Coronavirus Phishing Scams

Health concerns aren't the only thing you need to watch out for in the pandemic. Cybercriminals are taking full advantage of the world's confusion by targeting people and businesses when they're at their most vulnerable. While cybercrime of all kinds is on the rise, phishing has emerged as a current favorite of coronavirus scammers.
 
As of May 1, the U.K. has reported 4,727 coronavirus-related phishing emails, leading to more than £2 million in losses. In the U.S., damages from these emails have surpassed $4 million as of May 11. Many of these scams use similar tactics, so here are a few of the most common ones you may encounter.
 
Impersonating Health Authorities
As you might have predicted, many phishers are sending emails under the guise of official health figures. By pretending to be an authority like the World Health Organization (WHO), cybercriminals fool unsuspecting users into clicking malicious links. Amid all the confusion surrounding the virus, people may let their guard down, desperate for information.
 
These emails impersonate official sources offering updates on the spread of the virus. Since many of these organizations are sending out regular updates, you can see why people may fall for these scams. Since they contain relevant subject lines like "Coronavirus Updates" or "COVID-19 News," email filters may not label them as spam, either.
 
Fraudulent Outbreak Maps
A similar and equally prevalent scheme is to present a malicious link to an outbreak map. This scam is particularly effective because Johns Hopkins University has released an official interactive COVID-19 map. Some phishing attempts link to the Johns Hopkins map but install AzorUlt Trojans in the process.
 
Other similar campaigns involve mimicking the official map but taking users to a fraudulent, malware-infested one instead. Like with phishing scams parading as the WHO, these attempts take advantage of users' desire for information. In their haste to learn more, they may not double-check to see if the source is legitimate or not.
 
Imitating Government Officials
Health organizations aren't the only groups that coronavirus phishers are impersonating. Many governments are providing monetary or informational support to their citizens, which presents cybercriminals with the perfect opportunity. Scammers pretending to represent the U.S. CARES Act or the U.K.'s HMRC are on the rise.
Businesses are especially susceptible to these scams, as many government programs offer tax relief or loan forgiveness for companies. Unfortunately, organizations also have the most to lose, risking both their livelihood and reputation in the event of identity fraud. Global economies are already in decline, making these scams all the more devastating.
 
Tips on Avoiding Coronavirus Phishing
While the pandemic has spurred a rise in phishing, you aren't defenseless against these scams. You and your business can avoid falling prey to coronavirus phishers by maintaining safe internet practices. Amid all the confusion, you mustn't lose sight of basic cybersecurity measures. 
 
Understanding what forms many of these scams take is the first step in preparedness. Know that almost 20% of all phishing emails today include coronavirus-related information or content. You should subject anything containing this type of material to additional scrutiny.
 
The only thing separating these new scams from older ones is their prevalence and the growing public confusion. If you take the time to remember foundational security measures like inspecting links and not clicking on unknown addresses, you'll be safe. Here are some reminders to keep in mind: 
  • Always verify an email's source before clicking any links or opening attachments.
  • Just because an email address looks official doesn't mean it is.
  • Never give personal information away over email.
  • Government agencies will never ask for you for money, especially in cryptocurrency.
  • If anything sounds too good to be true, it probably is.
  • For information regarding COVID-19, check official sources like the WHO's website, not emails. 
Protecting Your Business During COVID-19
If you practiced safe email behavior before the outbreak, you should be safe. Just remember to continue these practices, and double-check everything if you didn't already. These are confusing times for everyone, but you can't afford to let your guard down.
 
Many things are changing in response to the pandemic, but the threat of phishing hasn't. Cybercrime is as prevalent as ever, so make sure you and your business are taking steps to defend against it. The phishing scams of the coronavirus are a growing threat, but you can handle it with robust cybersecurity.
 
Caleb Danziger writes about science and technology at TheByteBeat.com
 
You Might Also Read:
 
Spear Phishing Threats & Trends:
 
 
« CISO's Cant Find The Right People
‘We Hacked Your Website’ Blackmail Scam »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Reliance Cyber

Reliance Cyber

Reliance Cyber (formerly Reliance ACSN) help to monitor and manage your organisation’s security infrastructure 24/7, so you can make sure all threats and issues are dealt with.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.