Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions that would cause further harm.
Thread hijacking in the context of “account updates” phishing is a tactic where attackers infiltrate an existing email conversation between a legitimate sender and recipient to distribute phishing messages. Using a compromised account, cybercriminals can slip malicious emails into ongoing threads.
A review article from the Editor’s Pick: Computer Science states, “...a phisher uses either social engineering tricks by making up scenarios (i.e., false account update, security upgrade), or technical methods (i.e., using legitimate trademarks, images, and logos)...”
Attackers send emails that often falsely alert recipients about changes or updates to an account, prompting them to click a link or open an attachment to “confirm” their information. Since these phishing emails appear in a trusted conversation threat, they’re often harder to detect and can bypass email filters designed to block suspicious messages.
Related: What is data strategy?
HIPAA compliant email platforms like Paubox employ advanced spam filtering and threat detection that actively monitors incoming and outgoing communications for suspicious activity. In the narrow chance that an attacker can infiltrate Paubox’s secure encryption, this ensures that providers are made aware of an attacker's presence and can quickly shut down systems and investigate before information is lost.
The platform also offers a trustworthy method of sending patients emails that verifies its origin from a trusted healthcare organization instead of a threat actor. This is especially valuable when considering that the modus operande of threat hijacking operates based on impersonation.
A law that protects the privacy and security of patient's health information.
It's a part of the healthcare process that provides patients with autonomy in an often overwhelming sector.
They hold a wealth of sensitive information that can be used for a wealth of reasons from ransoms to impersonation.