Healthcare companies experienced a 300 percent increase in impostor email attacks between the first quarters of 2018 and 2019, a new report found.

According to Proofpoint, healthcare organizations received an average of 43 impostor emails during the first quarter of 2019. This constituted a 300 percent increase in impostor email attacks over the same quarter in the previous year. Of affected healthcare organizations, 95 percent were hit with email spoofing of their own trusted domains; on average, 65 people received spoofed email messages.

A deeper dive into the attack emails revealed that subject lines containing the words “payment,” “request,” “urgent” and related terms appeared in 55 percent of the fake emails. In addition, 77 percent of attack messages arrived with malicious URLs. Attackers used this tactic and others to target healthcare entities primarily with banking Trojans.

Email and Malware Attacks in the Healthcare Industry

Bad actors are increasingly launching email attacks to prey upon healthcare organizations. Proofpoint disclosed in February 2019 that the average healthcare organization suffered 96 email fraud attacks in Q4 2018, up 473 percent from the beginning of 2017.

Cybercriminals leveraged those attack emails and other techniques to deliver various malware, but as revealed by Verizon in its “2019 Data Breach Investigations Report (DBIR),” ransomware accounted for 70 percent of all malware incidents that affected this vertical during its data collection period.

Unfortunately, these ransomware attacks didn’t slow down over the next few months. Emsisoft found that healthcare providers weathered 491 ransomware attacks between Q1 and Q3 2019, which comprised about 79 percent of ransomware incidents encountered by all industries during that same time period.

How Can Healthcare Companies Defend Against Email Attacks?

Security professionals can help healthcare organizations defend against email attacks by investing in email security tools to eliminate obvious phishing emails and similar attacks before they arrive in employees’ inboxes. Organizations should also implement mandatory security awareness training to educate users about malicious attachments and links commonly found in attack emails.

More from

New Attack Targets Online Customer Service Channels

An unknown attacker group is targeting customer service agents at gambling and gaming companies with a new malware effort. Known as IceBreaker, the code is capable of stealing passwords and cookies, exfiltrating files, taking screenshots and running custom VBS scripts. While these are fairly standard functions, what sets IceBreaker apart is its infection vector. Malicious actors are leveraging the helpful nature of customer service agents to deliver their payload and drive the infection process. Here’s a look at how IceBreaker…

Operational Technology: The evolving threats that might shift regulatory policy

Listen to this podcast on Apple Podcasts, Spotify or wherever you find your favorite audio content. Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022 — a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure. Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are…

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an organization’s IT infrastructure to identify and remediate potential points of attack. Here’s how it can give your organization an edge. Understanding Attack Surface Management Here…

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience. Many companies must now protect their systems from more sophisticated threats with fewer resources — both human and technical. Cobalt’s 2022 The State of Pentesting Report found that 90% of short-staffed teams are struggling to monitor…