From ‘trojan attacks’ to phishing, cybercriminals are making the most of the Coronavirus outbreak.
Hackers are using Coronavirus to spread their own “viruses” online.
Hundreds of websites using the novel virus’ domain have popped in just the two weeks.
Published: undefined
Cybercriminals are running several spam campaigns relating to the outbreak of the virus.
Hackers around the globe have found the virus serving them well as an enabler for their activities.
Several email campaigns and noticeable number of new websites have been registered with domain names related to the virus.
Published: undefined
It was found that from about a 100 domains, the number of websites jumped to 1,000 in one week.
There were over 1,600 web pages that had malicious content.
Many of these domains will probably be used for phishing attempts.
Published: undefined
These website lure the victims to their websites with discussions around the virus.
Most of the scam websites claim to sell face masks, vaccines, and home tests that can detect the virus.
Published: undefined
One such insecure website “vaccinecovid-19.com” offers to sell “the best and fastest test for Coronavirus detection.
The website registered in Russia offers the price of 19,000 Russian rubles (about $300).
Published: undefined
In January and February 2020 the most prominent Coronavirus-themed campaign targeted Japan.
It distributed Emotet in malicious email attachments pretending to be sent by a Japanese disability welfare service provider.
Published: undefined
The emails appeared to be reporting where the infection is spreading in several Japanese cities.
When the document was opened, Emotet was downloaded onto the victim’s computer.
Published: undefined
Emotet is an advanced, self-propagating and modular Trojan.
It was originally a banking Trojan, but recently has been used as a distributor of other malware or malicious campaigns.
It uses multiple methods to maintain persistence and evasion techniques to avoid detection.
It can also spread through phishing spam emails containing malicious attachments.
Published: undefined
Follow us on: Facebook, Twitter, Google News, Instagram
Join our official telegram channel (@nationalherald) and stay updated with the latest headlines
Published: undefined