DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Has W-2 fraud overtaken healthcare as the most lucrative target for cyber-criminals?

Posted on March 4, 2017 by Dissent

Michael Bruemmer, a vice president with the Experian Data Breach Resolution group, poses a question about whether W-2 fraud has become the most lucrative target for criminals when attacking the healthcare sector. But the data he points to – some of which is based on the work DataBreaches.net is doing with Steve Ragan of Salted Hash, is not specific to the healthcare sector:

Even with all the warnings and resources available, the United States continues to experience increasing incidences of companies and employees falling victim to phishing attacks during the 2017 season aimed at tricking companies’ HR departments into sending W-2 forms to criminals who can use the record to file fake returns, among other uses. The proliferation of this scam is so widespread that Experian is currently servicing dozens of breaches a week related to these schemes. So far, these schemes have already affected more than 29,500 people this year – a 25 percent increase from what Experian saw last year by this time.

Yes, W-2 fraud is all the rage these days. We’re up to about 60,000 people affected already – and that’s just for the one-third of the 100+ W-2 phishing cases where we have numbers, but what do the data show about the healthcare sector? Is there actually any public evidence to support the notion that criminals have shifted to going after W-2 data and not PHI or other types of PII in the healthcare sector?

Looking at our list of W-2 phishing victims that have been disclosed publicly, I see six involving healthcare entities: Campbell County Health (1400 employees affected), Point Coupee Hospital (200 employees affected), Adventist Health Tehachapi Valley (253 employees affected), SouthEast Alaska Regional Health Consortium, Citizens Memorial Hospital, and Meridian Health Services.

During the same two-month period, this site recorded more than one dozen hacks involving patient protected health information.

That doesn’t strike me as indicating any major shift by criminals to W-2 fraud, although there is no doubt that criminals do adapt and go for low-hanging fruit.

So I contacted Bruemmer to ask him whether they had data supporting any claim that criminals have actually shifted to W-2 data in the healthcare sector attacks. What I got back was a statement that didn’t answer the question:

Healthcare entities in general should be no more or no less susceptible to W2 theft; thieves typically exploit the path of least resistance. As noted in the article you referenced, the IRS issued a warning after identifying a 400 percent increase in phishing and malware incidents in the 2016 tax season when compared to the previous season. That said, of healthcare W-2 incidents serviced by Experian Data Breach Resolution, 35% have been the result of a phishing attack.

But are W-2 incidents the majority of incidents or the minority of incidents they handle for the healthcare sector? I didn’t get a clear answer, and they wouldn’t reveal numbers:

I believe the intent of the article was to pose the question, for consideration, of value versus volume — meaning, is W-2 fraud a better target for PII (by thieves’ standards)? The article suggests the increase in attacks aimed at obtaining the W-2 forms may support that position.

“May.” It would be nice if we had actual data.

Should healthcare entities take steps to educate their employees to avoid phishing attempts or clicking on links that might inject malware? Of course. But right now, W-2 phishing incidents are not outnumbering other types of attacks. Maybe in a few months as more data come in, we’ll have a better sense.

But frankly, when it comes to low-hanging fruit/easy targets for criminals, the public education sector (k-12) still strikes me as the most likely to be vulnerable or to become victimized.

Category: Breach IncidentsCommentaries and AnalysesPhishing

Post navigation

← Mossack Fonseca founders still under arrest as Panama Papers firm quits New Zealand
Under the right to information law, Aadhaar data breaches will remain a state secret →

1 thought on “Has W-2 fraud overtaken healthcare as the most lucrative target for cyber-criminals?”

  1. Billy Reuben says:
    March 6, 2017 at 12:25 pm

    Great job following up and pursuing the truth. Separating fact from fiction is almost a lost art these days.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.