Back to Email phishing

Email phishing

Health care provider Partners In Care affected by an email phishing attack.

partners-in-care-foundation-healthcare-email-phishing-attack

On May 1, 2019, the California-based Partners In Care Foundation revealed that an email phishing attack may have compromised its patients' medical information. The exposed information included names, dates of birth, medical record numbers, diagnoses, treatment records, medications, insurance information, and Social Security numbers.

What happened.

Between November 17 and December 12, 2018, attackers accessed employee email accounts, which contained patients' protected health information (PHI). However, the attack wasn't discovered until March 4, 2019. As soon as it was identified, Partners In Care hired a third-party cybersecurity firm to conduct a thorough investigation of its email systems. The investigations revealed that no financial data was compromised in the attack. Partners In Care subsequently notified all affected patients and urged them to monitor their accounts for any fraudulent activities.

Stay one step ahead of attackers by investing in a smart tool like Exchange Reporter Plus, which monitors for and thwarts email-bound cybersecurity threats. Download a free, 30-day trial of Exchange Reporter Plus today.

How ManageEngine can help you avoid such incidents.

Exchange Reporter Plus provides a host of reports that can help you locate suspicious emails, both sent and received, based on keywords in their subject or body. Often times, these malicious emails appear to be valid, tricking users into opening the emails and clicking on the links embedded in them, which can cause serious damage.

With Exchange Reporter Plus, you can locate emails based on:

  • Messages by subject keyword. Use reports to identify particular keywords in the email subject lines.
  • Messages by body keyword. Identify all the messages in your mailbox that have a particular keyword in the body of the email.
  • Attachment name. Get a report of all emails in your mailbox that have an attachment with a specific name. With the names of the malicious files, you can take the necessary steps to stop email-bound threats.
  • Attachment type. You can spot malicious software based on an attachment’s file extension.
  • The number of emails received from a specific domain, sender, department, or external email address. Get reports on all incoming emails from an external email address, a blacklisted sender or domain, or a specific department.
  • Messages by subject keyword
    Messages by body keyword
    Attachments by file name keyword
    Attachments by file extension keyword

Click here to explore more features in ExchangeReporter Plus, and gain granular insights into your Exchange environment.

Additionally, ManageEngine O365 Manager Plus offers an advanced Office 365 mailbox content search capability that identifies phishing emails by analyzing internet message headers, subjects, attachments, and bodies of emails. With this feature, you can identify senders' email addresses, the platform used by attackers, and the servers the emails passed through.

Start your free, 30-day trial of O365 Manager Plus today to try out all these features.

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.