• 0 Posts
  • 13 Comments
Joined 2 years ago
cake
Cake day: January 9th, 2024

help-circle
  • Depends on what the end goal is. Wire fraud? Sure. Typically a Business Email Compromise will try and compromise the account credentials to use it as a location to send other mass phishing attacks to their contacts, gain access to sensitive information the user had, or laterally move between systems and further compromise the organization. In that case, you would want the message to appear as legitimate as possible to gain access to the highest privileged accounts.













  • This is not the function of HIPAA exactly. HIPAA is primarily used as a way to regulate the sharing of health information, and provides very specific requirements for the sharing of health information, with many caveats.

    HIPAA specifically targets healthcare providers (covered entities) and the third-parties (Business Associates) which they work with. More specifically, it provides requirements for the sharing and storage of data from a covered entity to a business associate, and establishes liability in the event of a data compromise for either party.

    If the data did not originate from a healthcare provider, likely HIPAA does not apply.

    In this instance, the applications identified as sharing the data are not covered entities or even business associates.