Attack stages in an insurance ransomware incident
For more insights into cybersecurity for the financial sector, check out our Guide.
Initial access
Social engineering and stolen credentials are two of the most common ways hackers gain a foothold in insurance companies’ networks. Business email compromise (BEC) costs organizations $2.8 billion in 2024. In insurance company phishing attacks, hackers impersonate an executive or IT help desk to steal login credentials. Increasingly, attackers use AI to craft hyper-personalized messages that trick employees into installing fake updates, for example.
Exposed remote services (RDP/VPN) and vulnerable internet-facing applications are other frequent entry points.
Privilege escalation
Once inside networks, attackers use stolen credentials to move deeper. They exploit unpatched vulnerabilities or leftover administrative accounts to gain domain admin rights. Microsoft research shows 99% of password-spray attacks use legacy (IMAP/POP/SMTP) logins.
Lateral movement
After swiping admin privileges, hackers move laterally through an insurer’s network. They exploit trust relationships (e.g., SMB shares, admin tools like PsExec) to reach high-value claims databases, document repositories, and other offices (via remote agents). The recent LockBit attack on Managed Care of North America (a large dental insurer) exposed 8.9 million patient records after lateral network penetration.
Data theft
The usual ransomware playbook involves double extortion. First, they copy valuable data (claim files, policyholder records, and PII). Because of its sensitive nature, insurance industry data is particularly lucrative for resale on the dark web, giving hackers additional leverage for extortion.
Encryption
In the final stage, attackers deploy the ransomware, encrypting insurers’ files and systems. Ransomware attacks happen quickly: from initial compromise to ransom typically takes 17 hours. By this point, attackers have usually disabled backup processes and deleted logs, forcing insurers to pay to unlock their systems unless they have taken proper precautions.