search3
    How Hackers have Are Using COVID-19 as a Tool?
    Latest Tech news Right in

    YOUR INBOX!

    Receive News Alerts, Special Info and other offers!
    We Respect your Privacy. Your Information will not be shared.

    How Hackers have Are Using COVID-19 as a Tool?

    334
    Shubham Mehta | Mar 26, 2020 | 302 Views | 0 Comments
    How Hackers have Are Using COVID-19 as a Tool?

    With the global pandemic, hackers are back with another trap to take advantage of the situation. The current situation has proven to be a blessing in disguise, where threat actors have taken advantage of the situation with another set of scams or malware campaigns. Checkpoint in one of their reports on 18th March 2020 has confirmed that the hackers are exploiting the COVID-19 disruption.


    This led hackers in becoming successful where they have captured the cybersecurity market with their infection of malicious registrations on Coronavirus-related domains. Where these hackers are selling malware off-the-shelf in the dark web at discounted prices.it has been seen that cyber attackers are actually selling their products in the dark web where COVID19 is a discount that this used by them to aspiring cyber attackers to get those products.


    Checkpoint has also reported that malicious coronavirus-related domains are being used since the beginning of January 2020. In just three weeks there have been six thousand weekly registration received on the darknet for the same. These attackers are selling tools like WinDefender bypass and build to bypass email & chrome security.


    In fact, it has been spotted that another group of cyberattackers is selling tools like "SSHacker" that is used to hack into Facebook at a 15% discount. In fact, to hack into Mackbook Air, True Mac is being sold for $390 at corona offer.


    Here is a list of coronavirus themed attacks


    • APT36 (Pakistani thread actor that targets the defenses of the Indian embassy and government) that was found running phishing campaign using coronavirus-themed document baits that masqueraded as health advisors to deploy the Crimson Remote Administration Tool (RAT) on the systems of the target.
    • IssueMakersLab has revealed a malware campaign created by North Koreans. At least 3 cases were recorded by Recorded Future where they observed that these three cases had COVID-19 code to get their product.
    • The Malspam campaign targeted the cosmetic, pharmaceutical, industrial, finance, manufacturing, and transportation industries.
    • All these industries were attacked via Microsoft Word document using a two and a half-year-old Microsoft office bug in Equation Editor to install AZORult malware. AZORult info stealer has been distributed using a fraud version of the Johns Hopkins Coronavirus Map.
    • COVID19 Tracker (is a fake coronavirus) is being used by hackers that have allowed them to hack into mobile phones(especially android phones) and take charge of the sensitive data. In fact, they even have been able to install CovidLock ransomware for which they are charging $100 bitcoin ransom.
    • Students are being targeted through phishing attacks with bogus emails
    • Comment spamming attacks on websites contain links that show information coronavirus, however, it redirects the users to dubious drug-selling businesses.

    How can you stay secured in times like such?


    It is pretty clear that these attackers are exploiting people who are sacred from coronavirus and are using COVID-19 as a source of their revenues. Given the current circumstances of the markets being locked down, it is essential to avoid victims falling for such online scams. One can practice good digital hygiene:-


    • Businesses should ensure that they are accessing secured & remote technologies that include the usage of multi-factor authentication that allows employees to continue business activities with ease and secrecy.
    • Individuals should stay away from using unauthorized personal devices like phones. Since mobile phones are lesser secured as compared to company-owned devices.
    • Stay careful from the emails received from an unknown sender this will authenticate the issue iff it is sent to you with the intention to attempt fraud or share genuine details.
    • Use trusted sources like legitimate government websites to get right and fact-based information on COVID-19

    This content is brought to you by Mercury Solutions Limited, one of the best IT Training Company in India. Mehar Ahluwalia, the founder, with a vision of making the professionals’ career more fulfilling, is dedicated to delivering world-class IT Training programs and Certifications to the global participants.
    Tags : how Hackers Using COVID-19 as a tool, Hackers Using COVID-19 , hackers news, ethical hacking, covid in hacking
     

    Mercury Solutions Ltd. https://bit.ly/2H3ANjF is rated 4.6 stars by www.facebook.com/mercurysol based on 18 reviews.