Which of the healthcare related emails are phishing attempts? Spot the phish

Spot the Phishing Attempt - Cybersecurity Awareness

The images displayed below are a combination of phishing and real emails related to healthcare. Spot the phish! Click on the images to zoom in.

 

Spoiler Alert: Answers are below.

 

Answer: Email 2 is the real email. The others are phishes! Let’s take a look below…

Image 1 details: First of all, it’s not a good idea to send health checkup reports to the patient via e-mail. Second, it’s unencrypted! A legitimate healthcare provider will never do that from a HIPAA compliance standpoint. This is a phish.


Mayo Clinic Phishing Explained 1

Image 2 details: The email passes our link checks, format checks, and grammar checks. Nothing seems fishy. Still, it’s wise to be cautious when it comes to cybersecurity. Rather than click the link and to be extra safe, log in to “lockbin” separately using your browser.

 

Image 3 details: First, the date format is a non-U.S. one. Second, it’s an unencrypted attachment once again. That’s not allowed under HIPAA, and no professional healthcare provider would want to violate HIPAA. This one’s an attempted phishing attack, too!

Mass General Hospital Phishing Explained 3

Image 4 details: While the email gives very little away, the short bit.ly link doesn’t inspire confidence at all. This one is best avoided and is most likely a phish!

Healthcare Phishing Explained 4

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Aligning Your Incident Response Plan with NIST SP 800-61 Rev. 3

Aligning Your Incident Response Plan with NIST SP 800-61 Rev. 3

This article offers key updates in the latest NIST guidance, why they’re significant, and what practical steps you can take to update your organization’s incident response plan …
CEO Checklist: How To Know If Your Organization Is Cyber Secure

CEO Checklist: How To Know If Your Organization Is Cyber Secure

This CEO Checklist is a starting point for executive oversight – to spot gaps, test what your team is telling you, & prioritize where to invest attention/budget …
Guide to Penetration Testing Services

Guide to Penetration Testing and Advanced Techniques in Penetration Testing Services

Penetration testing is the interactive nature of the control evaluation. Unlike static assessments, penetration testing services involve dynamic interaction with the system …