COVID-19 Update 3/30/2020
During the COVID-19 crisis, our analysts are tracking open-source information sources to keep our followers up to date with COVID-19 Cybercrime. Today’s report:
- Cybercriminals are taking advantage of the spike in usage of online communication platforms by registering new fake "Zoom" domains and malicious "Zoom" executable files in an attempt to trick people into downloading malware on their devices, according to this The Hacker News report.
- IBM and FireEye have spotted a campaign that relies on fake “COVID-19 Payment” emails to deliver the Zeus Sphinx banking trojan to people in the United States, Canada and Australia.
- Hacker group, FIN7 gang, is mailing victims a USB storage device, with a teddy bear and purported $50 gift card to Best Buy, according to Data Breach Today. The USB device is a commercially available tool known as a ‘BadUSB’ that will download and execute a malware payload from an attacker-controlled server.
- Bleeping Computer reports a new phishing campaign has been spotted that pretends to be from a local hospital telling the recipient that they have been exposed to the Coronavirus and need to be tested.
- Times of crisis bring out the best in people, and the worst in scammers – as you can hear in these sample calls from Coronavirus scammers pretending to be from the Social Security Administration, offering fake Coronavirus tests to Medicare recipients, and attempting to scare small businesses into buying bogus online listing services.
We Can Secure Your Remote Infrastructure
IT managers must prioritize cybersecurity as they transition employees to work remotely. This massive shift in operations to a less secure home environment poses significant risks that must be managed.
Get a curated briefing of the week's biggest cyber news every Friday.
Intelligence and Insights

Aligning Your Incident Response Plan with NIST SP 800-61 Rev. 3
This article offers key updates in the latest NIST guidance, why they’re significant, and what practical steps you can take to update your organization’s incident response plan …

CEO Checklist: How To Know If Your Organization Is Cyber Secure
This CEO Checklist is a starting point for executive oversight – to spot gaps, test what your team is telling you, & prioritize where to invest attention/budget …

Guide to Penetration Testing and Advanced Techniques in Penetration Testing Services
Penetration testing is the interactive nature of the control evaluation. Unlike static assessments, penetration testing services involve dynamic interaction with the system …