Hands typing on a laptop next to a stethoscope on a wooden table symbolizing medical work.

How a Healthcare Office Stayed Infected by Cybercriminals for 2 Years — and Never Knew

By Brian Butterfield, CISSP

I'll never forget the day I walked into a local healthcare office that thought they were "all set" with cybersecurity. They had antivirus. They had a professional IT company. On the surface, everything looked fine.

But when I suggested a simple scan, they brushed it off. 'We're between vendors,' they said. 'We'll circle back once things settle.' That hesitation would prove costly.

The Discovery

Months later, when they finally let us in, I expected the usual—outdated patches, weak passwords, maybe a few suspicious emails. Instead, I found something chilling. Their systems had been infected since 2023. Nearly two years. And not a single person knew.

What We Found Hiding in Plain Sight

• 3 actively compromised devices
• 5 suspicious Windows processes running silently
• 13 persistence footholds — ensuring the malware always came back
• 29 altered registry entries designed to stay invisible
• PowerShell access abuse — giving attackers a remote toolkit

Could Patient Data Have Been Stolen?

We couldn't prove with certainty that patient records were stolen. But the malware in place was built to steal passwords, EHR logins, financial data, and files.

And here's the cold, hard truth: under HIPAA, not knowing is no defense. If data was accessible to attackers—even if you can't prove it left the building—regulators can treat it as a reportable breach.

That means:
• Mandatory patient notification
• Federal OCR investigation
• Public posting on the HHS "Wall of Shame"
• Fines from $50,000 to $1.5 million per violation
• Loss of patient trust

And many cyber liability policies won't cover you if "reasonable security controls" weren't in place.

The Villains in the Story

1. ClickFix Malware - tricked staff into running a command that handed attackers the keys.
2. URSnif Trojan - a credential-stealing parasite targeting patient data, EHRs, and financial accounts.

Why It Stayed Hidden

This was professional-grade malware: relaunched after every reboot, disguised as legitimate processes, and reinstalled itself even after "removal." Antivirus alone never stood a chance.

The Hard Lesson for Healthcare

This office wasn't reckless. They had antivirus. They had IT support. But HIPAA doesn't care about 'good intentions.' If data is at risk, you're liable. If you can't prove it wasn't stolen, regulators assume it was.

Final Thought

Cybercriminals don't always crash systems or lock files with ransomware. Sometimes they just sit quietly, watching, collecting, waiting. That's what happened here. Two years of silent compromise. Two years of HIPAA exposure — and no one knew.

If you're not 100% certain your systems are secure, monitored, and compliant — now is the time to find out.

■ Book a Free Cybersecurity Risk Assessment Call with Microtech.

We'll scan your systems, show you exactly what's hiding in plain sight, and explain the results in plain English. No jargon. No pressure. Just clarity — before regulators or attackers force your hand.

Get In Touch

Transform, elevate, and protect your business with Microtech. Contact us today to learn how our expert IT solutions can streamline your operations and secure your business. 

For inquiries and more information:

Phone: 954-327-1001
Email: info@micro-tech.com
Address: 110 E Broward Blvd #1700, Fort Lauderdale, FL 33301

Choose Microtech Computer Services for innovative, reliable IT solutions that propel your business forward.

logo

We are 100% committed to making sure business owners have the most reliable and professional IT service in Florida.