Back to Email phishing

Email phishing

70,000 patients' data compromised in Valley Hope data breach

On January 18, 2019, Valley Hope, a Kansas-based alcohol and drug addiction treatment center, revealed that sensitive patient information may have been exposed in an email phishing attack. Information such as patients’ name, address, date of birth, prescription information, Social Security number, financial account information, driver’s license or state identification card number, claim and billing information, health insurance information, medical record number, and doctor’s name may have been exposed.

What exactly happened?

On October 9, 2018, unidentified hackers accessed a Valley Hope employee's email account that contained patients' personal information. Valley Hope sent emails to the affected individuals alerting them about the breach. It also notified the Department of Health and Human Services’ Office for Civil Rights, state regulators, and three major credit reporting agencies to assist in reviewing its existing policies and implementing strict security measures. As a gesture of goodwill, Valley Hope is offering 12 months of free identity monitoring services from Kroll to the affected patients.

Don't want to make the news for the wrong reasons? Download ManageEngine Exchange Reporter Plus, a wholesome Exchange mailbox monitoring and reporting tool, to ward off any mail-bound threats

How can ManageEngine help in such situations?

Exchange Reporter Plus provides a host of reports that help you locate suspicious emails, both sent and received, based on keywords in their subject or body. Often the content and sender of malicious emails come across as valid, tricking users into clicking on them and causing serious damage to the business. This is why email attachments deserve critical attention.

With Exchange Reporter Plus, it's easy to set up filters to look out for malicious attachments—be they TXT, PPT, or BAT files.

You can locate emails based on:

  • Attachment name: Display all messages in your organization that have an attachment with a specific name. Knowing the names of malicious files helps you take necessary steps to stop email-bound threats.
  • Attachment type: Identify mailbox content based on an attachment’s file format to spot malicious software transfer over email.

Exchange Reporter Plus’ reports also provide details on the date an attachment was received. Any dubious attachment can be easily identified from these reports.

Attachments by file name keyword
Attachments by file extension keyword

In attacks where the content and sender information vary, you can customize mailbox content reports to include all the keywords these different emails use.

Get started now with your free, 30-day trial of Exchange Reporter Plus.

Share:

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.