5 Common COVID-19 Cyber Attacks

Cyber criminals are notorious for using disasters and crises to their advantage. And the COVID-19 pandemic is proving to be no different. Hackers are ruthlessly exploiting coronavirus fears with pandemic-related scams, phishing and malware campaigns.

In mid-April, Google reported that, in just one week, it saw more than 18 million daily malware and phishing emails related to Covid-19 scams were sent via Gmail alone – and that’s in addition to the 240 million daily Covid-19 related spam messages Google saw.

Here are five common cyber attack methods currently making their rounds:

Phony Government Announcements

Threat actors are sending phishing and Business Email Compromise emails disguised as government announcements. Fraudulent emails have included logos and other imagery associated with the Centers for Disease Control (CDC) and the World Health Organization (WHO). These emails include links with titles that pique recipient interest, such as "updated cases of the coronavirus near you." The links lead to legitimate-looking landing pages designed to steal email credentials.

Impersonating Video Conferencing Apps

The proliferation of video conferencing during this time has led to a major increase in new domain registrations with names including “Zoom”, which is one of the most common video communication platforms used around the world. These domains are used to make users believe they are inputting their information on a legitimate site. 

Of the 2,000+ new Zoom domains registered since the beginning of the year, 4% have been found to contain suspicious characteristics. But, Zoom isn’t the only application targeted by cyber criminals. New phishing websites have been spotted for every leading communication application, including the official classroom.google.com website, which was impersonated by googloclassroom\.com and googieclassroom\.com.

Taking Advantage of Operational and Industry Disruption

The COVID-19 pandemic has led to major disruptions in business operations, supply chains, and the daily lives of billions of people worldwide. And cybercriminals are more than happy to use that to their advantage. Emails with subject lines like “Coronavirus – Brief note for the shipping industry,” have been sent to employees of companies in industries being disrupted by the virus. 

Email attacks have also been disguised to look like invoices, shipping receipts and job applications. These emails include attachments that contain malware designed to steal sensitive data, or contain harmful ransomware.

Malware

Cybercriminals are taking advantage of the widespread global communications on the coronavirus to mask their activities. Malware, spyware and Trojans have been found embedded in interactive coronavirus maps and websites. Spam emails are also tricking users into clicking on links which download malware to their computers or mobile devices.

Ransomware

Hospitals, medical centres and public institutions are being targeted by cybercriminals for ransomware attacks – since they are overwhelmed with the health crisis and cannot afford to be locked out of their systems, the criminals believe they are likely to pay the ransom.

The ransomware can enter their systems through emails containing infected links or attachments, compromised employee credentials, or by exploiting a vulnerability in the system.

Preventing Attacks

Ensuring your employees are aware of current and ongoing cyber threats is the best way to prevent an attack from occurring. It only takes one unsuspecting employee, one click, or one failed alert to allow unauthorized access to your network. 

These precautions are relevant at any time, but especially during the current circumstances:

  • Be skeptical of emails from unknown senders or familiar people (like your company’s CEO or your doctor) who do not usually communicate directly with you.

  • Employ good password hygiene, multi factor authentication,and/or password management software.

  • Don't click on links or open attachments without inspecting an email first for legitimacy.

  • Examine the sender's email address to ensure it's from a true account.

  • Report suspicious emails to the IT or security department.


Kotman Technology has been delivering comprehensive technology solutions to clients in California and Michigan for nearly two decades. With a customer retention of over 98%, we pride ourselves on being the last technology partner you'll ever need. Contact us today to experience the Kotman Difference.

Previous
Previous

Lessons Learned in the Transition to Remote Work

Next
Next

Top-Clicked Phishing Email Subjects: Q1 2020