Cyber Attacks Up 500% In A Month

Most of the world is trying to deal with the COVID-19 pandemic but  hackers are not under a lockdown. Cyber threats to the healthcare sector have surged as hackers look to take advantage of the panic and chaos caused by the coronavirus crisis. 

Phishing and hacking attacks and threats have increased by 5/6 times their usual numbers in the past month. The hackers are using the virus to exploit users working remotely from home to make their cyber attacks effective.

From a criminal perspective, phishing is the cheapest and easiest way to infiltrate organisations and personal information to make a profit.  Phishing is an even greater threat for mobile users as it is much easier for a user to make the simple mistake of clicking a bad link and falling victim to a phishing attempt. 

The outbreak of the COVID-19 has been exploited by cyber criminals for their latest phishing campaigns. 

A growing number of cyber criminals and other malicious groups online are exploiting the COVID-19 outbreak for their own personal gain, security officials in the UK and USA have revealed. On the 8th April the UK’s National Cyber Security Centre (NCSC) and US Department of Homeland Security (DHS) Cybersecurity and Infrastructure Agency (CISA) shows that cyber criminals and advanced persistent threat (APT) groups are targeting individuals and organisations with a range of ransomware and malware.

Examples of scams include emails containing malware which appear to have come from the Director-General of the World Health Organisation (WHO), and others which claim to offer thermometers and face masks to fight the pandemic.

Elsewhere the agencies have detected cyber criminals scanning for vulnerabilities in software and remote working tools as more people work from home during the pandemic. Attackers have also implemented a phishing campaign directed toward key executives and financial employees at certain organisations with the goal of stealing their account credentials.

With the latest coronavirus-themed campaigns, cyber criminals have been using various strategies, such as leveraging email, PDF attachments, and SaaS services. 

The US Department of Health and Human Services (HHS) and the World Health Organisation (WHO) have been targeted by hackers in unsuccessful but ongoing attacks. Hackers have started to capitalise on this situation by sending out emails that purport to offer health advice from reputable organisations such as governments and the WHO but that are really phishing attacks.

Around the world thousands of network engineers, technicians, and system administrators are working tirelessly to keep this system functioning for the rest of us. They’re grappling with greater network demands, a rapid acceleration in remote work, and a growing risk of cyber threats. 

Online threats have risen by as much as six-times their usual levels over the past four weeks as the COVID-19 pandemic provides new ballast for cyber-attacks, according to Cloudflare. The web security and content delivery vendor analyzed UK traffic figures for the past four weeks compared to the previous month and noted a sharp increase in malicious activity.

It revealed that hacking and phishing attempts were up 37% month-on-month, while on some days, the firm was blocking between four- and six-times the number of attacks it would usually see. The firm said the increase was the result of “recreational” hackers with more time on their hands.

Professional cyber-criminals are also using the global incident to further their own agendas. Phishing attempts have soared by over 600% since the end of February, including traditional impersonation scams but also business email compromise (BEC) and extortion attacks, according to Barracuda Networks.

In Hong Kong, likely state-sponsored attackers are using the virus as a lure to trick users into clicking on news links booby-trapped with iOS spyware.

Domain registrars are ramping up efforts to halt automatic registration of any website names that are linked to COVID-19, for fear they may be phishing sites or those selling counterfeit goods like surgical masks and pharmaceuticals and Interpol recently said that it had already managed to seize $14m worth of such fake goods. Even the British NCSC has stepped in to remove malicious and phishing sites. Aside from the rise in threat levels,

Cloudflare also noted an overall increase in internet use of 17%, as the majority of the country is urged to stay indoors and work from home.Online visits to tutoring sites grew most during the past four weeks, up 400%, while website numbers in categories such as politics (320%), TV (210%) and gardening (200%) also spiked. The pandemic is also worsening the situation because more and more people are staying at home and using the internet to work and socialise. This means they may be using their personal computers more and working outside the normal security protections provided by their employers’ internal computer systems. 

They are also working in stressful conditions that could leave them more likely to forget routine security procedures and fall victim to a phishing attack.

Remote usres are advised to always check for obvious signs of fake or unofficial emails such as poor spelling, grammar and punctuation, as most of these emails are generated from outside the country they are sent to.Also, be wary if the email tries to create a sense of urgency, that you must click its link now.

Remote users should also bear in mind that cyber criminals use every opportunity available to exploit weaknesses in cyber security and a frantic search for health advice is such an opportunity.  Always make sure that you look for information about COVID-19 only from trusted sources. 

NCSC:         Cloudflare:      TechXplore:     Menlo Security:     I-HLS

The Hill:      Infosecurity Magazine:      The Conversation:    

You Might Also Read: 

An 'Infodemic' Of Phishing & Malware:



 

« Half Of UK Business Has A Critical Cyber Skills Gap
Spear Phishing Threats & Trends »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NCC Group

NCC Group

NCC Group is a global cyber and software resilience business operating across multiple sectors, geographies and technologies.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.