TechSignal.news
Healthcare Tech

Healthcare Data Exfiltration Attacks Tripled in 2025, Trellix Reports 54.7M Detections

Trellix detected 54.7 million healthcare threats in 2025, with exfiltration-only attacks tripling as single EHRs now fetch $60—20 times a credit card's value. New HIPAA mandates force buyers to rethink vendor oversight and backup architecture.

TechSignal.news AI4 min read

Exfiltration Economics Reshape Healthcare Security Priorities

Healthcare attackers tripled their use of exfiltration-only campaigns in 2025, abandoning encryption in favor of stealing data for direct sale, according to Trellix's January 30, 2026 threat intelligence report covering 54.7 million detections across its global customer base. A single electronic health record now sells for $60 on criminal markets—20 times the $3 value of a stolen credit card—turning patient databases into higher-margin targets than traditional ransomware.

This shift changes the math for enterprise buyers. Qilin ransomware extracted 852 GB from Covenant Health in one 2025 incident, illustrating the scale attackers now pursue without ever deploying file encryption. Email remains the entry point for 85% of incidents, and 75% of Trellix's detections originated in U.S. healthcare organizations, concentrating risk where regulatory penalties hit hardest.

HIPAA Overhaul Adds Compliance Tax to Security Budgets

The 2026 HIPAA Security Rule expansion introduces 72-hour breach reporting, mandatory incident response plans, and stricter vendor oversight requirements that raise compliance costs by 20-50% in audit and monitoring categories. Encryption and multi-factor authentication move from recommended to mandatory controls, forcing infrastructure upgrades across cloud environments and remote access systems that proliferated during telehealth expansion.

The rule directly addresses vendor risk after incidents like the Marquis Health breach, where SonicWall's compromised cloud backups exposed 780,000 individuals' Social Security numbers, dates of birth, and payment card data. Buyers now inherit regulatory liability from partner failures—Conduent's 2025 breach affected 25 million individuals, creating cascading exposure for every covered entity in its customer base.

Vendor oversight translates to concrete procurement requirements: business associate agreements must include audit-sharing provisions, and RFPs increasingly demand proof of cyber resilience testing and OT/IoT security for connected medical devices. Compliance platforms like Drata and Vanta compete with bundled approaches from Trellix, CrowdStrike's Falcon platform, and Palo Alto Networks' Cortex XDR, where integrated HIPAA audit logging differentiates offerings.

Budget Reallocation Toward Detection and Backup Architecture

Boards treat cybersecurity as a C-suite priority because breach costs reached new highs in 2025 while attack surfaces expanded through cloud migration, AI tools, and persistent remote access. Budget decisions now favor real-time detection over perimeter defenses—basic antivirus no longer satisfies RFP requirements when attackers extract hundreds of gigabytes before traditional alerts trigger.

The Trellix report's U.S.-centric detection volume strengthens its position in North American enterprise sales against CrowdStrike's broader endpoint detection focus, but buyers face a vendor landscape where Microsoft Defender for Healthcare, Proofpoint's email security (relevant to the 85% email vector), and specialized compliance tools fragment purchasing decisions.

Backup architecture faces immediate pressure. The SonicWall-linked Marquis breach demonstrates that cloud backups without air-gapping or immutability create exfiltration vectors identical to production systems. Zero-trust backup vendors like Rubrik and Cohesity price immutable storage at $0.02-0.05 per GB monthly, adding 10-15% to storage budgets but eliminating the exposure that turned Marquis's recovery plan into a liability.

What Enterprise Buyers Must Do Now

Vendor audits move from annual compliance theater to quarterly risk assessments with documented supply chain proofs. The tripling of exfiltration attacks in 2025 means every third-party connection—from EHR vendors to billing processors—requires verification of encryption, access controls, and incident response capabilities before onboarding.

RFPs must specify detection volume baselines and exfiltration defense mechanisms, not feature checklists. A vendor claiming "HIPAA compliance" without demonstrating how it detects 852 GB transfers in progress offers no protection against the 2025 threat profile.

Budget at least 20% more for vendor risk management tools and personnel to meet the 72-hour reporting window. Organizations without formal incident response plans face delayed breach disclosures that multiply regulatory fines and reputational damage. The 2026 HIPAA changes make non-compliance measurable and inherited—partner breaches become your breaches under the expanded liability framework.

healthcare-cybersecurityHIPAA-complianceransomwarevendor-risk-managementdata-exfiltration

Technology decisions, clearly explained.

Weekly analysis of the tools, platforms, and strategies that matter to B2B technology buyers. No fluff, no vendor spin.

More in Healthcare Tech