It might look like an e-mail from a supervisor with an attachment on the new “work from home policy,” but it could be a cleverly designed scheme to hack into your network.
The abrupt move of millions of people to working remotely has sparked an unprecedented volume of attacks to trick people into giving up credentials to attackers, security researchers said.
“We’ve never seen anything like this,” said Sherrod DeGrippo, head of threat research for the California-based security firm Proofpoint. “We are seeing campaigns with message volumes up to hundreds of thousands which are leveraging this coronavirus.”
The pandemic has created a perfect storm for cyberattacks, with millions of people working in unfamiliar, less secure circumstances, and eager for information about the virus and new organizational policies being implemented.
This opens up a new avenue for malicious actors using phishing e-mails or “social engineering” to gain access or steal sensitive information.
“When someone is working form their home it is a similar threat profile as at an airport or a Starbucks, you just don’t have that protection you might have in the workplace,” DeGrippo said.
“And if we’re at home with our family where we feel safe, you might see a family member hop on to do homework, and might not understand the security controls. Keeping mom’s and dad’s computer for mom and dad is the right thing to do,” he said.
Tom Pendergast, chief learning officer of the security and privacy training firm MediaPRO, said many of the millions of people adjusting to the new landscape are unprepared for teleworking.
“It’s one thing if people have been working remotely with equipment that has been properly configured,” Pendergast said. “It’s different for people who haven’t had that experience.”
Attackers are taking advantage of people’s fears about COVID-19 with scare tactics to get people to click on malicious links or attachments, but also playing on sympathies with fake crowdfunding pages purported to be for people who have fallen ill, he added.
Pendergast said healthcare organizations are especially susceptible to schemes such as ransomware, because “they are less likely to shut down their systems by refusing to pay.”
This was highlighted with a major hospital in the Czech Republic hit with ransomware following an e-mail campaign with a coronavirus “awareness” message, media reports said.
“The COVID-19 scare has proven lucrative for cybercriminals in recent weeks as healthcare institutions scramble to test patients, treat the infected and protect their own staff from the contagion,” a blog post from Filip Truta of the security firm BitDefende said. “Healthcare infrastructures are highly susceptible to hacker attacks because of lax cybersecurity skills and safeguards.”
The potential for costly cyberattacks has prompted warnings for stepped up vigilance.
The French public-private cybersecurity alliance this week warned businesses to be alert for faked e-mails related to purported orders or bank transfers, or telephone calls aimed at obtained financial account information.
The US Department of Homeland Security issued an alert this month warning that the COVID epidemic has increased threats and that “cyberactors may send e-mails with malicious attachments or links to fraudulent websites to trick victims into revealing sensitive information.”
Hawaii Attorney General Clare Connors advised residents to watch for fraudulent e-mails claiming to be from the US Centers for Disease Control and Prevention or experts saying they have information about the virus.
“Scammers may still offer fake vaccines and other bogus medical products claiming to offer ‘cures’ for the virus,” a statement from Connors’ office said.
DeGrippo said virtually all the cyberschemes related to the pandemic are financially motivated and added that “personally I find it depraved ... it is taking humanity at its most vulnerable and trying to use that for financial gain.”
She said that the threats may evolve as attackers craft new scheme and techniques.
“I can see some attackers sending messages like: ‘I’m in quarantine and need you to buy something for me,’ or ‘I need you to make this transfer of funds,’” she said. “I think we’ll see criminals leveraging the coronavirus to do more of that.”
Japan said it opposed changes to the G7 nations as it pushed back against a reform plan by US President Donald Trump that would have rival South Korea this year join in an expanded meeting. Tokyo has told the US it stands against South Korea’s participation on the grounds of differences in policy on China and North Korea, Kyodo News reported this weekend, citing more than one source related to Japanese and US diplomacy. Japan also wants to maintain its status as the only Asian country in the group, the news agency added. Japanese Chief Cabinet Secretary Yoshihide Suga yesterday told reporters that
The onset of summer has sparked a rise in incidents of “mask rage” in South Korea as more hot and bothered commuters either refuse to wear face coverings or leave parts of their faces exposed. In South Korea, Japan and other countries in East Asia, widespread mask wearing has been cited as one possible explanation for the region’s relative success in bringing the COVID-19 pandemic under control. South Korea, one of the first countries outside China to be affected by the virus, flattened the coronavirus curve in April, although it is now struggling with dozens of daily cases, mainly in and around
‘WOULD NOT COMPLY’: The company’s user data are kept in Singapore and it would not turn the data over to Beijing even if asked, TikTok chief executive Kevin Mayer said Social media app TikTok has distanced itself from Beijing after India banned 59 Chinese apps in the country, according to a correspondence seen by Reuters. In a letter to the Indian government dated on Sunday last week and seen by Reuters on Friday, TikTok chief executive Kevin Mayer said the Chinese government has never requested user data, nor would the company turn it over if asked. TikTok, which is not available in China, is owned by China’s ByteDance, but has sought to distance itself from its Chinese roots to appeal to a global audience. Along with 58 other Chinese apps, including Tencent
PLAYING THE VICTIM? A Chinese spokesman sent a statement to Australian media saying that Beijing had ‘irrefutable’ evidence of Canberra’s widescale espionage Australia yesterday unveiled the “largest-ever” boost in cybersecurity spending, days after Australian Prime Minister Scott Morrison spoke out about a wave of state-sponsored attacks suspected to have been carried out by China. Morrison and government officials said the country would spend an additional A$1.35 billion (US$928 million) on cybersecurity, about a 10 percent hike, taking the budget for the next decade to A$15 billion. The largest chunk of the new money would help create 500 jobs within the Australian Signals Directorate, the government’s communications intelligence agency. Morrison on June 19 said that a “state-based actor” was targeting a host of