What is Red Teaming in Healthcare?
In healthcare red teaming, ethical hackers (cybersecurity experts hired by the healthcare organization) attempt to infiltrate the organization’s network and discover weaknesses that would result in compromise if not remediated. Red teaming utilizes any and all methods of attack available to threat actors, including social engineering, advanced persistent threats (APTs), phishing, baiting, pretexting, malware, and even physical reconnaissance and compromise.
Red teaming and adversary simulation allow highly targeted healthcare providers to run “fire drills” of a real-world attack. Last year, over 700 healthcare security incidents were reported to the US Department of Health and Human Services Office for Civil Rights (HHS OCR), with roughly 186 million people affected.

More regular red teaming in healthcare could bring down these numbers by showing healthcare data security teams where adversaries could successfully strike and warning them with enough time to fix it.
Challenges Specific to Healthcare
The healthcare industry has always been a hot target for attackers. First, the amount of sensitive health information, also known as protected health information (PHI), stored within healthcare organizations is surpassed only by the amount of personally identifiable information (PII) stored along with it. Attackers targeting healthcare providers have a good chance of stealing both. However, PHI is more valuable on the black market, as the Center for Internet Security (CISA) notes, making it an even more lucrative part of the pie. According to the Infosec Institute, on underground criminal forums, PHI garners the highest price on the black market, above any other data, including credit card data and PII.
Before widespread digitization, sensitive healthcare records were difficult to steal. Kept on paper within file cabinets, doing so practically required a physical heist. Now, global connectivity, aided by the federal mandate to move towards electronic health records, has made scores of personal healthcare information available online. While this streamlines healthcare processes, provides additional convenience for patients, and even contributes to increased healthcare security, it also raises the possibility of PHI maliciously being accessed from anywhere.
In short, the bleeding edge of technology has melded with the healthcare sector in such a way that cybersecurity find it difficult to stay ahead of emerging issues. Not only are electronic health records at risk; many medical IoT devices become quick (and easy) targets for attackers taking advantage of still nascent (or nonexistent) internal healthcare data security controls. Medical IoT is one of the many areas in which technology has outstripped security, yet again.
Because of the risk of danger to not only patient privacy but human health, regulatory compliance is stringent in healthcare. HIPAA (Health Insurance Portability and Accountability Act) governs the safe usage, transfer, retrieval, and storage of PHI and medical records, and its Security Rule requires providers to secure patient privacy and ePHI (electronic PHI) via appropriate healthcare cybersecurity controls.
As healthcare systems consider the realities of operating on a fast-paced digital level, it is important to note organizations will incur more cost and reputational damage if they wait to invested in healthcare cybersecurity until after suffering a breach. The cost of the average global data breach clears $4.88 million, and $9.36 million in the US. In comparison, the average piece of enterprise-level security software can cost between a few thousand dollars and upwards of $100K for a one-time purchase. SaaS solutions and outsourced managed security services (MSS) can average several thousand dollars per month but still don’t approach the cost and damage inflicted by a breach.

How Can You Proactively Protect PHI?
See how adversary simulations with Cobalt Strike helps strengthen defenses to stay one step ahead of attackers.
Top Cyber Threats in Healthcare
We know threat actors are after sensitive healthcare information, but how are they obtaining it? The HHS OCR reported that hacking and ransomware experienced exponential growth in recent years:
- Hacking | 239% increase (2019-2023)
- Ransomware | 278% increase (2019-2023)
The healthcare industry, like any other, faces a barrage of threats from without and within. Some, like attacks on third parties, reflect trends across sectors but hit healthcare especially hard. Others come with the territory. In recent years, specific threats to cybersecurity in healthcare have come to include:
There are countless opportunities for cybercriminals to take advantage of any weakness in the healthcare chain. When threat actors steal patient data, they can sell it for hundreds of times the going rate of non-medical information because of the numerous and lucrative things that can be done with it. PHI - like diagnoses, medications, and insurance details - has a longer “shelf life” than things like credit card numbers that can easily be changed or expire. This allows threat actors to exploit it for a longer amount of time. Additionally, PHI can be used to illicitly obtain medication, file fake medical claims, and more.
Healthcare Cyberattack Statistics
How likely is an entity within the healthcare sector to experience a cyberattack? Very likely. A recent study indicated that 92% of all healthcare organizations were the victim of at least one cyberattack in the past year alone (up 4% from last year’s already high 88%). Average price tags of healthcare breaches were also high, averaging $9.77 million per incident for the industry in 2024.
Individual costs were similarly high. The average healthcare organization suffered anywhere between $10,000 and $25 million in losses from their most expensive breach, with the highest expense stemming from system downtime during the incident. This follows an emerging trend of more sizable data breaches within the sector, such as the attack on Change Healthcare that affected over 100 million individuals. Based on success rates like these, and barring something changing the appeal of sensitive health-related information, it is likely that similar attacks will continue to harass the industry in 2025.
If future cyberattacks are inevitable for healthcare entities, then the best way to meet them is fully prepared. Building a zero-trust foundation of healthcare information security from the ground-up might be thorough, but unrealistic given time and budget constraints given most healthcare groups. Strategically, organizations can quickly identify the weakest defenses (I.e., the ones that will be most attractive to threat actors) and start there, placing limited resources where they matter most.
Offensive security techniques like red teaming and penetration testing can prove especially effective against high-cost, high-probability attacks. Penetration testing goes a step beyond identifying vulnerabilities alone and tells an organization which are the most likely to be compromised. This lets busy healthcare entities know where to focus their efforts. Red teaming pushes preparation even further by staging an all-out attack against an organization’s entire defensive force; technologies, tools, and teams. It not only reveals which healthcare security measures work under pressure, but how effectively your security experts operate when the stakes are high.
Evaluate Your Safeguards for Patient Data
How would your infrastructure hold up against an attacker? Put your defenses to the test with Cobalt Strike.
Key Terms to Remember
Be prepared with Cobalt Strike.
Red teaming can uniquely prepare healthcare organizations by leveraging all methods of attack available to threat actors; from spear phishing executives to pretexting, BEC scams, phishing campaigns, AI-generated voice calls, hidden ransomware links, and more. However, while healthcare red teaming can employ all these techniques it won’t be able to employ them without the proper tools.
Advanced red teaming solutions are critical for getting the most out of your engagement, and for those teams who have not developed a red teaming skillset in-house, automated solutions are available to walk you through step by step. For more experienced teams, specialized red team toolkits provide an option to take your ethical hacking to the next level.
Fortra’s Cobalt Strike, a sophisticated threat emulation tool, can be utilized by security teams of any maturity level to perform their own red team engagements and adversary simulations. It not only tests internal defenses but informs blue teams of security issues, so they are better prepared when the real attack comes.
Supported with some of the most advanced post-exploitation technologies, Cobalt Strike
gives strapped healthcare teams the ability to invest in further healthcare cybersecurity without having to worry about investing in research and development tools as well. Use Cobalt Strike to support your in-house team’s advanced red team engagements.
Discover How Cobalt Strike Elevates Red Team Operations
- Fill out a form
- Complete a brief vetting process, required by the U.S. Government. Since Cobalt Strike is a security testing tool that uses the same techniques as threat actors, we limit the trials to only responsible users.
- Receive your trial license and start testing.