Health-ISAC Hacking Healthcare 9-10-2024
This week, Hacking Healthcare® is going phishing. Phishing remains a significant risk for the healthcare sector, and raising awareness and educating your workforce about how to spot and avoid phishing attacks are good practices to adopt.[1] This iteration of Hacking Healthcare® focuses on internal phishing testing and analyzes a few examples that may have accidentally done more harm than good.
As a reminder, this is the public version of the Hacking Healthcare blog. For additional in-depth analysis and opinion, become a member of H-ISAC and receive the TLP Amber version of this blog (available in the Member Portal.)
TLP WHITE 9.10.24 Hacking Healthcare®
Size : 154.3 kB Format : PDF
Text Version:
Welcome back to Hacking Healthcare®.
Phishing Training Gone Awry
It is well documented that phishing is a significant cybersecurity risk to organizations. A few years ago, numerous articles were citing the statistic that 91% of all cyberattacks began with a phishing email.[2] [3] Other organizations have pegged phishing as “a leading cause of healthcare data breaches.”[4] It is only natural that organizations have taken steps to mitigate this risk by tightening technical controls and, perhaps most critically, emphasizing employee awareness training and conducting phishing tests. When done correctly, these tests can be a valuable way to raise employee awareness. However, there are numerous examples of how well-intentioned implementations have gone awry. We hope the following examples will inform how Health-ISAC members approach phishing training and tests to avoid unintended results. Employee Benefit Bait-and-Switch In September 2020, deep into the COVID-19 pandemic, the major U.S. news publisher Tribune Publishing Co. sent an email to employees announcing that successful cost-cutting measures were going to allow them to payout bonuses between $5,000 and $10,000.[5] With employees working through the uncertainty of the pandemic, and in a sector already struggling to maintain adequate pay to retain personnel, it shouldn’t be a surprise that at least some employees clicked on links within the email. Those who did were informed that there was no bonus and they had failed a simulated phishing test. As you might imagine, there was significant public backlash on social media from employees who were incensed that they would dangle such a potentially impactful sum of money to “overworked and underpaid” staff who were already deeply concerned with their financial stability.[6] The security company that partnered with Tribune Publishing Co. described the incident as a “custom” exercise that backfired.[7] This kind of bait-and-switch is more common than you might think. Another example involved the West Midlands Railway organization located in the UK. In 2021, it sent a phishing test email thanking the frontline workers who had maintained the rail system during COVID-19 and offered a one-time bonus for their hard work.[8] Once it was understood to be a test, the incident quickly resulted in public backlash from workers and the transportation union. Health Scare Tactics Another phishing test topic that has come under scrutiny is that of a fake health scare.[9] In one incident, an organization sent an email out to its personnel informing them that a staff member had contracted a serious contagious illness and that contact tracing and containment measures were being introduced. A link within the email promised to provide updated information on what was sure to be an evolving situation. As might be expected from such a serious healthcare warning, numerous individuals clicked the embedded link and were directed to a webpage belonging to a well-known cybersecurity company informing them that this was a test. Needless to say, while it was very likely meant with the best of educational intentions, this approach did not go over well with many of those associated with the organization. Individuals bemoaned using something as potentially life-threatening as a serious contagious disease scare for phishing awareness purposes. Others noted that the backstory provided by the email on the origin of the contagion could be perceived as needlessly reinforcing negative stereotypes. Action & Analysis **Included with Health-ISAC Membership**
- Related Resources & News
- Leveraging ISO 81001-5-1 Amid Medical Device Procurement
- Mitigating risk as healthcare supply chain attacks prevail
- Enhancing Cybersecurity in Rural Hospitals
- Health-ISAC Hacking Healthcare 11-15-2024
- Cyber Incident Response: Playbook for Medical Product Makers
- Feds Warn of Godzilla Webshell Threats to Health Sector
- Trump’s Return: Impact on Health Sector Cyber, HIPAA Regs
- Health-ISAC Hacking Healthcare 11-7-2024
- Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
- All hospitals should be concerned about cyberattacks. Here’s why