Coronavirus and Cybersecurity Attacks: What You Need to Know
Coronavirus is here and cybersecurity attacks are on the rise! Here’s what you need to know about the latest scammer attacks, and how you can prevent you or your company from being a pawn in this game.
It has been reported by Check Point cybersecurity, that over 4,000 coronavirus-related domains have been registered since the beginning of 2020. In the same report, we’re able to see that 3% of the newly registered domains are malicious, and another 5% are suspicious. According to Check Point, 3% may seem like a low figure, but it means that coronavirus-related domains are 50% more likely to be malicious than any other domain registered during that same period.
It’s common for malicious scammers to go in full affect during a national crisis, and the coronavirus epidemic is no different. As the outbreak is making its way through all nations, computer users will be targeted more frequently.
People need to stay vigilant as malicious hackers will be in full force right now attempting to take advantage of insecure networks. Also, many companies are allowing people to work from home and using VPN’s. Company VPN’s should be verified prior to allowing users to access the internal networks.
The different types of attacks that malicious hackers are taking advantage of during the coronavirus outbreak are:
- Phishing emails
- Coronavirus themed malware attacks
- Bait trapped URLs
- Credential Harvesting scams
Protecting yourself from the coronavirus isn’t all about washing your hands and using Lysol on every surface of your house. It’s also about knowing the basic precautions to protect your online identity. Following cybersecurity best practices, and knowing the basics, are a great start.
Phishing Emails and Bait trapped URLs:
The first thing you’ll want to do when monitoring your emails, is verify the senders email address. Make sure you recognize it, and that it looks legitimate. However, not all legitimate email addresses are safe. You’ll also want to pay attention to what the email is asking you to do. Common sense goes a long way – never share your personal information or banking information. Another red flag is whether the email has attachments. Always be wary of opening attachments, and never open them from unknown senders. If the email contains a link, hover over it with your mouse curser, and make sure the URL is legit.
Researchers at Cofense, stated they observed a new phishing campaign that pushes fake messages from The Centers of Disease Control (CDC). Some example messages that have been sent are that the coronavirus has “officially become airborne” and there “have been confirmed cases of the disease in your location.”
The email, according to researchers, is a “good forgery,”. It also contains a phishing kit that tempts users to click on a URL. It appears to be legit, as it’s from the CDC, and recipients are told to click on the link to learn more about their localized coronavirus threat. What users don’t see, is that behind the malicious link, there are one of three redirects that malicious hackers use. Once clicked, the victim is taken to one of several top-level domains, that each use an SSL certificate.
“Users will be presented with a generic looking Microsoft login page upon clicking the link,” according to researchers. “The recipient email address is appended within the URL, thus automatically populating the login box with their account name. The only thing for the user to provide now is their password. Upon doing so, the user is sent to the threat actor.”
If credentials are entered into the site, the user is then sent to the legitimate CDC website.
There are two major malware attacks that are going around. The first type of malware attack includes phishing emails (which we’ve discussed above) and another is that malicious hackers are using a Microsoft Office document to drop a backdoor onto a victim’s computer.
The MalwareHunterTeam discovered a three-page coronavirus-themed Microsoft Office document posing to be from the Center for Public Health of the Ministry of Health of Ukraine. The document does not contain legitimate information like it portrays to in the email. The document contains malicious macros and once opened, the document can drop a backdoor with capabilities such as clipboard stealing, keylogging, and the ability to lift screenshots from a victim’s computer.
As if running out of toilet paper isn’t scary enough! Another worry with the new coronavirus is that malicious hackers are taking advantage of the epidemic and turning citizens into victims. Stay up to date on the latest threats, and remember, if you’re ever unsure of whether something is real, don’t open it, don’t click, and don’t fill anything out.
If you have any additional questions, or want to ensure your business is secure, fill out our contact us form.