Tuesday, April 30, 2024

COVID-19 Pandemic – Beware of Fraudulent Websites Advertised Selling Face Masks

Cybercriminals continue to take advantage of the current coronavirus situation to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.

We have already detailed number of cyber attacks that taking advantage of the coronavirus pandemic situation.

The strain of Coronavirus currently making its way around countries in Asia, Europe, and North America was first identified in Wuhan, China and is called the 2019 Novel Coronavirus (2019-nCoV).

Attackers disguise emails as official notifications from public health centers and come with attachments that promise to provide more details on preventative measures against corona-virus infections.

The number of newly registered domains related to coronavirus has increased since the outbreak has become more widespread.

Disinformation Campaign

Threat actors continue to attack the various organization, including the ones that research the COVID-19 virus. Talos observed a fraud and disinformation campaign using that takes advantage of the COVID themes.

The website was advertised to sell medical masks and they also advertised as free shipping of the face mask. This website appears to be fraudulent.

Multiple email campaigns have been detected by security firms monitoring for the latest threats, all of which use coronavirus as a hook to try and get victims to open infected messages.

Organizations must deploy strong policies and security teams must look for keywords on this on their email gateway. Since it’s easy to lure victims into a trap.

It is quite common for threat actors to exploit basic human emotions such as fear – especially if a global event has already caused terror and panic.

Now, most of the people started working from home with fewer security defenses in place, already the current situation is undesirable, any cyberattacks could make it worse. User’s should be more vigilant about the attacks.

We recommend you to stay safe at home and while surfing online.

Website

Latest articles

Threat Actor Claims Selling of Dell Database with 49M User Records

A threat actor reportedly sells a database containing 49 million user records from Dell,...

Google Blocks 2.28M Malicious Apps Entering The Play Store

A safe and trusted Google Play experience is our top priority.We leverage our...

LightSpy Malware Actively Targeting MacOS Devices

BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be...

New Android Malware Mimic As Social Media Apps Steals Sensitive Data

A new RAT malware has been discovered to be targeting Android devices. This malware...

Safari Vulnerability Exposes EU iOS Users to Malicious Marketplaces

A serious concern has arisen for iPhone users in the European Union as a...

Kaiser Permanente Cyber Attack Exposes 13.4 Million Users Data

Kaiser Permanente, one of the largest healthcare providers in the United States, was the...

Darkgate Malware Leveraging Autohotkey Following Teams

Researchers have uncovered a novel infection chain associated with the DarkGate malware.This Remote Access...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles