Executive Summary
In April 2026, during a House Homeland Security Committee hearing, lawmakers discussed intensifying penalties for ransomware attacks targeting hospitals. Proposals included classifying such attacks as acts of terrorism and pursuing homicide charges when patient deaths result. These discussions were prompted by a significant rise in healthcare ransomware incidents, which doubled from 238 in 2024 to 460 in 2025, making the healthcare sector the most targeted industry. The hearing highlighted the severe operational disruptions and potential loss of life caused by these cyberattacks, emphasizing the need for stronger deterrents and legal frameworks to address the escalating threat.
This incident underscores the growing urgency to enhance cybersecurity measures within the healthcare sector. The increasing frequency and severity of ransomware attacks necessitate immediate action to protect critical infrastructure and patient safety. Legislative initiatives aiming to reclassify these cybercrimes reflect a broader recognition of their potential to cause significant harm, signaling a shift towards more aggressive legal responses to deter future attacks.
Why This Matters Now
The surge in ransomware attacks on healthcare facilities poses a direct threat to patient safety and public health. The proposed legislative measures aim to establish stronger deterrents against such attacks, emphasizing the critical need for enhanced cybersecurity protocols and legal frameworks to protect essential services.
Attack Path Analysis
Attackers initiated the ransomware campaign by exploiting a phishing email to gain initial access to the hospital's network. Once inside, they escalated privileges by exploiting unpatched vulnerabilities, allowing them to gain administrative control. They then moved laterally across the network, compromising multiple systems and accessing sensitive data. The attackers established command and control channels to communicate with compromised systems and exfiltrate data. Subsequently, they encrypted critical files and systems, rendering them inaccessible. Finally, they demanded a ransom payment to decrypt the data, severely disrupting hospital operations and patient care.
Kill Chain Progression
Initial Compromise
Description
Attackers gained initial access through a phishing email containing a malicious link or attachment.
MITRE ATT&CK® Techniques
Data Encrypted for Impact
Inhibit System Recovery
Service Stop
Obfuscated Files or Information
Command and Scripting Interpreter
Impair Defenses
Modify Registry
Windows Management Instrumentation
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIST SP 800-53 – Software, Firmware, and Information Integrity
Control ID: SI-7
HIPAA – Risk Analysis
Control ID: 164.308(a)(1)(ii)(A)
PCI DSS 4.0 – System Security Maintenance
Control ID: 6.2
NYDFS 23 NYCRR 500 – Incident Response Plan
Control ID: 500.16
DORA – ICT Risk Management Framework
Control ID: Article 10
CISA ZTMM 2.0 – Data Protection
Control ID: 3.1
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Health Care / Life Sciences
Primary ransomware target with doubled attack incidents, facing potential terrorism designations and homicide charges for patient deaths.
Government Administration
Legislative and regulatory response driving terrorism designations, homicide charges, and enhanced penalties for healthcare ransomware attacks.
Law Enforcement
FBI statistics show healthcare as top targeted sector, requiring new enforcement approaches including terrorism and homicide prosecutions.
Insurance
Treasury Department reviewing terrorism risk insurance programs to address cyber-related losses from ransomware attacks on critical infrastructure.
Sources
- Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attackshttps://cyberscoop.com/lawmakers-ponder-terrorism-designations-homicide-charges-over-hospital-ransomware-attacks/Verified
- Healthcare cyberattacks continue to escalate in 2025https://www.techtarget.com/HealthtechSecurity/news/366619250/Healthcare-cyberattacks-continue-to-escalate-in-2025Verified
- Health-ISAC Finds Ransomware & Third-Party Breaches Dominate 2025 Threatshttps://health-isac.org/health-isac-finds-ransomware-third-party-breaches-dominate-2025-threats/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to move laterally, escalate privileges, and exfiltrate data, thereby reducing the overall impact on hospital operations.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While initial access via phishing may still occur, subsequent attacker activities would likely be constrained, limiting their ability to exploit the network further.
Control: Zero Trust Segmentation
Mitigation: Even if attackers exploit vulnerabilities, their ability to escalate privileges across the network would likely be constrained, reducing the scope of administrative control they could achieve.
Control: East-West Traffic Security
Mitigation: The attacker's ability to move laterally across the network would likely be constrained, reducing the number of systems they could compromise and limiting access to sensitive data.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command and control channels would likely be constrained, reducing their capacity to communicate with compromised systems and exfiltrate data.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive patient data to external servers would likely be constrained, reducing the risk of data breaches.
While initial encryption of files may occur, the overall impact would likely be constrained due to limited attacker access, reducing the extent of system compromise and operational disruption.
Impact at a Glance
Affected Business Functions
- Electronic Health Records (EHR)
- Patient Scheduling
- Billing Systems
- Diagnostic Services
Estimated downtime: 14 days
Estimated loss: $5,000,000
Protected Health Information (PHI) of patients, including names, birthdates, medical records, and insurance details.
Recommended Actions
Key Takeaways & Next Steps
- • Implement comprehensive phishing awareness training to reduce the risk of initial compromise.
- • Regularly patch and update systems to prevent exploitation of known vulnerabilities.
- • Deploy East-West Traffic Security to monitor and control lateral movement within the network.
- • Utilize Egress Security & Policy Enforcement to detect and block unauthorized data exfiltration.
- • Establish robust backup and recovery procedures to mitigate the impact of ransomware attacks.



