Avast_Blog_ViewPoints: The other coronavirus epidemic: cybercrime
#1
Lightbulb 
Quote:
[Image: TVDumYE.png]

Cybercriminals prey on fear during the COVID-19 for their own gain.

The global Coronavirus pandemic is a terrible and frightening experience for everyone. But this virus carries its own parasites – an epidemic of cybercriminals preying on the fear of COVID-19.

Just as the speed and effect of the virus expanding across the world has taken everyone by surprise, so the growth of the criminal parasites living off it has been remarkable. Avast has already published numerous reports on Coronavirus-themed attacks, and advice for home workers and others in lockdown – such as an alleged Russian disinformation campaign; advice to hospitals that have come under increased attack; advice on how to stay sane at home (don’t dismiss this – police are already braced for an increase in domestic violence during, and caused by, the lockdown); and the public release of Coronavirus threat telemetry from Avast’s own Apklab.io research facility.

Threat overview

Here we’re going to take a broad sweep of the latest examples of these threats so that people can understand the extent, diversity and danger of the epidemic. The first thing to understand is that most of the threats – not all – include some form of social engineering. Coronavirus is purpose built for this. The most successful social engineering triggers are fear and urgency. Many people are more afraid now than they have ever been, and are urgently seeking anything that might offer news, hope or consolation.

So, here’s the first bit of advice – treat anything offering Coronavirus information with the same caution and social distancing you use for the virus itself. Only if you are 100% certain, after reflection, that the link and source are safe should you even consider going any further.

A second wave of threats Is best described as Coronavirus-related rather than Coronavirus-themed. Working from home (WFH), distance learning and always-on children is something new and strange to many of us. Cybercriminals are taking advantage of that newness and our lack of experience in this new normal. So, the second recommendation is simply, ‘be careful’. Don’t assume the VPN you read about last year or were offered yesterday is safe. Research everything new that you do (and that includes browser extensions where the number of downloads is no indication of security); and if you do need new apps or services, try to get them from a known and trusted source only; such as Avast’s own VPN offering.

The third piece of advice is not to assume that your own common sense will keep you safe from everything – it won’t. If you haven’t got a good and up-to-date anti-malware solution installed on all of your devices, now is the time to get one.

Recent attacks

What follows is a broad overview of some of the recent cyber scams and threats that have evolved on the back of coronavirus. It is only a very small percentage of what is going on, but hopefully enough to give some indication of the depth, range, speed and versatility of the modern cybercriminal.

Working, and studying, from home

Zoombombing

Both working and learning from home in the lockdown have led to a dramatic increase in the use of online video conferencing apps -- such as Zoom. Some of these apps do not have sufficient security, while new users often don't know how to use the apps securely. This has led to a rise in what is known as zoombombing; that is, gate-crashing the video conference and interjecting… well, whatever -- but often pornography or lewd photographs.

The problem isn't limited to Zoom. On March 26, it was reported that Norwegian students on a school video call found themselves watching a naked man engaged in lewd activity. This was not Zoom, and demonstrates that the issue is not limited to Zoom. It can occur whenever an attacker can find or guess the video conference URL. The solutions are to keep the URL private, to apply an access password where possible, to limit video access (the teacher/conference leader does not really need to see the viewers), to disable 'join before host', and to prevent anyone who is removed from rejoining.

Hackers are attacking home routers -- Linksys and probably D-Link -- to redirect people at home to a malicious site that offers a false 'COVID-19 Inform App'. The app claims to be provided by the World Health Organization (WHO), but is an infostealer called Oski. The attack on the router is probably a brute-force attempt at the password; so, it is important to change all passwords associated with your home router to new, unique strong passwords.

Phishing and malware

A campaign of emails pretending to come from Dr. Tedros Adhanom Ghebreyesus, Director-General, World Health Organization, commenced on March 19. The recipient is addressed by name; but this is simply stripped out of the email address. The email carries an attachment that includes the Agent Tesla malware -- a keylogger and infostealer.

A phishing campaign pretending to come from a major bank was reported on March 23. The email offered financial relief on credit card bills. A 'Start Here' button sent victims to a genuine-looking bank landing page. The landing page asked for card details (including CVV number).

The Ginp banking trojan has a new functionality. If installed, it can receive a command from the hackers to open a webpage called 'Coronavirus Finder'. This offers details of nearby locals who have been infected with the virus, for just €0.75. If agreed, a page is opened for payment. The victim neither receives any information nor is charged the €0.75 -- but that doesn't matter because he or she has already handed over full credit card details to the hacker.

An Android app titled as a Coronavirus Tracker is really scareware. It pretends the hacker has stolen the user's contacts, photos and videos, and will release them to the internet unless $250 is paid. There is no evidence that this malware has been very successful, but it should be considered as a typical coronavirus-themed threat.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Windows 11 may nag you now when your Mic...
Microsoft continue...harlan4096 — 09:57
Bitdefender 27.0.54.271
Bitdefender 27.0.5...harlan4096 — 08:36
360 Total Security 11.0.0.1240
11.0.0.1240 Sep 9,...harlan4096 — 08:02
Vivaldi 7.5 Build 3735.74
Vivaldi 7.5 Build ...harlan4096 — 08:00
Firefox for iOS will summarize web pages...
Mozilla has announ...harlan4096 — 07:59

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (38)fapedDow
avatar (48)pohudidere
avatar (48)rarinsWax
avatar (25)DianaBrown
avatar (38)eqiduseb
avatar (45)ThomasLYDAY
avatar (40)upakoExapy
avatar (49)skepwHug
avatar (38)RicardoGoase
avatar (42)Edwardgef
avatar (43)Denpokhew
avatar (35)azidony
avatar (40)maskbSleew

[-]
Online Staff
There are no staff members currently online.

>