TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

The Rise of Social Engineering Across Healthcare | Huntress

2024-05-28 · Read original ↗

ATT&CK techniques detected

14 predictions
T1566.002Spearphishing Link
85%
“of features and services that help medical professionals better communicate and collaborate, making it a popular tool across healthcare organizations. as a result, it ’ s also a popular target for cybercriminals. huntress mdr for microsoft 365 secures your microsoft 365 users, ap…”
T1556.006Multi-Factor Authentication
82%
“considerable time and resources to research you and your specific role. this means the emails, texts, and calls you receive can appear far more legitimate and trustworthy, making it easier to deceive you and your colleagues. the rise of social engineering highlights the need for …”
T1566.002Spearphishing Link
81%
“request to scan and email them instead. the threat actors then email the “ forms ” as an attachment, which, when opened, deploy malware. gone are the days, however, where a closer look at a message could reveal obvious red flags — grammatical errors, aggressive language, and myst…”
T1684.001Impersonation
68%
“the rise of social engineering across healthcare | huntress nobody ’ s perfect. even the sharpest among us makes the occasional mistake. and cybercriminals just love that. as proof, ask yourself, does nigeria have a monarchy? if you couldn ’ t answer “ no ” with certainty, then y…”
T1657Financial Theft
67%
“##s pretend to be employees from the finance department. claiming their work - issued smartphones are broken, they request a new device under their control be enrolled. if successful, these tactics can allow attackers to gain administrative privileges, redirect bank transactions,…”
T1586.002Email Accounts
51%
“being profiled — and what to do about it. real - world incident : an email - based attack uncovers larger crimes when a midwest - based managed service provider ( msp ) rolled out huntress mdr for microsoft 365, huntress ’ soc quickly uncovered a sinister plot unfolding for a cli…”
T1566.002Spearphishing Link
44%
“##curity risks. a good sat program delivers regular lessons, tests, and phishing simulations, all designed to help your people better identify and defend against social engineering risks. every tactic taught in a sat program must become second nature to the learner. to enhance kn…”
T1566Phishing
42%
“healthcare, threat actors rely on phishing to either steal data or access networks to initiate ransomware attacks. once ransomware encrypts your data, your ability to conduct business and treat patients is compromised. because phi primarily lives digitally, in the midst of a rans…”
T1586.002Email Accounts
39%
“request to scan and email them instead. the threat actors then email the “ forms ” as an attachment, which, when opened, deploy malware. gone are the days, however, where a closer look at a message could reveal obvious red flags — grammatical errors, aggressive language, and myst…”
T1566.002Spearphishing Link
35%
“us might not be able to spot the deception. and, worse yet, these tactics are now targeting healthcare. the treacherous tactics of social engineering social engineering is the deceitful art of coaxing people into handing over valuable data. across healthcare organizations — hospi…”
T1534Internal Spearphishing
34%
“being profiled — and what to do about it. real - world incident : an email - based attack uncovers larger crimes when a midwest - based managed service provider ( msp ) rolled out huntress mdr for microsoft 365, huntress ’ soc quickly uncovered a sinister plot unfolding for a cli…”
T1114.003Email Forwarding Rule
31%
“being profiled — and what to do about it. real - world incident : an email - based attack uncovers larger crimes when a midwest - based managed service provider ( msp ) rolled out huntress mdr for microsoft 365, huntress ’ soc quickly uncovered a sinister plot unfolding for a cli…”
T1556.006Multi-Factor Authentication
31%
“to your other accounts. after all, many people tend to reuse the same usernames and passwords across accounts. however, with mfa, even if the attacker has your credentials, they ’ d still need an additional factor, such as a temporary code sent to your personal phone, to successf…”
T1684.001Impersonation
30%
“##s pretend to be employees from the finance department. claiming their work - issued smartphones are broken, they request a new device under their control be enrolled. if successful, these tactics can allow attackers to gain administrative privileges, redirect bank transactions,…”

Summary

Understand the impact of human error across healthcare, and discover how Huntress’ managed solutions can better defend your organization from social engineering scams.