Skip to main content

Legal Fallout from the Change Healthcare Breach Signals a New Era of Accountability

November 17, 2025
Image: [image credit]
Photo 182108464 © Serhii Akhtemiichuk | Dreamstime.com

Roger Baits, Contributing Editor

The decision by a Nebraska state court to allow the attorney general’s data breach lawsuit against Change Healthcare, UnitedHealth Group, and Optum to proceed is more than a procedural milestone. It represents the maturation of a long-simmering debate about healthcare cybersecurity, risk accountability, and the regulatory perimeter surrounding third-party data handlers.

While the breach itself occurred in early 2024, its cascading legal, financial, and operational impacts are only now beginning to crystallize. The Nebraska case, alongside a broader federal class-action lawsuit, could help redefine the guardrails of data stewardship in a healthcare ecosystem increasingly reliant on complex technology partnerships and data consolidation.

The question now is not simply how a breach occurred, but who is responsible when it does, and how systemic vulnerabilities will be addressed going forward.

The Anatomy of a Catastrophic Breach

Change Healthcare, a subsidiary of UnitedHealth Group via its Optum division, serves as one of the largest healthcare claims processors in the United States. When its systems were crippled by ransomware in 2024, the result was a multi-week disruption that brought payment flows to a halt, paralyzed pharmacy services, and exposed sensitive data belonging to over 190 million individuals.

Internal investigations and congressional testimony confirmed that at least one server at Change Healthcare was operating without basic two-factor authentication. That lapse, while shocking in its simplicity, reflects a deeper issue: many healthcare entities, and their vendors, still lack mature cybersecurity protocols despite years of warnings and high-profile attacks.

According to the U.S. Department of Health and Human Services, multi-factor authentication is among the most foundational cybersecurity practices. Its absence in a company processing a significant portion of U.S. healthcare transactions has become a focal point for regulators and plaintiffs alike.

States Step into the Enforcement Void

What distinguishes Nebraska’s lawsuit is its aggressive framing under state consumer protection and data privacy laws. Attorney General Mike Hilgers has argued that the breach affected nearly 900,000 Nebraskans and violated statutory duties to protect residents’ personal and medical information. The court’s refusal to dismiss the case suggests that state-level enforcement may become a primary mechanism for addressing cybersecurity lapses in the absence of stronger federal mandates.

This legal trend mirrors broader movement across the country. As noted by a 2025 Health Affairs analysis, over a dozen states have enacted or proposed laws strengthening data breach notification requirements and expanding the definition of sensitive health information. While HIPAA remains the national baseline, state attorneys general are increasingly using consumer protection frameworks to pursue more aggressive enforcement when breaches occur.

The stakes are not limited to reputational harm. Financial penalties, injunctive relief, and discovery burdens could reshape how major health tech companies assess risk and structure vendor relationships. If Nebraska prevails, it could create a roadmap for other states to follow suit, especially in high-profile breaches with multi-jurisdictional impact.

Operational Repercussions Beyond the Courtroom

Legal action is only one axis of fallout. The 2024 Change Healthcare breach exposed a dangerous over-concentration of infrastructure within the U.S. healthcare payment ecosystem. According to the American Hospital Association, many providers were unable to process claims, verify patient eligibility, or access pharmacy services for weeks, causing revenue shortfalls, workflow chaos, and potential delays in care.

This disruption has prompted new scrutiny of vendor concentration risk. The merger between Optum and Change Healthcare, completed in 2022, was already controversial at the time of approval. Critics, including the Federal Trade Commission, warned that vertical consolidation could stifle innovation and concentrate too much power within a single entity. The breach has added fuel to those concerns, highlighting the systemic fragility that can arise when one vendor’s failure has nationwide repercussions.

A 2024 GAO report on health IT risk emphasized the need for “resilience-by-design” standards in critical healthcare infrastructure. This includes not only technical safeguards, but also contractual transparency and incident response obligations that reflect the interconnected nature of modern care delivery.

Compliance Is No Longer Just IT’s Problem

The fallout from this breach reinforces a hard truth: cybersecurity is no longer the sole domain of IT departments. It is a board-level issue with direct implications for compliance, financial planning, and patient trust.

Health systems that rely on third-party processors must now reassess their due diligence protocols and ask more pointed questions: How are vendors monitored? Are cybersecurity practices contractually required and regularly audited? Is there a contingency plan for failure, not just of technology, but of trust?

As ransomware evolves and regulatory tolerance narrows, executive leadership must treat cyber resilience as a strategic function. That means aligning risk management with procurement, legal, and clinical operations—not just updating firewalls and running annual phishing drills.

A Legal Test Case with National Implications

The Nebraska suit is still in its early stages, but it has already set a precedent. It reflects growing impatience among state regulators and a willingness to use broad consumer protection laws to address what many see as preventable corporate failures. With a federal class-action proceeding in parallel, UnitedHealth and Optum now face a dual-front legal battle that could reshape their cybersecurity posture and influence national standards.

For healthcare leaders, the message is clear. Regulatory expectations are rising, and the window for complacency has closed. Whether through legislation, litigation, or market pressure, the cost of failing to secure health data is no longer theoretical. It’s measurable in court filings, remediation costs, and the erosion of public trust.

The Change Healthcare breach may have started as a technical failure. But its legacy will be legal, operational, and strategic—and it will shape how healthcare organizations think about data risk for years to come.