Back to Intelligence

Recent Healthcare Breaches: Lincare & HHS Tracker Updates — Ransomware TTPs and Defense

SA
Security Arsenal Team
May 18, 2026
7 min read

Introduction

The U.S. Department of Health and Human Services (HHS) has recently updated its breach portal with significant incidents affecting millions of patients. Most notably, Lincare Holdings (a major respiratory therapy provider) reported a breach impacting approximately 2.7 million individuals following a cybersecurity disruption in April 2024. These updates join other recent entries, including those linked to third-party vendor compromises, signaling a sustained assault on the healthcare sector.

For defenders, this is not just another compliance headline. The theft of Protected Health Information (PHI) remains a primary revenue stream for threat actors. When a major provider like Lincare goes dark due to a cyberattack, it confirms that threat actors are successfully pivoting from initial access to operational disruption and data exfiltration. This post analyzes the likely mechanics behind these recent breaches and provides the necessary detection logic to identify the early warning signs of ransomware activity and large-scale data theft.

Technical Analysis

While specific CVEs are not always disclosed immediately in large-scale healthcare ransoms (like the Lincare incident), industry intelligence and the attack profile point strongly towards Ransomware-as-a-Service (RaaS) operations, specifically actors such as BlackSuit (the suspected entity behind the Lincare attack based on victim listings).

  • Affected Entities: Lincare Holdings and other healthcare providers recently added to the HHS wall of shame.
  • Threat Actor: Suspected BlackSuit (evolved from Royal). Known for aggressive encryption and double-extortion tactics.
  • Attack Vector: Initial access is frequently achieved via compromised credentials, phishing, or exploitation of public-facing vulnerabilities (e.g., VPNs). Once inside, actors move laterally using standard remote management tools (e.g., RDP, AnyDesk, Splashtop) to evade detection.
  • Exfiltration Mechanism: A defining characteristic of these recent healthcare breaches is the volume of data stolen. Actors are utilizing legitimate data transfer tools—specifically Rclone and Mega—to stage and exfiltrate terabytes of PHI before encryption begins.
  • Exploitation Status: Confirmed Active. The Lincare incident resulted in network downtime and data theft. This is not theoretical; it is a live threat to healthcare infrastructure.

Detection & Response

To defend against these threats, SOC teams must shift focus from simple malware signatures to behavioral anomaly detection. We are hunting for the abuse of legitimate tools (LOLBins) for mass data exfiltration and lateral movement.

SIGMA Rules

YAML
---
title: Potential Rclone Data Exfiltration
id: 8a1c2d3e-4f5a-6b7c-8d9e-0f1a2b3c4d5e
status: experimental
description: Detects the use of Rclone, a command-line tool often used by threat actors to exfiltrate large volumes of data to cloud storage. Frequent in BlackSuit and other ransomware operations.
references:
  - https://www.sans.org/white-papers/finding-bad-apples-in-lodge/
author: Security Arsenal
date: 2024/05/20
tags:
  - attack.exfiltration
  - attack.t1048
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    Image|endswith:
      - '\rclone.exe'
    or
    CommandLine|contains:
      - 'rclone '
      - 'sync '
      - 'copy '
      - 'config create'
  condition: selection
falsepositives:
  - Legitimate backup operations by administrators (rare in non-IT user contexts)
level: high
---
title: Suspicious PowerShell Web Request (Exfiltration)
id: 9b2d3e4f-5a6b-7c8d-9e0f-1a2b3c4d5e6f
status: experimental
description: Detects PowerShell commands used to exfiltrate data via web requests, commonly used when dedicated tools like Rclone are not available or blocked.
references:
  - https://attack.mitre.org/techniques/T1059/001/
author: Security Arsenal
date: 2024/05/20
tags:
  - attack.execution
  - attack.t1059.001
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    Image|endswith:
      - '\powershell.exe'
    CommandLine|contains:
      - 'Invoke-WebRequest'
      - 'IWR'
      - 'WebClient'
      - 'DownloadFile'
  filter_legit:
    ParentImage|contains:
      - '\SoftwareDistribution\Download\'
      - '\Windows\System32\svchost.exe'
  condition: selection and not filter_legit
falsepositives:
  - System updates or legitimate management scripts
level: medium
---
title: Mass File Deletion or Encryption Prep
id: 0c3d4e5f-6b7c-8d9e-0f1a-2b3c4d5e6f7a
status: experimental
description: Detects rapid deletion or modification of shadow copies using vssadmin or diskshadow, a common precursor to ransomware encryption to prevent recovery.
references:
  - https://attack.mitre.org/techniques/T1490/
author: Security Arsenal
date: 2024/05/20
tags:
  - attack.impact
  - attack.t1490
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    Image|endswith:
      - '\vssadmin.exe'
      - '\diskshadow.exe'
    CommandLine|contains:
      - 'delete shadows'
      - '/all'
      - 'resize shadowstorage'
level: high

KQL (Microsoft Sentinel / Defender)

This query hunts for high-volume outbound network connections, a key indicator of PHI exfiltration. Adjust the threshold based on your baseline.

