Security News > 2020 > April > Scammers exploiting stimulus payments with phishing attacks and malicious domains
Since January, more than 4,000 domains related to coronavirus stimulus packages have been registered, many of them malicious or suspicious, according to Check Point Research.
These attacks typically take the form of malicious apps, phishing emails, and phony websites.
In a report published on Monday, cyber threat intelligence provider Check Point Research details the rise of phishing attacks and websites that try to trap people seeking information on the stimulus.
Beyond the domains, phishing emails with malicious attachments related to the stimulus have also continued to increase.
Sent to specific individuals at targeted organizations, these emails direct users to a phishing login page to deliver the malicious payload. Overall, 94% of the coronavirus-related cyberattacks during the past two weeks were phishing attempts, while 3% were mobile attacks sent through malicious apps or conducted through malicious activity on a mobile device.
News URL
Related news
- Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials (source)
- DOJ, Microsoft seize 107 domains used in Russia's Star Blizzard phishing attacks (source)
- GitHub, Telegram Bots, and ASCII QR Codes Abused in New Wave of Phishing Attacks (source)
- Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack (source)
- Midnight Blizzard Escalates Spear-Phishing Attacks On Over 100 Organizations (source)
- Windows infected with backdoored Linux VMs in new phishing attacks (source)
- Scammers target UK senior citizens with Winter Fuel Payment texts (source)
- New Ghost Tap attack abuses NFC mobile payments to steal money (source)
- Mega US healthcare payments network restores system 9 months after ransomware attack (source)