Security News > 2020 > April > Scammers exploiting stimulus payments with phishing attacks and malicious domains
Since January, more than 4,000 domains related to coronavirus stimulus packages have been registered, many of them malicious or suspicious, according to Check Point Research.
These attacks typically take the form of malicious apps, phishing emails, and phony websites.
In a report published on Monday, cyber threat intelligence provider Check Point Research details the rise of phishing attacks and websites that try to trap people seeking information on the stimulus.
Beyond the domains, phishing emails with malicious attachments related to the stimulus have also continued to increase.
Sent to specific individuals at targeted organizations, these emails direct users to a phishing login page to deliver the malicious payload. Overall, 94% of the coronavirus-related cyberattacks during the past two weeks were phishing attempts, while 3% were mobile attacks sent through malicious apps or conducted through malicious activity on a mobile device.
News URL
Related news
- Midnight Blizzard Escalates Spear-Phishing Attacks On Over 100 Organizations (source)
- Windows infected with backdoored Linux VMs in new phishing attacks (source)
- Scammers target UK senior citizens with Winter Fuel Payment texts (source)
- New Ghost Tap attack abuses NFC mobile payments to steal money (source)
- Mega US healthcare payments network restores system 9 months after ransomware attack (source)
- Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks (source)
- GenAI makes phishing attacks more believable and cost-effective (source)
- CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force (source)
- Inside the incident: Uncovering an advanced phishing attack (source)
- Ongoing phishing attack abuses Google Calendar to bypass spam filters (source)