The great American businessman and philanthropist, John Rockefeller once said “I always tried to turn every disaster into an opportunity.” I doubt he ever envisaged that his words would be heeded by criminals waiting to profit from panic.
The threat intelligence company Recorded Future have confirmed the registration of thousands of fake coronavirus-related websites. Make no mistake, these domains are being used to phish for information or to infect computer networks with malware.
Preying on current fears due to the global outbreak of COVID-19, criminals are banking on unsuspecting employees clicking on coronavirus-related links without thinking. The threat risk is further exacerbated by the hundreds of thousands of employees worldwide now working from home.
Among the multiple organizations issuing warnings, the Federal Trade Commission has issued a memo alerting consumers to the increase in spoofed emails, text messages, and phone calls that claim to be from the Centers for Disease Control (CDC). These websites offer a “cure” to the virus with remedies, vaccines and testing kits.
And leading security blogger Brian Krebs has reported that an interactive dashboard of Coronavirus infections and deaths produced by Johns Hopkins University is being used in malicious web sites to spread malware.
How are they doing it?
Even before COVID-19 crept up on us, phishing was a popular — and effective — technique for attackers. Phishing is an attempt to steal your credentials and obtain sensitive information, often via an email message containing a link to a fake website that looks like a log-in page from a cloud-based email provider. In 2019, nearly a third of all breaches involved a phishing attack, making it the top threat action used in successful breaches, according to Verizon's Data Breach Investigations Report (DBIR).
When the bad guys come looking for you, they’re aware that your company has security protocols in place, so threat actors are usually forced to take at least a few actions before they get what they want. The DBIR goes on to note that 28% of the more than 2000 breaches involved malware infections – usually delivered by email - and 29% involved the use of stolen credentials, both of which are frequently accomplished through phishing attacks.
What can you do to avoid coronavirus fraud?
To avoid any risk, if you spot emails coming from coronavirus-related domains, do not click on any attachments, simply delete the emails. Be wary of websites soliciting for donations, offering medical advice and supplies and advice on the financial markets. In short, don’t take the bait and click on links from sources you don’t know.
If the email message is conveying an important or urgent matter from an organization you know e.g. your bank or hospital, contact the sender through alternate and official channels. Of course, it goes without saying that you need to keep your system security up-to date and encrypt or password-protect sensitive information. If you’re working from home, please also ensure that your VPN contains two-factor authentication to secure your network connection.
Ali Neil is Director of International Security Solutions at Verizon. The Verizon 2020 Data breach investigations report is available here.
Government measures to contain the spread of the coronavirus in China look set to delay the rollout of next-generation 5G telecom networks, a key technology initiative for the country's leadership. Tenders for …
Rick McElroy, Cybersecurity Strategist at VMware Carbon Black, describes some of the myths surrounding managing a remote workforce securely. I’ve attended a bunch of executive CISO roundtables over the past …