Security News > 2022 > October > Credential phishing attacks continue to exploit COVID-19 to target businesses

Credential phishing attacks continue to exploit COVID-19 to target businesses.
Since early 2020, the coronavirus pandemic has given cyber criminals another area that's ripe for exploitation as they try to trick individuals and businesses into divulging sensitive information.
In a report published Wednesday, Oct. 11, email security provider Inky discusses a recent phishing campaign that takes advantage of COVID-19 in an attempt to steal financial account details from business users.
Promising grant money to all businesses and organizations, with no need to pay it back, the phishing email includes an "Apply Now" button that takes users to a survey form that must be filled out to determine if they're eligible for the grant.
Using Google Forms to create and host the survey is a clever method as this is a free tool trusted by businesses and one that's likely to avoid security detection.
Also See Share: Credential phishing attacks continue to exploit COVID-19 to target businesses.
News URL
https://www.techrepublic.com/article/credential-phishing-targets-businesses/
Related news
- Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail (source)
- How to Prevent Phishing Attacks with Multi-Factor Authentication (source)
- Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks (source)
- SonicWall firewall bug leveraged in attacks after PoC exploit release (source)
- New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution (source)
- Microsoft: Hackers steal emails in device code phishing attacks (source)
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks (source)
- Russian phishing campaigns exploit Signal's device-linking feature (source)
- Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains Including SharePoint & Zoom Docs (source)
- Phishing attack hides JavaScript using invisible Unicode trick (source)