High Severity Cyberattack International Mass Casualty

Iran-Linked Pay2Key Ransomware Encrypts Unnamed US Healthcare Provider, Issues No Ransom Demand in Apparent Destructive Operation

📅 2026-02-25

In late February 2026, an unnamed U.S. healthcare organization was compromised by Pay2Key, an Iranian state-linked ransomware operation that the FBI, CISA, and Department of Defense Cyber Crime Center jointly assessed in 2024 as an "information operation" aligned with Iran's strategic interests rather than a conventional criminal extortion enterprise. The attack coincided with the opening days of Operation Epic Fury — the U.S.-Israel military campaign against Iran that commenced February 28 — and represents the first confirmed Pay2Key intrusion against a U.S. healthcare target since the conflict began.

According to joint incident response analysis by Halcyon's Ransomware Research Center and Beazley Security, the threat actors first gained access through a compromised administrator account and waited several days before acting — a deliberate pre-deployment reconnaissance phase. When the payload was deployed, the threat actors used TeamViewer — a legitimate remote access tool already installed in the victim's environment — to blend with normal activity and evade endpoint detection. Full environment encryption was completed in approximately three hours, with the active file encryption phase taking roughly one hour. Anti-forensic activity followed, including targeted event log deletion designed to erase traces of the intrusion.

Notably, no data was exfiltrated and no ransom demand was issued — a significant departure from the group's standard double-extortion playbook. Former FBI Cyber Deputy Director Cynthia Kaiser, now SVP at Halcyon, characterized this behavioral shift as alarming: when a group that normally steals data before encrypting skips both steps, the operational objective appears to be disruption and destruction rather than profit.

The new Pay2Key variant used in this attack represented a marked technical advancement over prior campaigns, with improvements in evasion, execution, and anti-forensics that rendered some existing detection signatures ineffective. The incident preceded the March 11 Stryker wiper attack by approximately two weeks, and together the two operations confirm a sustained, deliberate Iranian campaign targeting American healthcare infrastructure as an asymmetric response to U.S. military operations.

// Source

📰 Halcyon / Beazley Security Read Full Story →

ThreatMap USA summarizes publicly available reports for informational purposes. See our disclaimer.

// Incident Details

Incident Date2026-02-25
County District of Columbia
StateDC
Severity High
Incident Type Cyberattack, International, Mass Casualty
PublishedApril 5, 2026
SourceHalcyon / Beazley Security

// More Incidents in District of Columbia

Pentagon Deploys Nearly 7,000 Marines and 82nd Airborne to Middle East, Prepares Ground Operation Options Against Iran
Washington DC  ·  2026-03-27
Critical
Iran-Linked Handala Group Breaches FBI Director Kash Patel’s Personal Email, Publishes Stolen Files in Retaliation for DOJ Domain Seizures
Washington DC  ·  2026-03-27
High
Salt Typhoon Chinese APT Compromises U.S. Army National Guard Systems, Exposing Admin Credentials and Network Diagrams
Washington DC  ·  2026-02-01
Critical