Covid-19 Virus Impacts Home Working

As the global Coronavirus epidemic hits economies worldwide many employees are working from home, forcing organisations to allow mass remote connections to internal work networks and resources. This  is increasing cyber-criminal behaviour, which is now focusing on the effects of the virus and working from home on less secure networks. 

The C-19 virus is being increasingly used as a subject to engage readers and then used for phishing emails and deliver a range of other attack vectors.

Global Computer Emergency Response Teams (CERTs) have doubled down on their warnings for the public to be wary of scams and cyber-attacks referencing the coronavirus pandemic.Attackers ranging from cyber criminals to suspected spies have cynically used alarm about the global health emergency as bait for phishing or malware-based attacks.

The UK’s National Cyber Security Centre (NCSC) put out a similar warning that elaborates on the range of attacks being carried out by cyber criminals seeking to exploit Covid-19. “These attacks are versatile and can be conducted through various media, adapted to different sectors and monetised via multiple means, including ransomware, credential theft, bitcoin or fraud,” according to the NCSC.

The rationale behind the increase in these attacks is simple. Mass working over remote connection equals mass remote login activity, mostly over private insecure machines with user accounts that have never done so before, making remote login credentials an easy target for attackers.

A study by Cynet has found a correlation between rising cases of COVID-19 in Italy and increasing cyber-attacks on remote workers.

Cynet analysed its aggregate company data in Italy and found that companies with higher proportions of employees working remotely due to COVID-19 cases saw a rise in phishing attacks, compared to countries with fewer attacks.These phishing attacks include those targeting remote user credentials, as well as weaponised email attacks. 

  • 35% of personal email systems encountered attacks involving exploitation of or redirection to malicious websites,
  • 32% were affected by malicious macros,
  •  21% by more simplistic means involving malicious links embedded in the email body.
  • Malicious remote login attempts have also been found to increase in a similar fashion to phishing attacks among Cynet customers.

Malware and email viruses that use Coronavirus-themed messages are aimed at tricking people into fake information and get them to give security data has now spread to over a dozen countries, according to security firm Proofpoint. The company also reported that attackers are beginning to register URLs and create fake websites relating to Coronavirus in order to carry out malicious activity.

The advice from the NCSC is that organisations should prepare for increased remote working and ensure staff are vigilant with work devices that may contain sensitive data. It warns that employees are more likely to have their devices stolen or lost when they are away from the office or home, so efforts must be made to ensure data is encrypted while in a resting state.

Means of Protection
In regards to how cyber-attacks were prevented from infiltrating company systems, over 40% were nullified by behavioural analysis, while almost 30% were stopped by static analysis on the part of machine learning,

Memory monitoring, meanwhile, did the trick for nearly 20%, and slightly over 10% by identification and blocking attacks using the user’s signature. “The fact that only 10% of the malware attacks were identified by their signature indicates that the attackers behind these campaigns are using advanced attacking tools to take advantage of the employees working in non-secure home computing environments,” said Eyal Gruner, CEO and co-founder of Cynet. “Our recommendation is for those employees to request enhanced offsite security and support to protect malicious access to sensitive IT systems and data.”

Cynet's blog post that the findings serve as a warning for CISOs worldwide in regards to possible vulnerabilities as a result of the COVID-19 pandemic. 

CyNet:     Information-Age:      Independent:   Portswigger:     Evening Express

You Might Also Read:

Cyber Crime Methods Are Evolving:

 

 

 

« Remote Working Is On Suddenly On Trend
How Effective Is Your Threat Intelligence? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

Nineteen Group

Nineteen Group

Nineteen Group delivers major-scale exhibitions within the security, fire, emergency services, health and safety, facilities management and maintenance engineering sectors.

DatChat

DatChat

DatChat Inc. is a blockchain, cybersecurity, and social media company that focuses on protecting privacy on our devices and also protecting our information after we have shared it with others.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.

Cyshield

Cyshield

Since 2016, Cyshield has been a leader in cybersecurity and digital solutions. We have worked on 350+ projects, earning a reputation as a trusted consultant in the digital world.