In February 2024, a devastating ransomware attack struck Change Healthcare, a subsidiary of UnitedHealth Group and the largest healthcare payment system in the United States, disrupting critical services like prescription processing and provider payments across the nation. This cyber incident, which resulted in a staggering $22 million ransom payment and the theft of six terabytes of patient data, reverberated through the healthcare sector, exposing vulnerabilities in interconnected systems. At a particularly critical juncture, the Department of Veterans Affairs (VA) found itself grappling with the fallout while modernizing its electronic health record (EHR) system, a multi-billion-dollar endeavor to overhaul outdated technology with a new platform developed by Oracle Health. The Captain James A. Lovell Federal Health Care Center in North Chicago, Illinois, a key site for joint deployment with the Department of Defense (DoD), became a focal point of concern as the attack stalled essential progress. This disruption added yet another layer of complexity to an already challenging project, raising questions about the resilience of healthcare IT infrastructure in the face of cyber threats.

Impact of the Cyberattack on VA EHR Modernization

Testing Delays at Lovell Facility

The ransomware attack on Change Healthcare had a direct and profound effect on the VA’s ability to conduct timely testing of system interfaces at the Lovell facility, a critical step in ensuring the seamless operation of the new EHR system. Interfaces, which facilitate data exchange between the modernized EHR, legacy VA systems, and external networks like Change Healthcare’s payment and billing platforms, are vital for operational continuity. According to a 2024 report by the VA’s Office of Inspector General (OIG), the shutdown of Change Healthcare’s systems halted testing for the Financial Management System interface, a key component linking the EHR to billing operations. This interruption delayed localized testing until a replacement system was introduced in November 2024, with full data validation not achieved until early 2025. The setback not only slowed progress at Lovell but also underscored the fragility of relying on external systems for critical healthcare IT functions during unexpected disruptions.

Beyond the immediate delay, the testing setback at Lovell highlighted broader implications for the VA’s modernization timeline and interagency collaboration with the DoD. The Lovell deployment represents a significant milestone as a joint rollout, marking the final implementation of the DoD’s modernized EHR system. Any delay in interface testing risks misalignment between the two agencies’ systems, potentially affecting data interoperability and operational efficiency. The OIG emphasized that while the delay was tied to an external event, it exposed a lack of contingency planning for such disruptions. As the VA works to recover lost ground, this incident serves as a stark reminder of how external cyberattacks can derail even the most carefully orchestrated federal IT initiatives, necessitating robust backup strategies to mitigate future risks and ensure continuity of critical testing phases.

Documentation Shortcomings

Compounding the testing delays, the cyberattack on Change Healthcare brought to light significant gaps in the VA’s documentation practices during the EHR modernization process at Lovell. The OIG’s findings revealed that while the VA and Oracle Health conducted essential tests and retests for the EHR interfaces, the results were not adequately recorded in the designated Application Lifecycle Management Tool. Instead, evidence related to the delayed Financial Management System interface was stored in an alternative system, creating inconsistencies in record-keeping. This lack of standardized documentation raises serious concerns about transparency and the ability to verify system implementation and security. Without proper records, future audits or troubleshooting efforts could be hampered, potentially delaying subsequent deployments or compromising the integrity of the EHR system at a critical stage of its rollout.

Moreover, the documentation issues flagged by the OIG point to deeper systemic challenges within the VA’s approach to managing large-scale IT projects. Proper documentation is not merely a procedural requirement but a cornerstone of accountability, ensuring that all stakeholders can track progress, identify errors, and confirm compliance with security standards. The decision to store test evidence outside the designated repository suggests either a lack of adherence to protocols or insufficient training on the importance of centralized record-keeping. As the VA prepares for broader EHR implementations, addressing these documentation shortcomings becomes imperative to avoid repeating such lapses. The cyberattack may have exacerbated the issue by disrupting normal operations, but it also exposed a pre-existing vulnerability that must be rectified to safeguard the project’s long-term success.

Broader Challenges in VA’s EHR Project

Historical Struggles and Limited Rollout

The VA’s journey to modernize its EHR system, initiated in 2018 with a $10 billion contract awarded to Cerner (later acquired by Oracle Health and expanded to over $16 billion), has been fraught with obstacles that predate the Change Healthcare attack. Aimed at creating an interoperable health record system in collaboration with the DoD, the project promised to transform veteran care by replacing outdated legacy systems. However, since the first rollout in 2020, the Oracle Health platform has encountered persistent issues, including patient safety risks, performance bottlenecks, and usability complaints from healthcare providers. These challenges prompted the VA to halt deployments at all sites except Lovell in April 2023, reflecting the depth of the technical and operational hurdles. Currently, the system operates at just six of the VA’s 170 medical centers, a stark indicator of the slow progress and the immense task ahead to achieve widespread adoption.

