Update COVID-19 Cybercrime

COVID-19 Update 4/1/2020

During the COVID-19 crisis, our analysts are tracking open-source information sources to keep our followers up to date with COVID-19 Cybercrime. Today’s report:

  • As consumers ramp up their online spending, the criminals who hack websites to digitally "skim" credit card numbers are having a field day, Wired magazine reports. Digital skimming activity — the injection of malicious code into legitimate websites to grab payment data — increased 20 percent between February and March, a security analyst reported.
  • Popular video-conferencing Zoom is leaking personal information of at least thousands of users, including their email address and photo, and giving strangers the ability to attempt to start a video call with them through Zoom, Motherboard reports.
  • For the third time in as many months, the FBI warned that cybercriminals and state-sponsored hackers are using Kwampirs malware in supply chain and healthcare-related attacks, SC Magazine reports.

    “The FBI assesses Kwampirs actors gained access to a large number of global hospitals through vendor software supply chain and hardware products,” the alert said. “Infected software supply chain vendors included products used to manage industrial control system (ICS) assets in hospitals.”

We Can Secure Your Remote Infrastructure

IT managers must prioritize cybersecurity as they transition employees to work remotely. This massive shift in operations to a less secure home environment poses significant risks that must be managed.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Intelligence and Insights

log management

How A Log Management Assessment Can Prepare Your Organization for a Cyber Attack

This article delves into the significance of log analysis in a forensic readiness assessment and outlines best practices for organizations to optimize their log management strategies …
Business Impact Assessments

Importance of Business Impact Assessments

In the event of a data breach, Business Impact Assessments will help your organization prioritize recovery steps and get back to business faster …
cybersecurity incident response

How to Choose the Right Tabletop Scenario for Incident Response Testing

To effectively combat these threats, organizations must invest in robust cybersecurity incident response strategies …