sb-nz logo
Story image

Massive jump in email fraud targeting healthcare - Proofpoint

12 Feb 2019

Cybersecurity and compliance company Proofpoint has released its Email Fraud in Healthcare 2019 Report, which found that healthcare organisations were targeted in 96 email fraud attacks on average in Q4 2018 – a 473% jump from Q1 2017.

More than half of these organisations (53%) were attacked more often, with incidents up between 200 and 600% during the two-year period.

The report analyses more than 160 billion emails sent across 150 countries in both 2017 and 2018 to identify email fraud attack trends targeting more than 450 global healthcare organisations.

Email fraud, also known as Business Email Compromise (BEC), is one of today’s biggest cyber threats.

According to the FBI, BEC has cost organisations across the world $12.5 billion USD (over $17.5 billion AUD) since the end of 2013.

As part of these attacks, cybercriminals often use identity deception tactics, such as domain spoofing, to pose as trusted colleagues and business partners.

In Q4 2018, 95% of healthcare organisations were targeted by an attack using their own trusted domain.

Proofpoint Asia-Pacific and Japan vice president Tim Bentley says, “Healthcare organisations are high-value targets for cybercriminals due to the large amounts of personal information that they store.

“Unfortunately, these organisations are also extremely vulnerable to email-based attacks as their often-complex supply chains offer multiple opportunities for cybercriminals to insert themselves into various business transactions and trick employees into sharing information or wiring funds.”

“It is critical that organisations implement a multi-layered security approach to secure the email gateway and educate employees on cybersecurity best practices,” Bentley adds.

“Employees should always confirm the source of all emails that are sent to their personal and corporate email inboxes and be wary of emails that urgently request a password change, patient data, or a link be clicked.”

Key Proofpoint Healthcare research findings

  • Wire-transfer fraud is the most common form of email fraud for healthcare.

  • Sixty-five staff members on average were attacked in Q4 2018 within targeted healthcare organisations.

  • Forty-five percent of emails sent from healthcare-owned domains in Q4 2018 appeared suspicious. Of those 65%  were sent to employees, 42% were sent to patients, and 15% were sent to business partners.

  • The highest volume of email fraud attacks targeting healthcare arrived on weekdays between 7 am and 1 pm in the targets’ time zone.

Story image
Hackers offering forged “official” COVID vaccination certificates and negative test results on dark net 
There has been a 350% increase in the number of advertisements selling alleged COVID vaccines within the last three months.More
Story image
O365 a weak point ripe for exploit, say security professionals
71% of more than 1,000 security professionals have been on the receiving end of a Microsoft 365 account takeover, on average, seven times in the last year alone.More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More
Story image
2020 sees a global shift in financial malware threats
The financial threat landscape experienced a game-changing pandemic year, according to a new report from Kaspersky.More
Story image
Video: 10 Minute IT Jams - Who is Okta?
Okta is an identity and access management company, specialising in secure user authentication. It's an enterprise-grade identity management service, built for the cloud, but compatible with many on-premises applications.More
Story image
Microsoft Exchange breach a wake-up call to ditch the server
"There are owners who still have in-house exchange servers because they are suspicious of the cloud or have concerns about their data sovereignty or don't want to contemplate the capital expenditure. But the warning is clear. Get rid of them."More