sb-au logo
Story image

Massive jump in email fraud targeting healthcare - Proofpoint

12 Feb 2019

Cybersecurity and compliance company Proofpoint has released its Email Fraud in Healthcare 2019 Report, which found that healthcare organisations were targeted in 96 email fraud attacks on average in Q4 2018 – a 473% jump from Q1 2017.

More than half of these organisations (53%) were attacked more often, with incidents up between 200 and 600% during the two-year period.

The report analyses more than 160 billion emails sent across 150 countries in both 2017 and 2018 to identify email fraud attack trends targeting more than 450 global healthcare organisations.

Email fraud, also known as Business Email Compromise (BEC), is one of today’s biggest cyber threats.

According to the FBI, BEC has cost organisations across the world $12.5 billion USD (over $17.5 billion AUD) since the end of 2013.

As part of these attacks, cybercriminals often use identity deception tactics, such as domain spoofing, to pose as trusted colleagues and business partners.

In Q4 2018, 95% of healthcare organisations were targeted by an attack using their own trusted domain.

Proofpoint Asia-Pacific and Japan vice president Tim Bentley says, “Healthcare organisations are high-value targets for cybercriminals due to the large amounts of personal information that they store.

“Unfortunately, these organisations are also extremely vulnerable to email-based attacks as their often-complex supply chains offer multiple opportunities for cybercriminals to insert themselves into various business transactions and trick employees into sharing information or wiring funds.”

“It is critical that organisations implement a multi-layered security approach to secure the email gateway and educate employees on cybersecurity best practices,” Bentley adds.

“Employees should always confirm the source of all emails that are sent to their personal and corporate email inboxes and be wary of emails that urgently request a password change, patient data, or a link be clicked.”

Key Proofpoint Healthcare research findings

  • Wire-transfer fraud is the most common form of email fraud for healthcare.

  • Sixty-five staff members on average were attacked in Q4 2018 within targeted healthcare organisations.

  • Forty-five percent of emails sent from healthcare-owned domains in Q4 2018 appeared suspicious. Of those 65%  were sent to employees, 42% were sent to patients, and 15% were sent to business partners.

  • The highest volume of email fraud attacks targeting healthcare arrived on weekdays between 7 am and 1 pm in the targets’ time zone.

Story image
Research reveals increase in critical, low complexity vulnerabilities
2020 saw a large spike in physical and adjacent vulnerabilities, likely due to the proliferation of IoT and smart devices in use and being tested by researchers.More
Story image
Kaspersky ranked number one in channel partner satisfaction
“Being recognised for the second consecutive year as the number one cybersecurity vendor for channel satisfaction, reflects the investment we have made in the Kaspersky United partner program over the past two years."More
Story image
Stone & Chalk and AustCyber confirm strategic merger
"The integration of Stone & Chalk and AustCyber will enable our joint organisation to pursue a resilient and prosperous future not just for founders, enterprise and governments, but for all of Australia.”More
Story image
Creating a strong culture of security within organisations
CISOs worldwide are inherently aware of how significant investment in cybersecurity strategies and technologies can bolster an organisation’s protection against cyberattacks. However, many overlook the importance of culture when it comes to cybersecurity.More
Story image
Cybersecurity risk has never been greater," declares FortiGuard Labs
Adversaries are highly adaptable as they conduct sophisticated attacks, particularly against remote workers, digital supply chains, and core networks.More
Story image
How to stay ahead of the next cyber breach
With so many people working from home, the corresponding surge in app usage, unmanaged devices, web traffic and accessing internal resources is making security a much trickier prospect.More