Hackers Are Targeting Coronavirus Research

The UK and US have warned that state-backed cyber attackers are trying to steal data from universities, pharmaceuticals and research institutes involved in coronavirus vaccine research. 

The UK's National Cyber Security Centre (NCSC) and its US counterpart, the US Cybersecurity and Infrastructure Security Agency (CISA), urged workers in healthcare and medical research to change easy-to-guess passwords. China is among hostile states believed to be trying to steal secrets during pandemic.

In May, the NCSC created the Suspicious Email Reporting Service after seeing an increase in coronavirus-related email scams. In its first week, the service received more than 25,000 reports, resulting in 395 phishing sites being taken down.
Now Britain’s intelligence agencies are working urgently to prevent hackers from hostile states, including China, trying to steal the secrets of a potential coronavirus vaccine.

The head of GCHQ has said that hackers, including those from hostile states, were targeting the UK’s health infrastructure and some of its world-leading research labs, often by using simple techniques.

The chief of GCHQ did not directly name China or any other country as being behind the cyber-attacks on the NHS and British research labs, but sources indicated that Beijing was often believed to be involved.

Britain’s intelligence agencies have been pressing for both a reassessment of the UK’s relationship with Beijing, arguing that Britain needs to reduce its dependence on Chinese technology and medical supplies, and a more realistic appreciation of the intelligence threat

Others, however, have gone further, claiming that coronavirus may have leaked from a high-security disease research lab in Wuhan, and that, in contrast to the prevailing research, it may be human made. Sir Richard Dearlove, who was in charge of the British MI6 spy agency in the run up to the Iraq war, told reporters he had seen “very important” research suggesting that “inserted sections” had been placed on the structures of the virus that bind it to human cells.

British government sources reacted with dismay to Dearlove’s statements, the latest in a campaign though to be aimed at justifying a laboratory leak theory promoted by US president Trump. They are reported as saying that they see no evidence to justify the claim by the former MI6 boss.

Yahoo:        Endgadget:         Yahoo:     Daily Mirror:       Guardian:

You Might Also Read: 

Covid-19 Is Working Well For Criminals:
 

 

« Your Phone Is Spying On You
Blame The Boss For Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

1Password

1Password

1Password combines industry-leading security with award-winning design to bring private, secure, and user-friendly password management to everyone.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.