Cybercriminals exploiting public fear of Covid-19

Top Stories

One of the latest spam campaigns mimics the WHO,  showing how cybercriminals recognise and are capitalising on the important role the WHO has in providing trustworthy information about coronavirus.
One of the latest spam campaigns mimics the WHO, showing how cybercriminals recognise and are capitalising on the important role the WHO has in providing trustworthy information about coronavirus.

New Delhi - Businesses should communicate clearly with workers to ensure they are aware of the risks

By IANS

  • Follow us on
  • google-news
  • whatsapp
  • telegram

Published: Fri 13 Mar 2020, 9:48 PM

Last updated: Fri 13 Mar 2020, 11:50 PM

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing e-mails in the disguise of content coming from the Centers for Disease Control and Prevention in the US and World Health Organisation, says cybersecurity firm Kaspersky.
In the Apac region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar and Thailand.
Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic. Kaspersky also detected e-mails offering products such as masks, and then the topic became more commonly used in Nigerian spam e-mails.  
Researchers also found scam e-mails with phishing links and malicious attachments.
One of the latest spam campaigns mimics the World Health Organization (WHO), showing how cybercriminals recognise and are capitalising on the important role the WHO has in providing trustworthy information about coronavirus.
"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution.
"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.
Some malicious files are spread via e-mail.
For example, an Excel file distributed via e-mail under the guise of a list of coronavirus victims allegedly sent from the WHO was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.


More news from