News, Analysis, Trends, Management Innovations for
Clinical Laboratories and Pathology Groups

Hosted by Robert Michel

News, Analysis, Trends, Management Innovations for
Clinical Laboratories and Pathology Groups

Hosted by Robert Michel
Sign In

Phishing Remains Top Cyberattack Targeting Healthcare Organizations including Clinical Laboratories and Anatomic Pathology Groups

Clinical laboratories are particularly tasty targets for cybercriminals seeking the abundance of protect health information contained in patient electronic health records

Recent data from cybersecurity company Netwrix of Frisco, Texas, shows that 84% of healthcare organizations—including clinical laboratories and pathology groups—caught at least one cyberattack in the past year and “69% of them faced financial damage as a result.” That’s according to the company’s latest Hybrid Security Trends Report which notes that 24% of healthcare organizations are “fully cloud-based,” as opposed to just 11% of non-healthcare industries.

Phishing was the most common type of incident experienced on premises, similar to other industries. Account compromise topped the list for cloud attacks: 74% of healthcare organizations that spotted a cyberattack reported user or admin account compromise,” the Netwrix report notes.

Phishing, where cybercriminals send fake emails and texts to unsuspecting employees that trick them into providing private information, continues to be one of the most prevalent cyberthreats experienced by healthcare organizations and often serves as the catalyst for much larger and more dangerous cyberattacks.

This is particularly dangerous in clinical laboratories where as much as 80% of protected health information (PHI) in patients’ electronic health records (EHRs) is laboratory test results and other personal medical data.

“Protected health information (PHI) is one of the most expensive types of data sold on darknet forums, which makes healthcare organizations a top target for cybercriminals, said Ilia Sotnikov (above), security strategist and VP of user experience at Netwrix, in the report. Clinical laboratory patient electronic health records are particularly weighted toward PHI. (Photo copyright: Netwrix.)

Don’t Open That Email!

Typical phishing scams begin with innocent-looking emails from companies that appear to be legitimate and often contain language that implies urgent action is needed on the part of the user. These emails can be very convincing, appear to originate from reputable companies, and usually instruct users to open an attachment contained in the email or click on a link that goes to a known company website. However, the site is a fake.

Once the harmful file attachment is opened, users will be directed to download fake software or ransomware that attempts to capture the user’s personal information. When visiting a malicious website, consumers will often receive pop-ups with instructions for updating information, but the true purpose is to harvest personal data.

The federal Office of the Comptroller of the Currency (OCC) suggests the following guidelines for protecting oneself from phishing attacks:

  • Never provide any personal information to an unsolicited request.
  • If you believe the contact is legitimate, initiate a contact with the organization using verified data, usually via telephone.
  • Never provide any passwords over the phone or in response to an unsolicited Internet request.
  • Review any accounts, such as bank statements, often to search for any suspicious activity.

“Healthcare workers regularly communicate with many people they do not know—patients, laboratory assistants, external auditors and more—so properly vetting every message is a huge burden,” said IT security expert Dirk Schrader, VP of security research at Netwrix, in the report. “Plus, they do not realize how critical it is to be cautious, since security awareness training often takes a back seat to the urgent work of taking care of patients. Combined, these factors can lead to a higher rate of security incidents.”

Top 10 Brands Faked in Phishing Scams

Phishing emails often appear to be from legitimate companies to lull the recipient into a false sense of security. In a January 22 report, Check Point Research (CPR) announced its latest Brand Phishing Ranking for the fourth quarter of 2024. The report reveals the brands that were most frequently impersonated in phishing attacks by cybercriminals for the purpose of stealing personal information from consumers.

According to the CPR report, 80% of disclosed brand phishing incidents occurred within just 10 brands (listed below with each brand’s percentage of phishing attacks). They are:

The report also states that the 2024 holiday season saw a surge in phishing campaigns targeting popular clothing brands, including:

According to the report, fraudulent domains “replicated official websites to mislead shoppers with fake discounts, ultimately stealing login credentials and personal information. These fraudulent sites replicate the brand’s logo and offer unrealistically low prices to lure victims. Their goal is to trick users into sharing sensitive information, such as login credentials and personal details, enabling hackers to steal their data effectively.”

Steps Clinical Labs Can Take to Protect Patients’ PHI

Clinical laboratories and pathology groups can take precautions that minimize the risk of allowing cybercriminals access to their patients’ PHI.

“A core defense strategy is to minimize standing privileges by using a privileged access management (PAM) solution. Another is to implement identity threat detection and response (IDTR) tools to quickly block malicious actors using compromised credentials,” said Ilia Sotnikov, security strategist and VP of user experience at Netwrix, in the report.

The threat of phishing scams is a lingering issue that everyone in healthcare should be aware of and take necessary precautions to recognize and prevent having one’s PHI stolen. Clinical laboratory management should constantly remind lab personnel and contractors to be vigilant regarding fake emails and texts from well-known brands that ask for private information.              

—JP Schlingman

Related Information:

84% of Healthcare Organizations Spotted a Cyberattack within the Last 12 Months, and 69% of Them Faced Financial Damage as a Result

2024 Hybrid Security Trends Report

Microsoft is Identified as the Primary Target in Phishing Attacks, with Significant Shifts Observed in the Top 10 Rankings

Exploring Q4 2024 Brand Phishing Trends: Microsoft Remains the Top Target as LinkedIn Makes a Comeback

What is a Phishing Attack?

EU to Take Aim at Healthcare Cyber Threat

Mastering 2025: The Stakes Are High in Battling Cyber Threats

Phishing Attack Prevention: How to Identify and Avoid Phishing Scams

Report: 84% of Healthcare Organizations Identified a Data Breach Last Year

Healthcare Cyberattacks at Two Hospitals Prompt Tough Decisions as Their Clinical Laboratories Are Forced to Switch to Paper Documentation

Cyberattack Renders Healthcare Providers across Ascension’s Hospital Network Unable to Access Medical Records Endangering Patients

Change Healthcare Cyberattack Disrupts Pharmacy Order Processing for Healthcare Providers Nationwide

In Today’s Tough Labor Market, Smart Clinical Labs Are Using Social Media, LinkedIn, to Recruit and Retain Top-Performing Med Techs and Young Pathologists

It’s not limited to recruiting; social media and LinkedIn are just as effective at helping lab managers advance their personal careers by helping them find their ideal jobs

It’s the toughest labor market in decades for skilled clinical laboratory and pathology professionals! In cities across America, lab managers struggle, not only to recruit and fill open positions, but also to retain their most-skilled staff members who are getting first-rate offers from competing labs.

How tight is the job market in pathology? Just ask the young pathologists who’ve graduated from their residency programs and fellowships. In recent years, it’s become tougher and tougher to find a position in a city of their preference that fits their subspecialty training. (more…)

;