Story image

Massive jump in email fraud targeting healthcare - Proofpoint

12 Feb 2019

Cybersecurity and compliance company Proofpoint has released its Email Fraud in Healthcare 2019 Report, which found that healthcare organisations were targeted in 96 email fraud attacks on average in Q4 2018 – a 473% jump from Q1 2017.

More than half of these organisations (53%) were attacked more often, with incidents up between 200 and 600% during the two-year period.

The report analyses more than 160 billion emails sent across 150 countries in both 2017 and 2018 to identify email fraud attack trends targeting more than 450 global healthcare organisations.

Email fraud, also known as Business Email Compromise (BEC), is one of today’s biggest cyber threats.

According to the FBI, BEC has cost organisations across the world $12.5 billion USD (over $17.5 billion AUD) since the end of 2013.

As part of these attacks, cybercriminals often use identity deception tactics, such as domain spoofing, to pose as trusted colleagues and business partners.

In Q4 2018, 95% of healthcare organisations were targeted by an attack using their own trusted domain.

Proofpoint Asia-Pacific and Japan vice president Tim Bentley says, “Healthcare organisations are high-value targets for cybercriminals due to the large amounts of personal information that they store.

“Unfortunately, these organisations are also extremely vulnerable to email-based attacks as their often-complex supply chains offer multiple opportunities for cybercriminals to insert themselves into various business transactions and trick employees into sharing information or wiring funds.”

“It is critical that organisations implement a multi-layered security approach to secure the email gateway and educate employees on cybersecurity best practices,” Bentley adds.

“Employees should always confirm the source of all emails that are sent to their personal and corporate email inboxes and be wary of emails that urgently request a password change, patient data, or a link be clicked.”

Key Proofpoint Healthcare research findings

  • Wire-transfer fraud is the most common form of email fraud for healthcare.

  • Sixty-five staff members on average were attacked in Q4 2018 within targeted healthcare organisations.

  • Forty-five percent of emails sent from healthcare-owned domains in Q4 2018 appeared suspicious. Of those 65%  were sent to employees, 42% were sent to patients, and 15% were sent to business partners.

  • The highest volume of email fraud attacks targeting healthcare arrived on weekdays between 7 am and 1 pm in the targets’ time zone.

Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.