Paper Backups and Patient Triage: The UMMC Ransomware Breach
4:52
author photo
By SecureWorld News Team
Mon | Feb 23, 2026 | 11:35 AM PST

As the healthcare sector continues to grapple with the professionalization of cybercrime, the University of Mississippi Medical Center (UMMC) has become the latest high-profile target in a sprawling ransomware attack. The incident is a reminder of the "identity-first" battlefield and the catastrophic impact of machine-speed exfiltration on clinical operations.

The attack, first disclosed on February 19, 2026, has severely disrupted the state's only academic medical center. UMMC leadership, including Vice Chancellor LouAnn Woodward, confirmed that the system was forced to take its internet-connected technology offline—including its Epic EHR system—to "stop the bleeding."

Statewide clinics remain closed through February 24, with a tentative reopening date of February 25. While hospitals and emergency rooms remain open, they are operating on manual "pen-and-paper" backup procedures.

No specific ransomware group has yet claimed credit for the attack. The investigation is currently being handled by UMMC teams in coordination with federal and state agencies.

There is no definitive timeline for full system restoration. While clinics hope to reopen by midweek, the process of migrating from paper back to digital records and ensuring the integrity of the EHR often takes weeks, rather than days, for an organization of this size.

UMMC's Woodward addressed the attack head on and wrote that the full details on how hackers gained access and what systems were compromised were still being sorted out. She did confirm the health system took some of its internet-connected technology offline as a safety precaution to halt any further spread of the ransomware.

"To use a medical phrase—we have stopped the bleeding. And while we know much more now than we did 24 hours ago, the extent and the scope of the intrusion are still not fully understood," Woodward wrote. "Our technical teams and a host of experts in the field of cyberattacks and federal agencies are working around the clock to answer these questions and segregate systems, repair damage, and recover our data and applications."

She also confirmed inpatient operations are only made possible by "using paper for documentation and patient orders," something Woodward said the hospital and staff prepare for regularly.

The incident highlights several emerging trends in the threat landscape that cybersecurity professionals must address to move from "compliance to confidence."

1. The identity-first battlefield

Recent industry data show that identity-based attacks are now the primary vector for initial access in nearly 90% of investigations. For healthcare systems, this means the help desk is a critical vulnerability. Attackers are increasingly using AI voice agents and deepfakes to trick help desk personnel into resetting MFA or credentials.

Lesson: Implement out-of-band (OOB) verification for all sensitive requests (like credential resets) and move toward phishing-resistant MFA (FIDO2) to mitigate the human layer of risk.

2. The reality of "assumed compromise"

UMMC's move to paper backups demonstrates a high degree of operational resilience—the hospital system prepared for downtime as a certainty. However, the move to take systems offline manually highlights the need for microsegmentation.

Lesson: Rather than a full-network shutdown, organizations should utilize microsegmentation to isolate infected segments of the production environment. This allows critical clinical systems (like imaging or dialysis) to remain online even while the administrative network is mitigated.

3. The quadrupled speed of exfiltration

In the 2025-2026 threat landscape, the window for detection has shrunk dramatically. Exfiltration speeds have quadrupled, with attackers often reaching their impact goals in as little as 72 minutes.

[RELATED: The Machine-Speed Mandate: Breaking Down a New Global IR Report]

Lesson: Legacy security architectures are not built for this speed. Organizations must move toward Unified AI Security Platforms that can provide real-time, context-aware policy enforcement across the browser and cloud applications to catch data leaks before the "bleeding" requires a total network shutdown.

4. The financial "market penalty"

While UMMC is a public institution, the financial implications of such a breach are universal. Research from HICSS 2026 indicates that firms suffering a breach due to a lack of "cybersecurity readiness" face an average 7.5% loss in stock value and significant hits to their long-term Return on Assets (ROA).

Lesson: Frame cybersecurity not as a cost center but as a driver of financial performance. High readiness today is the leading indicator of superior profitability tomorrow.

Comments