Back to Email phishing

Email phishing

Connecticut-based medical center victim of a phishing attack. 

On November 12, 2019, Connecticut-based healthcare provider Starling Physicians P.C. revealed that a phishing attack earlier this year affected email accounts of employees. The compromised accounts contained certain patients’ names, addresses, dates of birth, passport numbers, Social Security numbers, medical information, and health insurance or billing information.

The incident.

The attack occurred in February 2019, and the investigation was completed in September 2019. On November 12, the medical center notified all the impacted patients regarding the breach. They are also offered free credit monitoring services for the patients whose Social Security numbers were compromised. The affected patients were also given instructions to monitor their accounts for any suspicious activity.

"Upon learning of the incident, we promptly secured the email accounts to prevent further access" Starling's statement said. "We also retained a leading forensic security firm to investigate and conduct a comprehensive search for any personal information in the impacted accounts."

Attacks on healthcare providers are on the rise. Very recently, University of Rochester Medical Center (URMC) and Jackson Health System had to pay millions of dollars as penalty for HIPAA violations.

Attackers usually resort to familiar, effective techniques, like phishing scams, to gain access to email accounts. A smart tool like Exchange Reporter Plus enables organizations to stay ahead of attackers by monitoring for and thwarting email-bound cybersecurity threats. Download a free, 60-day trial of Exchange Reporter Plus today.

How ManageEngine can help.

Exchange Reporter Plus provides a host of reports that can help you locate suspicious emails, both sent and received, based on keywords in their subject or body. Often times, these malicious emails appear to be valid, tricking users into opening the emails and clicking on links embedded in them, which can cause serious damage.

With Exchange Reporter Plus, you can locate emails based on:

  • Messages by subject keyword. Use reports to identify particular keywords in the email subject lines.
  • Messages by body keyword. Identify all the messages in your mailbox that have a particular keyword in the body of the email.
  • Attachment name. Get a report of all emails in your mailbox that have an attachment with a specific name. With the names of the malicious files, you can take the necessary steps to stop email-bound threats.
  • Attachment type. Based on an attachment’s file extension, you can spot malicious software.
  • The number of emails received from a specific domain, sender, department, or external email address. Get reports on all incoming emails from an external email address, a blacklisted sender or domain, or a specific department.

In addition, ManageEngine O365 Manager Plus provides an advanced Office 365 mailbox content search capability that identifies phishing emails by analyzing internet message headers, subjects, attachments, and bodies of emails. With this feature, you can identify senders' email addresses, the platform used by the attackers, and the servers the emails passed through.

Start your free, 30-day trial of O365 Manager Plus today to try out all these features.

Share:

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.