Security News > 2020 > March > How hackers are using COVID-19 fears to push new scams and malware
Cybersecurity firm Forcepoint reports that it has found a number of new phishing and malware scams circulating around the internet with a common theme: They all aim to capitalize on coronavirus and COVID-19 fears.
The tactics being used in this current wave of COVID-19 phishing and malware are nothing new: Phishing attempts are seeking to steal email passwords, fake ads are selling scam products, and traditional malware droppers are being found in infected word documents.
Phishing attacks aim to get users to give up their credentials, and those using COVID-19 to stoke fears are no different.
The emails contain links to suspicious websites, fake products, and other scams designed to separate users from their money and identities.
Malware droppers are designed to avoid traditional security by not containing any malware themselves.
News URL
Related news
- North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn (source)
- Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks (source)
- Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails (source)
- Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations (source)
- Chinese hackers target Linux with new WolfsBane malware (source)
- Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia (source)
- Salt Typhoon hackers backdoor telcos with new GhostSpider malware (source)
- Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries (source)
- APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign (source)
- Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware (source)