Security News > 2020 > February > Cybercriminals flooding web with coronavirus-themed spam and malware

Cybercriminals flooding web with coronavirus-themed spam and malware
2020-02-14 17:30

Cybercriminals were already using convincing but fake emails from the WHO, CDC and Japanese government to trick people into downloading PDF, MP4 and Microsoft Word DOCX files.

The shipping and manufacturing industry have taken massive hits because of the quarantines in China, and cybercriminals have sought to exploit that by bombarding companies with malware, spam and fake emails with links to sites like Office 365, Adobe and DocuSign hoping to steal emails and passwords.

"The messages contain a Microsoft Word attachment with an embedded URL that leads to a fake Microsoft Office website to enter credentials. Once the credentials are entered, the user is then redirected to the legitimate World Health Organization coronavirus information site, making the phishing transaction seem legitimate." Proofpoint also found emails coming from fake Australian healthcare companies attempting the same scams.

Avishay Zawoznik, security research manager at Imperva, released a detailed report on spam operations centered around coronavirus fears and showed how cybercriminals were exploiting online interest in the virus to spread misinformation or lure people into buying fake cures.

On Monday, a consumer education specialist for the Federal Trade Commission, Colleen Tressler, wrote that scammers are "Setting up websites to sell bogus products, and using fake emails, texts, and social media posts as a ruse to take your money and get your personal information." "The emails and posts may be promoting awareness and prevention tips, and fake information about cases in your neighborhood. They also may be asking you to donate to victims, offering advice on unproven treatments, or contain malicious email attachments," she wrote.


News URL

https://www.techrepublic.com/article/cybercriminals-flooding-web-with-coronavirus-themed-spam-and-malware/#ftag=RSS56d97e7