DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

COVID-19 Cyberattacks – Clear and Present Danger

DigitalCIO Bureau by DigitalCIO Bureau
April 13, 2020
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

From healthcare to the education industry, cyberattackers are on the prowl. Read on to know more…

After the outbreak of coronavirus — from healthcare to the education industry, cyberattackers are gaining a foothold in every landscape. Hackers and threat groups have consistent goals with long-standing priorities such as cyberespionage and “hack-and-leak” operations. Disguised as trusted entities, APT groups and cybercriminals are capitalizing on the COVID-19 pandemic by deploying a wide variety of ransomware and other malware. Their ill-natured maneuvers include leveraging coronavirus-themed phishing text/emails or malicious applications.

Coronovirus Based Cyberattacks
In the last few weeks, the number of cyberattacks has skyrocketed. For instance, a series of SMS messages were found to use a UK government-themed lure to collect email, address, name, and banking information. Claiming to be from “UKGOV”, these SMS messages included a direct link to the phishing site.

Besides, the National Cyber Security Centre (NCSC) observed several emails leveraging the “Agent Tesla” keylogger malware. This email campaign started around mid-March and seemed to be sent from Dr. Tedros Adhanom Ghebreyesus, Director-General, WHO. A similar campaign was espied offering thermometers and face masks to deal with the COVID-19 outbreak. The email appears to have attached images of these medical products but instead carries a loader for Agent Tesla.

In other campaigns, emails enclosed a Microsoft Excel attachment (e.g., “8651 8-14-18.xls”) or included URLs to a page that contained a button that — if clicked — redirects to download an Excel spreadsheet, such as “EMR Letter.xls”. In both cases, the Excel file contained macros that, if enabled, execute an embedded dynamic-link library (DLL) to install the “Get2 loader” malware, which has been observed loading the “GraceWire” Trojan.

Also, the “TrickBot” malware has been exploited in diverse COVID-19-related campaigns. For example, emails targeted Italian users with a document appearing to be information related to the coronavirus. The document enclosed a malicious macro that is capable of downloading a batch file (BAT) and launching JavaScript, which pulls down the TrickBot binary, executing it on the system.

Several organizations have suddenly deployed new networks and IT infrastructure, including VPNs to move their entire workforce to work from home. Cyberattackers are taking advantage of it and looking for ways to exploit the increased use of communications platforms such as Microsoft Teams or Zoom by sending phishing emails containing malicious files with names such as “zoom-us-zoom_##########[.]exe” and “microsoft-teams_V#mu#D_##########[.]exe”.\

Mitigation
In order to keep the attackers at bay, several government security agencies such as FBI, DHS, CISA, and NCSC have stepped in and issued security guidances for a better security posture of individuals and organizations. Let’s learn about the different guidelines set out by the government security bodies. This joint advisory from the DHS CISA, and NCSC provides information on exploitation by cyberattackers and APT groups of the COVID-19 global pandemic. It includes a comprehensive list of IOCs for detection and mitigation advice. The NCSC and CISA are working collaboratively with law enforcement and industry partners to disrupt or prevent these malicious COVID-19 themed attacks.

The NCSC’s suspicious email guidance explains whom to contact if your account/device has been compromised and some of the mitigation steps you can take, such as changing your passwords. It also outlines tips for identifying a phishing email. Organizations that broaden their defenses to include extensive technical measures can improve resilience against phishing attacks. In addition, organizations should consider NCSC’s guidance that divides mitigations into four layers. According to CISA guidelines, companies can help their users identify and report suspected phishing emails.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails

Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

by DigitalCIO Bureau
September 1, 2025
0
Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

Qlik has announced growing enterprise adoption of Qlik Answers, as companies across sectors move beyond AI prototypes and into business-critical deployment. Built for real-world complexity, Qlik Answers allows organizations to extract intelligence...

Read moreDetails

Google’s AI bug finder has found 20 vulnerabilities

by DigitalCIO Bureau
August 6, 2025
0
Kaspersky Unveils Guidelines For Secure AI Deployment At IGF 2024

Google has found and reported twenty vulnerabilities in various popular open-source projects through an AI-powered bug finder. The "researcher," dubbed Big Sleep, was introduced in November last year....

Read moreDetails

Qlik Cloud Analytics available through AWS Marketplace

by DigitalCIO Bureau
July 21, 2025
0
Qlik Cloud Analytics available through AWS Marketplace

Qlik has announced the availability of Qlik Cloud Analytics in the new AI Agents and Tools category of AWS Marketplace. Customers can now use AWS Marketplace to easily...

Read moreDetails

KnowBe4 Releases AI-Driven Prevent To Tackle Outbound Email Risk

by DigitalCIO Bureau
July 19, 2025
0
Barracuda Networks Updates Email Security Suite

KnowBe4 has announced the release of KnowBe4 Prevent across all market segments – an AI-driven email security product designed to enable organizations to manage the problem of outbound...

Read moreDetails
Next Post

Airtel, Apollo Hospital join forces to help India tackle this pandemic

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Trump urges U.S. telecommunications companies to step up 5G systems

February 21, 2019
Nvidia working on customized version of its H20 chip for China

Nvidia working on customized version of its H20 chip for China

May 10, 2025
GoTo Releases New Integrations Across Their IT Solutions Suite

GoTo Releases New Integrations Across Their IT Solutions Suite

August 28, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?