Which of the healthcare related emails are phishing attempts? Spot the phish

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing and real emails related to healthcare. Spot the phish! Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

 

Answer: Email 2 is the real email. The others are phishes! Let’s take a look below…

Image 1 details: First of all, it’s not a good idea to send health checkup reports to the patient via e-mail. Second, it’s unencrypted! A legitimate healthcare provider will never do that from a HIPAA compliance standpoint. This is a phish.


Mayo Clinic Phishing Explained 1

Image 2 details: The email passes our link checks, format checks, and grammar checks. Nothing seems fishy. Still, it’s wise to be cautious when it comes to cybersecurity. Rather than click the link and to be extra safe, log in to “lockbin” separately using your browser.

 

Image 3 details: First, the date format is a non-U.S. one. Second, it’s an unencrypted attachment once again. That’s not allowed under HIPAA, and no professional healthcare provider would want to violate HIPAA. This one’s an attempted phishing attack, too!

Mass General Hospital Phishing Explained 3

Image 4 details: While the email gives very little away, the short bit.ly link doesn’t inspire confidence at all. This one is best avoided and is most likely a phish!

Healthcare Phishing Explained 4

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

GLBA Risk Assessments

GLBA Risk Assessments: A Key 1st Step in GLBA Compliance

The GLBA risk assessment is an organization’s starting point for GLBA compliance. We break it all down in this GLBA risk assessment overview …
Web Application Penetration Testing Services

Common Issues in Web Application Penetration Testing Services

Web applications are now ripe targets for hackers. Here we take a look at a few hacker attacks on web applications & how penetration testing services are critical …
Implementing NIST Risk Assessments

Implementing NIST Risk Assessments: A Step-by-Step Approach

This step-by-step guide will help organizations navigate the NIST risk assessment process effectively, leveraging the expertise of risk assessment companies and cybersecurity consulting services …