Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hospital IT Desks Under Siege: Cybercriminals Deploy Voice Call Intrusions
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hospital IT Desks Under Siege: Cybercriminals Deploy Voice Call Intrusions

Highlights

  • Hospitals battle sophisticated IT desk cyberattacks.

  • HC3 reports a rise in social engineering threats.

  • Robust verification and training are essential defenses.

Kaan Demirel
Last updated: 8 April, 2024 - 2:41 pm 2:41 pm
Kaan Demirel 1 year ago
Share
SHARE

Nationwide, hospitals are grappling with a surge in cyberattacks as adept criminals employ sophisticated social engineering techniques to hoodwink IT help desks. The Health Sector Cybersecurity Coordination Center (HC3) has sounded the alarm, revealing a worrying pattern of adversaries using cunning interaction tactics to penetrate hospital systems and access confidential data. By masquerading as hospital staff in financial departments, these intruders manipulate IT help desk personnel into providing them with entry to sensitive systems, posing a significant threat to healthcare cybersecurity.

Contents
Exploiting IT Support with Deceptive TacticsTargeted Strategies to Counteract the ThreatEnhancing Defenses in Microsoft Environments

In the landscape of cyber threats to the healthcare sector, the recent escalation in social engineering attacks is not an isolated phenomenon. Over time, there have been numerous instances where healthcare institutions have faced challenges due to data breaches and cyber-espionage. Cybercriminals often take advantage of the complex and sensitive nature of healthcare data, recognizing the high value of personal health information. Reports have shown time and again that healthcare providers are targeted for the wealth of patient data they hold, which can be exploited for identity theft, insurance fraud, and even targeted ransomware attacks. These incidents stress the importance of robust cybersecurity measures in protecting patient information and healthcare infrastructure.

Exploiting IT Support with Deceptive Tactics

Attackers are employing local phone calls to IT help desks, cunningly posing as hospital staff, complete with stolen personal identifiers like Social Security and corporate ID numbers. They further manipulate Multi-Factor Authentication (MFA) protocols by claiming technical issues with their phones and convincing help desk personnel to transfer MFA to devices under their control. This access allows them to tamper with payment systems, redirecting funds to accounts they operate.

Targeted Strategies to Counteract the Threat

Healthcare facilities are being advised to adopt various countermeasures to stymie these cyber threats. Recommended strategies include callback verifications to an employee’s recorded number before resetting passwords or enrolling new devices, in-person requests for sensitive changes at IT help desks, and supervisor confirmations to validate the legitimacy of identity and requests. Education on identifying and reporting social engineering tactics is also crucial.

Enhancing Defenses in Microsoft Environments

For entities utilizing Entra ID, formerly known as Microsoft Azure Active Directory, Mandiant advises strict use of Microsoft Authenticator with enforced number matching and removal of SMS as an MFA method. They also recommend the creation of Custom Authentication Strength policies that stipulate only “Password + Microsoft Authenticator (Push Notification)” for access, alongside Conditional Access Policies that restrict external administrative feature access.

  • Cybercriminals target hospital IT help desks using crafted voice calls and social engineering.
  • HC3 identifies a trend of attackers impersonating finance department staff to gain system access.
  • Healthcare organizations must adopt rigorous verification processes and staff training to combat these threats.

In the wake of HC3’s alert, the healthcare industry faces a critical juncture to fortify its defenses against increasingly ingenious cybercriminal tactics. Hospitals must not only stay on high alert but also proactively enhance their internal protocols—training staff extensively, implementing stringent verification processes, and leveraging cutting-edge security solutions—to thwart the nefarious plans of these digital assailants.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Why is called iOS?
Next Article New App Store Guidelines Enable Music Streaming Apps to Sidestep In-App Purchases

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?