Security News > 2020 > April > Coronavirus ‘Financial Relief’ Phishing Attacks Spike

Researchers are warning of an upward surge in social-engineering lures in malicious emails that promise victims financial relief during the coronavirus pandemic.
This latest trend shows cybercriminals continuing to look to the newest developments in the coronavirus saga as leverage for phishing campaigns, targeted emails spreading malware and more.
The message asks recipients to verify their email accounts through a malicious link that directs them to a phishing page.
Researchers pointed to similar phishing campaigns in Australia and the U.K. In Australia, a campaign was discovered using emails claiming to be from a major Australian newspaper and using the subject line, "Government announces increased tax benefits in response to the coronavirus." These email messages contain a PDF attachment with an embedded URL that leads to a phishing page, where victims are asked to input their Microsoft OneDrive credentials.
These emails, sent with a subject line of "COVID 19 : Relief Compensation," tells recipients they have been "Randomly selected to be compensated financially due to the outbreak of the COVID-19 Epidemic outbreak" and asks them to learn more by clicking on an fake Microsoft Excel-branded attachment that gathers emails and passwords.
News URL
https://threatpost.com/coronavirus-financial-relief-phishing-spike/154358/
Related news
- Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks (source)
- Phishing, fraud, and the financial sector’s crisis of trust (source)
- iOS devices face twice the phishing attacks of Android (source)
- Windows NTLM hash leak flaw exploited in phishing attacks on governments (source)
- Three Reasons Why the Browser is Best for Stopping Phishing Attacks (source)
- Phishing detection is broken: Why most attacks feel like a zero day (source)
- DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack (source)
- Low-tech phishing attacks are gaining ground (source)
- MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks (source)
- Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation (source)