Covid-19 Is Working Well For Criminals

The coronavirus pandemic have fuelled a disturbing rise in the number of cyber-attacks. As COVID-19 pushes the legitiamte economy towards recession, the cyber crime economy appears to be surging.  Furthermore, the impact of the virus has rapidly reshaped the way business is being done on the dark web, as buyers and sellers jump on the opportunity to profit from a significant chane in supply and demand.

Some criminals on the Dark Web seem to be  changing their behavior to take advantage of the special opportunities that see before them. 

Check Point Research has published a report about cyber attacks which specifically use the coronavirus pandemic. Three weeks prior to 12 May, the company recorded 192,000 coronavirus-related cyber-attacks every week, a significant 30% increase over previous weeks. During April-May 20,000 new coronavirus-related domains appeared on the Internet, and 17% of these were malicious and or suspicious.

The scale of the problem is so unprecedented that international organisations like Interpol and the World Health Organisation (WHO) have been releasing regular alerts and bulletins for the general public on covid-19 cyber-threats. Recently, Interpol’s cybercrime programme released a report, Global Landscape On Covid19 Cyberthreats, which identifies the latest modes and threats. Online scams, phishing and disruptive malware, which includes the dreaded ransomware, are the prominent modes of attack

  • “Business Email Compromise (BEC) has become the scheme of choice, involving the spoofing of supplier and client email addresses—or use of nearly identical email addresses—to conduct attacks," Interpol says. Hashtags like #WashYourCyberHands have been trending ever since to keep users up to date about the scams evolving every second.
  • Video-conferencing apps are being impersonated while platforms like Microsoft Teams and Google Meet have also been used to attract potential victims. Recently, people fell prey to phishing emails that came with the subject. “You have been added to a team in Microsoft Teams", the Check Point Research report notes. Clicking on the URL that accompanied this email would install malware on a user’s system, compromising its security. 
  • The WHO itself has been used as a decoy with receiving emails, supposedly from WHO, offering information on safety measures to avoid infection. Some users have even opened emails that claim to be a request to donate to WHO’s COVID-19 Solidarity Response Fund. The fund does exist but WHO would never mail you from, say, a Gmail account, as was the case in this instance.

The scams are not exclusivley aimed at individual users and numerous banks, real estate companies and other institutions too have been sending out SMSes and emails, asking customers to look out for suspicious calls or emails.  Phishing and other forms of cyber attacks are here to stay and next time you get an unsolicited email or a promotion campaign that looks too good to be true, think carefully before you click on it.

CheckPoint:       LiveMint:      SC Magazine:       Financial Times

You Might Also Read: 

Half Of Lockdown Remote Workers Ignore Cyber Security:

 

« Chinese Hackers Attacked EasyJet
Artificial Intelligence Takes Microsoft Jobs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Cyviation

Cyviation

Cyviation's mission is to mitigate ever-growing and menacing Cyber Security threats, focusing on aircraft, airlines and airports.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.