New Spin on Vishing: Attackers Are Now Targeting Healthcare Appointments
语音钓鱼攻击伪装成医疗机构发送预约确认邮件,内含PDF附件显示费用和联系电话。用户拨打后可能泄露信息或支付。这种攻击利用信任和个人化手段绕过传统防御。 2025-4-25 16:59:4 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

When we think about vishing (voice phishing), the usual suspects come to mind: fake refund scams impersonating Norton, PayPal, or Geek Squad.

When one of our security researchers brought this campaign to my attention, I knew right away it was something different.

This wasn’t your typical refund scam or tech-support vishing attempt. Instead, it was targeting something much more personal—healthcare appointments.

Techstrong Gang Youtube

AWS Hub

It’s smart. It’s subtle. And it works because it feels personal.

Let’s break down how this attack plays out.

If you’re thinking this doesn’t concern you because it sounds personal—not corporate—stick with me. I’ll explain why these attacks still matter to your security program.

It Starts with a Simple Appointment Email

Actually, the email is nothing flashy. It’s a polite confirmation for an upcoming medical appointment. No links. No malware. Just a friendly heads-up that you’ve got something on the calendar, with an attachment that holds the details.

But open that attachment, and here’s what you’ll see:

appointment-notification

Here’s what it includes:

  • “Your” name (personalized)
  • A real healthcare provider’s name (Mount Sinai, Healthgrades—recognizable names)
  • An appointment fee of $272
  • And a phone number to call if you need to reschedule or cancel

That phone number? It goes straight to the attackers.

Why This Gets Past Defenses (and People)

Unlike a business email compromise (BEC) attack, there’s nothing inherently malicious in the email itself. No links to fake or shady websites. No suspicious attachments to scan. The danger is all in the social engineering, and the phone number in that PDF.

Here’s why this kind of thing works so well:

1. It Leans on Human Nature

Let’s be honest…most of us feel a little uneasy about healthcare billing. It’s confusing, stressful, and when an unexpected charge shows up, the instinct is to fix it right away.

2. It Slips Past Traditional SEGs 

No links? No malware? No keywords to match a filter? There’s nothing to trigger traditional defenses. It’s a perfect example of what I talked about in my analysis of almost 2,000 customers’ SEG gaps (Barracuda, Cisco IronPort, Mimecast, and Proofpoint SEGs).

This one’s about manipulating behavior, full stop.

3. It Looks Legit

With your name in the message and familiar healthcare brands in the mix, it feels authentic. The attackers aren’t rushing or threatening, they’re relying on trust.

Is This Really an IT/Sec Admin Problem?

It’s easy to dismiss this kind of attack as personal—something that lands in an employee’s private inbox, not their work email. But attackers don’t think that way.

Personal attacks often spill into the workplace:

  • Employees use the same devices for personal and work email.

  • Personal stress impacts professional decision-making.

  • Social engineering doesn’t stop at home—it often pivots into corporate networks once trust is established.

Most importantly, for IT Security Leaders, this is an opportunity to teach and empower employees to recognize these types of attacks. A tactic like this could easily pivot to business targets—and because it feels personal and relatable, employees are more likely to pay attention. When it hits close to home, it feels more real.

The Attack Flow: From Email to Phone Call

Let me walk you through the sequence:

  1. The email hits the inbox
    Just an appointment confirmation, nothing jumps out.

  2. You open the attachment
    Now you’re staring at a fee for an appointment you don’t remember scheduling.

  3. You call the number
    Wanting to clear things up, you dial and land right in the attacker’s lap.

  4. They work their script
    From here, they can ask for payment details, personal info under the guise of verifying insurance or resolving the issue.

All of this happens without a single piece of malware hitting your system.

An Emerging Twist in Phishing

I’ve seen vishing attacks combine email and phone before, but the healthcare angle adds a new layer. It plays on the same techniques we’ve seen for years, emotional triggers, urgency, and trust—but in a space where people are often more vulnerable.

And that’s the point…attackers don’t always need a link or attachment to capture personal data, they just need you to pick up the phone.

What To Do

I know no one wants to hear “train your users” again, but this kind of attack really leans on people, not just technology.

What security teams can do:

  • Educate users on how these tactics work (and yes, that includes phone-based scams)
  • Remind folks that just because it looks like it’s from a trusted brand doesn’t mean it is—especially when phone numbers are involved
  • Monitor for patterns, even if there’s no malware, similar emails hitting multiple inboxes should raise flags
  • Get ahead of multichannel scams, remember, phishing isn’t just about email anymore—think about voice, SMS, deepfakes, and more

This attack stood out to me because it’s just…simple. A convincing setup and a phone number—that’s all it takes. It works because it feels real.

*** This is a Security Bloggers Network syndicated blog from Blog authored by Audian Paxson. Read the original post at: https://ironscales.com/blog/new-spin-on-vishing-attackers-are-now-targeting-healthcare-appointments


文章来源: https://securityboulevard.com/2025/04/new-spin-on-vishing-attackers-are-now-targeting-healthcare-appointments/?utm_source=rss&utm_medium=rss&utm_campaign=new-spin-on-vishing-attackers-are-now-targeting-healthcare-appointments
如有侵权请联系:admin#unsafe.sh