Paper is Back at the Hospital

31101311893?profile=RESIZE_400xAs the healthcare sector continues to grapple with the professionalization of cybercrime, the University of Mississippi Medical Center (UMMC) has become the latest high-profile target in a sprawling ransomware attack.  This incident is a reminder of the "identity-first" battlefield and the catastrophic impact of machine-speed exfiltration on clinical operations.  The attack, first disclosed on 19 February 2026, has severely disrupted the state's only academic medical center. UMMC leadership, including Vice Chancellor LouAnn Woodward, confirmed that the system was forced to take its internet-connected technology offline, including its Epic EHR system, to "stop the bleeding."[1]

Statewide clinics remain closed through 24 February 2026, with a tentative reopening date of 25 February 2026. While hospitals and emergency rooms remain open, they are operating on manual "pen-and-paper" backup procedures.  No specific ransomware group has yet claimed credit for the attack. The investigation is currently being handled by UMMC teams in coordination with federal and state agencies. There is no definitive timeline for full system restoration. While clinics hope to reopen by midweek, the process of migrating from paper back to digital records and ensuring the integrity of the EHR often takes weeks, rather than days, for an organization of this size.

UMMC's Woodward addressed the attack head-on and wrote that the full details on how hackers gained access and what systems were compromised were still being sorted out. She did confirm the health system took some of its internet-connected technology offline as a safety precaution to halt any further spread of the ransomware. "To use a medical phrase, we have stopped the bleeding. And while we know much more now than we did 24 hours ago, the extent and the scope of the intrusion are still not fully understood," Woodward wrote. "Our technical teams and a host of experts in the field of cyberattacks and federal agencies are working around the clock to answer these questions and segregate systems, repair damage, and recover our data and applications." She also confirmed inpatient operations are only made possible by "using paper for documentation and patient orders," something Woodward said the hospital and staff prepare for regularly.

The incident highlights several emerging trends in the threat landscape that cybersecurity professionals must address to move from "compliance to confidence."

  1. The identity-first battlefield

Recent industry data show that identity-based attacks are now the primary vector for initial access in nearly 90% of investigations. For healthcare systems, this means the help desk is a critical vulnerability. Attackers are increasingly using AI voice agents and deepfakes to trick help desk personnel into resetting MFA or credentials.

Lesson: Implement out-of-band (OOB) verification for all sensitive requests (like credential resets) and move toward phishing-resistant MFA (FIDO2) to mitigate the human layer of risk.

  1. The reality of "assumed compromise."

UMMC's move to paper backups demonstrates a high degree of operational resilience—the hospital system has prepared for downtime. However, the move to manually take systems offline highlights the need for microsegmentation.

Lesson: Rather than a full-network shutdown, organizations should use microsegmentation to isolate infected segments of the production environment. This allows critical clinical systems (like imaging or dialysis) to remain online even while the administrative network is mitigated.

  1. The quadrupled speed of exfiltration

In the 2025-2026 threat landscape, the window for detection has shrunk dramatically. Exfiltration speeds have quadrupled, with attackers often reaching their impact goals in as little as 72 minutes.

Lesson: Legacy security architectures are not built for this speed. Organizations must move toward Unified AI Security Platforms that can provide real-time, context-aware policy enforcement across the browser and cloud applications to catch data leaks before the "bleeding" requires a total network shutdown.

  1. The financial "market penalty."

While UMMC is a public institution, the financial implications of such a breach are universal. Research from HICSS 2026 indicates that firms suffering a breach due to a lack of "cybersecurity readiness" face an average 7.5% loss in stock value and significant hits to their long-term Return on Assets (ROA).

Lesson: Frame cybersecurity not as a cost center but as a driver of financial performance. High readiness today is the leading indicator of superior profitability tomorrow.    

 

This article is shared at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  We provide indicators of compromise information (CTI) via a notification service (RedXray) or an analysis service (CTAC).  For questions, comments, or assistance, please contact the office directly at 1-844-492-7225 or feedback@redskyalliance.com    

Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5207428251321676122

 

[1] https://www.secureworld.io/industry-news/medical-ransomware-breach

You need to be a member of Red Sky Alliance to add comments!