6,600+
St. Anthony Hospital, a healthcare provider in Chicago, has announced a data breach that potentially exposed the sensitive information of over 6,600 patients and employees. The hospital became aware in February 2025 that an unauthorized party had gained access to employee email accounts. A subsequent investigation, conducted with third-party cybersecurity experts, confirmed that these accounts contained a mix of Personally Identifiable Information (PII) and Protected Health Information (PHI). Exposed data may include names, Social Security numbers, addresses, and detailed medical information. The hospital is now notifying affected individuals.
T1566 - Phishing).T1114.001 - Local Email Collection) to search for and exfiltrate sensitive data. The goal is typically to gather data for identity theft, insurance fraud, or to sell on dark web forums.The attack pattern is characteristic of a Business Email Compromise (BEC) style attack focused on data theft rather than financial fraud.
T1078 - Valid Accounts).This type of attack highlights the significant risk posed by unstructured data stored in email accounts. Mailboxes often become de facto filing cabinets for vast amounts of sensitive information, making them a high-value target for attackers.
To detect similar email account compromises, organizations should monitor for:
| Type | Value | Description |
|---|---|---|
| log_source | Microsoft 365 / Google Workspace Audit Logs |
These logs contain detailed information on user logins, IP addresses, email activity, and rule creation. |
| user_account_pattern | Anomalous email forwarding rules |
Attackers often create rules to auto-forward all incoming mail to an external account. This is a classic indicator of compromise. |
| log_source | Cloud App Security (CASB) Logs |
A CASB can detect and alert on impossible travel, suspicious inbox rule creation, and massive file downloads from cloud email services. |
| event_id | Logon from suspicious IP |
A login from an IP address associated with a VPN, Tor, or a country where the employee does not operate is a major red flag. |
D3-DAM - Domain Account Monitoring is essential.D3-MFA - Multi-factor Authentication.M1017 - User Training.Enforcing MFA on all email accounts is the most effective control against credential theft-based takeovers.
Mapped D3FEND Techniques:
Training users to spot and report phishing emails can prevent the initial compromise.
In response to an email compromise like the one at St. Anthony Hospital, Account Locking is a critical and immediate response action. Security teams must have a playbook that, upon receiving a credible alert of account takeover (e.g., impossible travel login, suspicious inbox rule), automatically or immediately triggers the locking of the affected user account. This action evicts the attacker and prevents further data access or exfiltration. The process should involve disabling the account, terminating all active sessions across all services, and forcing a password reset. This rapid containment is crucial to minimizing the 'blast radius' of the breach and limiting the amount of data an attacker can steal from a compromised mailbox.
To detect an attacker operating within a compromised email account, Web Session Activity Analysis is key. This involves using a Cloud Access Security Broker (CASB) or advanced SIEM rules to analyze user activity within Office 365 or Google Workspace. Security teams should configure alerts for high-risk activities such as the creation of a new email forwarding rule, a sudden spike in file downloads, or an unusually high number of emails being read or deleted. By baselining normal user behavior, the system can flag these actions as anomalous for the specific user, even if the login itself appeared legitimate (e.g., from a domestic proxy). This provides a vital detection layer inside the perimeter, catching the attacker's data collection activities in progress.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats