Threat Intelligence

INC Ransom: Inside the Group Targeting Healthcare Infrastructure

INC Ransom has made healthcare a primary target, exploiting the sector's unique vulnerabilities and urgency. A deep dive into their operations and what healthcare security teams should prioritize.

Bob
Threat Intelligence Lead
6 min read

Healthcare in the Crosshairs

Healthcare ransomware attacks are not just cybersecurity incidents. They are patient safety events. When hospital systems go down, clinical workflows revert to paper, diagnostic imaging becomes unavailable, medication dispensing errors increase, and ambulances get diverted. People can die.

INC Ransom understands this calculus. Since their emergence in mid-2023, the group has demonstrated a persistent focus on healthcare organizations, exploiting both technical vulnerabilities and the sector's inherent urgency to restore operations.

Who Is INC Ransom?

INC Ransom operates a ransomware-as-a-service (RaaS) program that first appeared in July 2023. They maintain a Tor-based leak site where they name victims and publish stolen data. The group's victim list spans multiple sectors, but healthcare organizations are disproportionately represented.

Their operational model follows the now-standard double extortion approach: encrypt systems to disrupt operations, exfiltrate data for additional leverage, and demand payment for both decryption keys and data deletion.

What makes INC Ransom notable is not technical innovation but targeting discipline. They appear to specifically seek out healthcare organizations, understanding that the combination of operational urgency, regulatory consequences, and data sensitivity creates maximum payment pressure.

Technical Methods

INC Ransom's attack chain relies on proven techniques rather than novel exploits:

Initial Access

The group primarily exploits vulnerabilities in internet-facing systems, with confirmed exploitation of:

  • Citrix NetScaler vulnerabilities (CVE-2023-3519 and related)
  • Microsoft Exchange Server vulnerabilities
  • VPN appliance vulnerabilities, particularly in SonicWall and Fortinet products

They also leverage spear-phishing campaigns targeting healthcare administrators and use compromised credentials purchased from access brokers.

Post-Exploitation

Once inside a healthcare network, INC Ransom operators follow a methodical progression:

Active Directory enumeration. They map the domain structure, identify privileged accounts, and locate domain controllers. Tools like adfind, bloodhound, and native Windows utilities are common.

Credential theft. Mimikatz, LSASS memory dumping, and Kerberoasting attacks harvest credentials for lateral movement. Healthcare environments often have service accounts with excessive privileges, making this phase particularly productive for attackers.

Lateral movement to clinical systems. INC Ransom operators specifically seek out electronic health record (EHR) systems, medical imaging archives (PACS), laboratory information systems, and clinical decision support systems. These systems are high-value targets because their disruption directly impacts patient care.

Data exfiltration. Protected health information (PHI) is the primary exfiltration target. Patient records, billing data, insurance information, and clinical research data all provide extortion leverage and have resale value in criminal markets.

Encryption and Impact

The ransomware payload encrypts files across compromised systems. In healthcare environments, the impact cascades rapidly:

  • EHR systems become inaccessible, forcing clinical staff to work from memory or paper records
  • Medical imaging cannot be viewed or stored digitally
  • Pharmacy dispensing systems go offline, requiring manual verification
  • Lab results cannot be delivered electronically
  • Billing and scheduling systems halt

The Healthcare-Specific Challenge

Healthcare cybersecurity faces structural challenges that make it uniquely vulnerable:

Legacy systems. Medical devices and clinical systems often run outdated operating systems that cannot be easily patched. A hospital may have MRI machines running Windows 7 that cost millions to replace and cannot be updated without vendor involvement and FDA recertification.

Flat networks. Many healthcare organizations still operate relatively flat network architectures where clinical systems, administrative systems, and medical devices share network segments. This makes lateral movement trivially easy once an attacker gains any foothold.

24/7 operations. Hospitals cannot schedule maintenance windows the way other organizations can. Patching and rebooting systems requires careful coordination with clinical operations and may be deferred for weeks or months.

Workforce constraints. Healthcare IT teams are chronically understaffed and must support a complex technology ecosystem that includes EHR platforms, hundreds of medical device types, telehealth systems, and the same business applications every organization needs.

Regulatory complexity. HIPAA, HITECH, state breach notification laws, and industry-specific regulations create compliance overhead that consumes security resources. Ironically, the very regulations designed to protect patient data can divert attention from the technical controls needed to prevent breaches.

Regulatory and Legal Consequences

A ransomware attack involving PHI triggers a cascade of regulatory obligations:

  • HIPAA breach notification: Organizations must notify affected individuals, HHS, and potentially the media if more than 500 individuals are affected
  • State breach notification laws: Many states have additional notification requirements with varying timelines and definitions
  • OCR investigations: The HHS Office for Civil Rights may investigate the breach and impose penalties ranging from thousands to millions of dollars
  • Civil litigation: Class action lawsuits following healthcare data breaches are increasingly common and can result in significant settlements

These consequences amplify the pressure to pay ransoms, which is exactly what groups like INC Ransom count on.

Defensive Priorities

Healthcare security teams must focus on controls that address INC Ransom's specific methods:

Patch internet-facing systems aggressively. The vulnerabilities INC Ransom exploits have patches available. Citrix, Exchange, VPN appliances, and web applications should be patched within days of critical CVE releases, not weeks.

Segment clinical networks. Medical devices, EHR systems, and clinical applications should be isolated from general corporate networks. Zero trust principles should govern access to clinical systems — no implicit trust based on network location.

Protect Active Directory. Implement tiered administration, monitor for Kerberoasting and LSASS access, and audit service account privileges regularly. Active Directory compromise is the pivot point that turns a limited breach into an enterprise-wide incident.

Build offline backup and recovery capability. Clinical continuity depends on the ability to restore critical systems quickly. Backups must be offline, tested regularly, and include documented recovery procedures that staff can follow under pressure.

Conduct clinical downtime drills. Clinical staff should practice operating without electronic systems before an incident forces them to. Paper-based medication administration records, manual specimen labeling, and verbal order processes need to be documented and rehearsed.

How Safeguard.sh Helps

Healthcare organizations running complex software ecosystems need automated visibility into their software components and vulnerabilities. Safeguard provides continuous SBOM management and vulnerability monitoring tailored to the urgency healthcare demands. When a new CVE drops in a component used by clinical systems, Safeguard identifies affected assets immediately — no manual inventory required. For organizations subject to HIPAA and working toward compliance with frameworks like NIST CSF, Safeguard's automated compliance reporting demonstrates the software supply chain controls that regulators expect. In healthcare, where the cost of a breach is measured in both dollars and patient safety, that visibility is not a luxury.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.