriticalActive
Aug 29, 2024

RansomHub

Phishing for initial access, credential dumping, lateral movement, data exfiltration, ransomware encryption.

Primary TargetsHealthcare, Government, IT, Emergency Services, Critical Infrastructure
Initial AccessPhishing
First SeenFeb 2024
Last ActiveAug 2024
Group StatusActive
SystemsWindows, Active Directory, network infrastructure
RegionGlobal
SectorHospital
MITRE ATT&CKT1566T1048T1486T1490
// Vulnerabilities & Advisories

CVEs, Patches & Vendor Advisories

Known vulnerabilities, CVEs, and vendor advisories affecting healthcare systems — medical devices, EHRs, and clinical infrastructure. Includes patch status and recommended mitigations.

HighInactive
May 14, 2024

CVE-2024-1486 – Privilege Escalation Vulnerability in GE HealthCare Ultrasound Devices

CVE-2024-1486 CVSS 7.4 Patch Available — Apply Immediately

GE HealthCare — GE HealthCare Ultrasound Devices (multiple models)

This vulnerability affects GE HealthCare ultrasound systems used in clinical environments. An attacker with local access could escalate privileges, potentially allowing access to sensitive patient data or disruption of imaging device operation. Healthcare organizations should review vendor guidance and ensure affected devices are patched.

Vulnerability TypePrivilege Escalation
Attack Vectorvuln
Systems AffectedGE HealthCare ultrasound devices Medical imaging systems Embedded Windows systems
Sectorhospital
RegionGlobal
Exploited?No Known Exploitation in the wild
MITRE ATT&CKT1068T1548T1003
// Recommended Mitigations

Apply vendor security updates as soon as possible Restrict local access to medical devices Place imaging systems on segmented networks Monitor device logs for unusual activity Follow GE HealthCare security advisory guidance

// Need Help?

Is your organization exposed to any of these threats?

Book a free 30-minute consultation. No pitch — just clarity on where you stand.

Book a Free Consult