Revamped Strategy for Vishing: Cybercriminals Are Now Focusing on Healthcare Scheduling

When pondering vishing (voice phishing), the usual culprits come to mind: fabricated reimbursement schemes impersonating Norton, PayPal, or Geek Squad.

[…Keep reading]

New Spin on Vishing: Attackers Are Now Targeting Healthcare Appointments

When pondering vishing (voice phishing), the usual culprits come to mind: fabricated reimbursement schemes impersonating Norton, PayPal, or Geek Squad.
Upon our security researchers bringing this scheme to my attention, it was apparent right from the start that it was something distinct.
This wasn’t the standard refund trick or tech-support vishing ploy. Instead, it was honing in on something much more intimate—healthcare appointments.

It’s clever. It’s discreet. And it’s effective because it resonates on a personal level.
Let’s delve into the process of how this scheme unfolds.

If the notion that this doesn’t pertain to you because it appears personal—not corporate—crosses your mind, bear with me. I’ll elucidate on why these assaults are still relevant to your security measures.
It Commences with a Plain Appointment Email
In actuality, the email is rather unassuming. It’s a courteous affirmation for an upcoming medical appointment. No hyperlinks. No malicious software. Just a friendly notification about a scheduled event, alongside an attachment containing the specifics.
However, should you open that attachment, here’s what you’ll encounter:

Here’s what it encompasses:

“Your” name (personalized)
An actual healthcare provider’s name (Mount Sinai, Healthgrades—well-known names)
An appointment fee of $272
And a contact number in case of rescheduling or cancellation

That contact number? It connects directly to the attackers.
How This Evades Defenses (and Individuals)
Different from a business email compromise (BEC) attack, there’s no inherent malice within the email itself. No links to counterfeit or dubious websites. No suspicious attachments to scrutinize. The peril lies purely in the social manipulation, and the phone number within that PDF.
Here’s why this form of manipulation is so effective:
1. It Exploits Human Behavior
Let’s be truthful…most of us harbor some unease regarding healthcare billing. It’s perplexing, stressful, and when an unforeseen charge emerges, the impulse is to rectify it promptly.
2. It Slips Through Conventional SEGs 
No hyperlinks? No malware? No keywords to trigger a filter? There’s nothing to activate standard defenses. It’s a prime instance of what I elaborated on in my examination of the SEG deficiencies of nearly 2,000 clients’ (Barracuda, Cisco IronPort, Mimecast, and Proofpoint SEGs).
This is all about manipulating conduct, unequivocally.
3. It Projects Legitimacy
With your name featured within the message and recognizable healthcare brands intertwined, it exudes authenticity. The perpetrators aren’t hastening or intimidating, they’re depending on trust.
Is This Genuinely an IT/Sec Admin Issue?
It’s simple to dismiss this form of assault as being personal—something that lands in an employee’s personal inbox, not their work email. However, malefactors don’t reason that way.
Personal attacks frequently spill into the professional realm:

Employees utilize the same devices for personal and work-related emails.

Personal anxieties influence professional decision-making.

Social engineering doesn’t halt at home—oftentimes, it shifts into corporate networks once trust is established.

Most crucially, for IT Security Leaders, this offers a chance to instruct and empower employees to identify these types of assaults. A ploy like this could swiftly pivot to business targets—and due to its personal and relatable nature, employees are more inclined to take notice. When it hits close to home, it registers as more tangible.
The Assault Sequence: From Email to Phone Call
Allow me to guide you through the sequence:

The email lands in the inboxJust a confirmation of an appointment, nothing conspicuous.

You access the attachmentCurrently faced with a charge for an appointment you don’t recall scheduling.

You dial the numberSeeking clarification, you dial and end up in the perpetrator’s clutches.

They follow their scriptFrom this point, they can solicit payment details, personal data under the pretext of insurance verification or issue resolution.

This transpires without a single trace of malicious software infiltrating your system.
An Emerging Revamp in Phishing
I’ve witnessed vishing attacks merging email and phone previously, but the healthcare twist adds a new dimension. It capitalizes on the equivalent techniques we’ve observed for years, emotional triggers, urgency, and trust—but within a domain where individuals are often more susceptible.
That’s the crux…malefactors don’t invariably necessitate a hyperlink or attachment to seize personal information, they merely require you to answer the phone.
Course of Action
I comprehend that no one wishes to encounter the phrase “train your users” again, but this type of assault heavily hinges on individuals, not just technology.
What security teams can accomplish:

Instruct users on how these stratagems operate (and yes, this encompasses phone-based scams)
Remind individuals that just because it seems to originate from a trusted brand doesn’t ensure authenticity—particularly when phone numbers are implicated
Monitor for trends, even if there’s no malware, the recurrence of similar emails inundating multiple inboxes should set off alarms
Anticipate multichannel scams, remember, phishing doesn’t solely revolve around email any longer—contemplate voice, SMS, deepfakes, and more

This attack stood out to me owing to its sheer simplicity. An authentic setup and a phone number—that suffices. It resonates because it feels genuine.

*** This is a Security Bloggers Network syndicated blog from Blog authored by Audian Paxson. Read the original post at: https://ironscales.com/blog/new-spin-on-vishing-attackers-are-now-targeting-healthcare-appointments

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.