In this modern and digital world, internet users have become accustomed to receiving an extraordinarily high volume of emails from companies, organizations, and service providers. Although it can be irritating to receive so many emails on a regular basis, most people don’t think twice about it and place a great deal of trust in the veracity of the email senders. However, it’s this very trust that often places victims at the center of online attacks. Email phishing attacks have become more sophisticated and difficult to spot; in hackers’ efforts to deceive unsuspecting email recipients, clone phishing takes phishing attacks to the next level. It’s critical that healthcare providers are aware of what clone phishing is, how to recognize it, and how to prevent it from happening. Otherwise, they run the risk of exposing their patients and possibly their facility to further phishing attacks.
A clone phishing attack looks like this: A hacker clones a legitimate email message word-for-word from a trusted organization or business. Clone phishing is harder to detect because the official-looking email appears to come from a reputable source. Hackers use display name spoofing to add a layer of legitimacy, fooling many receivers into believing they’re actually looking at an email from a company they trust. The hacker carefully edits the once-genuine email message by replacing links that redirect the receiver to fake websites, or by attaching malicious files that the user is prompted to open. Once a victim falls for the fake email, the hacker can then forward the same cloned message to the contacts from the victim’s email account. By impersonating email addresses from reputable sources, email recipients are much more likely to fall for the attack and open the malicious link or attachment.
Clone phishing attacks rely on the fact that email recipients: 1) receive dozens of emails, if not more, throughout the course of the day, and 2) trust an email’s sender at face value without checking the actual email domain.
At an institutional level, healthcare providers should make it a priority to train all employees to recognize clone phishing attacks. When employees are educated in cyber awareness, they can greatly reduce the threat of exposing the entire organization as well as your patients to a hacker’s attacks. Healthcare organizations, which already require HIPAA compliant email , can add an extra level of security by implementing Paubox Email Suite Plus . On top of providing email encryption on outbound email and inbound email security, our patented ExecProtect feature stops clone phishing attempts before they even hit your inbox. ExecProtect identifies and quarantines display name spoofing emails. Eliminating these clever disguises from inboxes significantly reduces the chance of someone clicking on a malicious link or attachment.
Clone phishing attacks not only present a great threat to individuals, but to healthcare organizations as a whole. It’s crucial that email users can recognize clone phishing attempts and stop them in their tracks before a hacker gains access to even more critical information. Keep your organization safe by not only educating employees on how to prevent clone phishing attacks, but also by adding HIPAA compliant safeguards that will block malicious emails and protect against phishing scams.