KQL — Microsoft Sentinel / Defender
let threshold = 50000000; // 50MB threshold
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where ActionType in ("ConnectionAccepted", "ConnectionSuccess")
| where RemotePort in (443, 80) // Web traffic commonly used for exfil
| where InitiatingProcessFileName !in ("chrome.exe", "edge.exe", "firefox.exe", "msedge.exe", "teams.exe", "outlook.exe") // Filter common browsers/apps
| summarize TotalBytesSent = sum(SentBytes) by DeviceName, InitiatingProcessAccountName, InitiatingProcessFileName, RemoteUrl
| where TotalBytesSent > threshold
| project DeviceName, Account = InitiatingProcessAccountName, Process = InitiatingProcessFileName, Destination = RemoteUrl, TotalBytesSent
| order by TotalBytesSent desc

Velociraptor VQL

Velociraptor hunt for suspicious processes often used in ransomware attacks. This artifact checks for the presence of Rclone or common encryption tools in process memory or execution history.

VQL — Velociraptor
-- Hunt for ransomware precursor processes and exfil tools
SELECT Pid, Name, CommandLine, Exe, Username, CreateTime
FROM pslist()
WHERE Name =~ 'rclone'
   OR Name =~ 'vssadmin'
   OR Name =~ 'wbadmin'
   OR Name =~ 'bcdedit'
   OR CommandLine =~ 'delete.*shadows'
   OR CommandLine =~ 'resize.*shadowstorage'

Remediation Script (PowerShell)

This script can be deployed across the environment to audit the presence of common exfiltration tools and check for the creation of common ransomware note files.

PowerShell
# HealthCare-Breach-Audit.ps1
# Usage: Run as Administrator or via SCCM/Intune

Write-Host "[+] Starting Healthcare Breach Audit..." -ForegroundColor Cyan

# 1. Check for common exfil tools (Rclone)
Write-Host "[*] Checking for Rclone presence..." -ForegroundColor Yellow
$rclonePaths = @(
    "C:\Windows\System32\rclone.exe",
    "C:\Users\*\AppData\Local\rclone.exe",
    "C:\Temp\rclone.exe"
)

foreach ($path in $rclonePaths) {
    if (Test-Path $path) {
        Write-Host "[!] ALERT: Rclone found at $path" -ForegroundColor Red
    }
}

# 2. Check for common Ransomware Note patterns in user directories
Write-Host "[*] Checking for Ransomware Note patterns..." -ForegroundColor Yellow
$users = Get-ChildItem "C:\Users" -Directory
$notePatterns = @("*.locked", "*README*.txt", "*RECOVER*.txt", "*DECRYPT*.html", "*HOW_TO*.txt")

foreach ($user in $users) {
    foreach ($pattern in $notePatterns) {
        $notes = Get-ChildItem -Path "C:\Users\$($user.Name)" -Filter $pattern -Recurse -ErrorAction SilentlyContinue
        if ($notes) {
            foreach ($note in $notes) {
                Write-Host "[!] ALERT: Potential ransom note found: $($note.FullName)" -ForegroundColor Red
            }
        }
    }
}

# 3. Audit Shadow Copy Storage Status
Write-Host "[*] Checking Shadow Copy Storage..." -ForegroundColor Yellow
try {
    $shadow = vssadmin list shadowstorage
    if ($shadow -match "No shadow copies") {
        Write-Host "[!] WARNING: No shadow copies found on this system." -ForegroundColor Red
    } else {
        Write-Host "[+] Shadow copies present." -ForegroundColor Green
    }
} catch {
    Write-Host "[-] Could not query shadow storage." -ForegroundColor Gray
}

Write-Host "[+] Audit Complete." -ForegroundColor Cyan

Remediation

The recent breaches involving Lincare and other entities highlight critical gaps in visibility and third-party risk. Immediate remediation steps include:

  1. Isolate and Investigate: If Rclone or large outbound transfers are detected, isolate the affected machine from the network immediately but keep it powered on for forensic memory acquisition.
  2. Reset Credentials: Assume that Active Directory credentials have been compromised. Force a password reset for service accounts and privileged users, ensuring MFA is strictly enforced.
  3. Block Exfiltration Tools: Create application control policies (AppLocker/WDAC) to block the execution of unsigned binaries like rclone.exe and restrict PowerShell usage to Constrained Language Mode (CLM) for non-administrative users.
  4. Vendor Risk Management: For breaches stemming from third-party vendors (like the Perry Johnson & Associates incident affecting multiple covered entities), review all vendor access immediately. Revoke standing access and implement Just-In-Time (JIT) access for all external support.
  5. Patch VPNs and Gateways: Ensure all remote access infrastructure (VPN, Citrix, RDP Gateway) is patched against known vulnerabilities (e.g., Citrix Bleed, GeoScene) and enforce strict allow-listing for IP ranges accessing these services.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcare-cybersecurityhipaa-compliancehealthcare-ransomwareehr-securitymedical-data-breachhealthcareransomwarelincare

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.