Update COVID-19 Cybercrime

COVID-19 Update 3/30/2020

During the COVID-19 crisis, our analysts are tracking open-source information sources to keep our followers up to date with COVID-19 Cybercrime. Today’s report:

  • Cybercriminals are taking advantage of the spike in usage of online communication platforms by registering new fake "Zoom" domains and malicious "Zoom" executable files in an attempt to trick people into downloading malware on their devices, according to this The Hacker News report.
  • IBM and FireEye have spotted a campaign that relies on fake “COVID-19 Payment” emails to deliver the Zeus Sphinx banking trojan to people in the United States, Canada and Australia.
  • Hacker group, FIN7 gang, is mailing victims a USB storage device, with a teddy bear and purported $50 gift card to Best Buy, according to Data Breach Today. The USB device is a commercially available tool known as a ‘BadUSB’ that will download and execute a malware payload from an attacker-controlled server.
  • Bleeping Computer reports a new phishing campaign has been spotted that pretends to be from a local hospital telling the recipient that they have been exposed to the Coronavirus and need to be tested.
  • Times of crisis bring out the best in people, and the worst in scammers – as you can hear in these sample calls from Coronavirus scammers pretending to be from the Social Security Administration, offering fake Coronavirus tests to Medicare recipients, and attempting to scare small businesses into buying bogus online listing services.

We Can Secure Your Remote Infrastructure

IT managers must prioritize cybersecurity as they transition employees to work remotely. This massive shift in operations to a less secure home environment poses significant risks that must be managed.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Intelligence and Insights

log management

How A Log Management Assessment Can Prepare Your Organization for a Cyber Attack

This article delves into the significance of log analysis in a forensic readiness assessment and outlines best practices for organizations to optimize their log management strategies …
Business Impact Assessments

Importance of Business Impact Assessments

In the event of a data breach, Business Impact Assessments will help your organization prioritize recovery steps and get back to business faster …
cybersecurity incident response

How to Choose the Right Tabletop Scenario for Incident Response Testing

To effectively combat these threats, organizations must invest in robust cybersecurity incident response strategies …