Adding to the complexity, the historical struggles of the EHR project reveal a pattern of mismanagement and technical shortcomings that have eroded confidence in the system’s reliability. Reports of system outages, data entry errors, and inadequate training for staff have fueled criticism from both internal stakeholders and external watchdogs. The pause in deployments was intended to allow time for addressing these concerns, yet the limited scope of active implementations—confined to a handful of facilities—demonstrates the scale of the challenge. The Lovell site, as one of the few active deployment locations, carries significant weight as a testbed for resolving these issues. However, external disruptions like the cyberattack further complicate efforts to stabilize the system, highlighting the need for a comprehensive overhaul of both technical infrastructure and project oversight to prevent further setbacks in this critical healthcare initiative.

Future Deployment Goals

Despite the myriad challenges, the VA remains committed to advancing its EHR modernization with ambitious plans to expand the system’s reach over the coming years. The current roadmap targets resuming deployments at 13 additional sites by 2026, a significant step toward broader adoption across its network of medical centers. The ultimate goal is full implementation by 2031, ensuring that all 170 VA facilities transition to the Oracle Health platform, thereby achieving seamless interoperability with the DoD and enhancing veteran care through modernized technology. This timeline reflects a determination to overcome past and present obstacles, including those exacerbated by external events like the Change Healthcare attack. However, meeting these deadlines will require meticulous planning and execution to address both technical flaws and unforeseen risks that could derail progress.

Achieving these deployment goals also hinges on learning from recent disruptions and fortifying the VA’s approach to project management and system integration. The delays at Lovell underscore the importance of building resilience into the rollout process, ensuring that external threats do not repeatedly stall critical phases like interface testing. Additionally, the VA must prioritize resolving internal issues such as staff training, system usability, and robust contingency plans to handle crises. Collaboration with Oracle Health will be crucial to refine the platform’s performance and address user feedback from early adopters. As the VA moves toward its 2031 target, sustained investment in cybersecurity and operational stability will be essential to safeguard the project against future vulnerabilities, ensuring that the promise of a modernized EHR system becomes a reality for veterans nationwide.

Cybersecurity Vulnerabilities in Healthcare IT

Interconnected System Risks

The Change Healthcare ransomware attack serves as a sobering example of the growing cybersecurity risks facing healthcare IT systems, particularly their interconnected nature that amplifies the impact of a single breach. As the largest healthcare payment system in the U.S., Change Healthcare’s compromise disrupted not only its own operations but also those of countless partners, including federal entities like the VA. The incident led to widespread issues with prescription services and provider payments, while for the VA, it meant critical delays in EHR testing at the Lovell facility. This cascading effect illustrates how a vulnerability in one organization can ripple through an entire ecosystem, affecting data sharing, billing processes, and ultimately, the delivery of care. The OIG noted that while patient outcomes at Lovell were not directly harmed, the integration setbacks were significant, pointing to the urgent need for stronger defenses across healthcare networks.

Furthermore, the interconnectedness of healthcare IT systems demands a reevaluation of how organizations manage dependencies on external partners. The VA’s reliance on Change Healthcare for payment and billing interfaces exposed a critical weak point when the latter’s systems were offline. This incident highlights a broader trend in the healthcare sector, where digital transformation has increased efficiency but also heightened exposure to cyber threats. Protecting against such risks requires not only robust internal security measures but also collaborative efforts with third-party providers to establish shared protocols for threat detection and response. As healthcare systems grow more integrated, the potential for widespread disruption from a single attack will only increase, making it imperative for agencies like the VA to prioritize cybersecurity as a core component of their IT modernization strategies.

Balancing Innovation and Stability

Navigating the delicate balance between technological innovation and operational stability remains a persistent challenge for large-scale government IT projects, as evidenced by the VA’s EHR modernization efforts amidst the Change Healthcare attack. The push to adopt cutting-edge systems like the Oracle Health platform aims to revolutionize veteran care through enhanced data interoperability and streamlined processes. However, incidents like the 2024 cyberattack reveal how external disruptions can undermine these advancements, stalling critical testing and integration phases. Former VA Secretary Denis McDonough acknowledged the successful deployment at Lovell despite the attack but expressed uncertainty about whether ongoing issues stemmed from inherent EHR flaws or the cyber incident itself. This ambiguity reflects the broader difficulty of innovating within a landscape fraught with both technical and external risks.

Compounding this challenge is the need to address foundational issues that predate external threats, ensuring that innovation does not outpace the capacity for stable implementation. The OIG’s findings on documentation gaps and testing delays at Lovell signal that internal processes must be fortified to support ambitious IT transformations. Without clear protocols for record-keeping and contingency planning, the VA risks repeated setbacks that could erode trust in the EHR system. Balancing progress with reliability requires a multifaceted approach, including rigorous testing, staff preparedness, and proactive cybersecurity measures to shield against future attacks. As the VA continues its modernization journey, prioritizing stability alongside innovation will be crucial to mitigate disruptions and deliver on the promise of a transformed healthcare system for veterans, safeguarding against both internal weaknesses and external threats.

Subscribe to our weekly news digest

Keep up to date with the latest news and events

Paperplanes Paperplanes Paperplanes
Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later