Wednesday, May 22, 2024

COVID-19 Pandemic – Beware of Fraudulent Websites Advertised Selling Face Masks

Cybercriminals continue to take advantage of the current coronavirus situation to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.

We have already detailed number of cyber attacks that taking advantage of the coronavirus pandemic situation.

The strain of Coronavirus currently making its way around countries in Asia, Europe, and North America was first identified in Wuhan, China and is called the 2019 Novel Coronavirus (2019-nCoV).

Attackers disguise emails as official notifications from public health centers and come with attachments that promise to provide more details on preventative measures against corona-virus infections.

The number of newly registered domains related to coronavirus has increased since the outbreak has become more widespread.

Disinformation Campaign

Threat actors continue to attack the various organization, including the ones that research the COVID-19 virus. Talos observed a fraud and disinformation campaign using that takes advantage of the COVID themes.

The website was advertised to sell medical masks and they also advertised as free shipping of the face mask. This website appears to be fraudulent.

Multiple email campaigns have been detected by security firms monitoring for the latest threats, all of which use coronavirus as a hook to try and get victims to open infected messages.

Organizations must deploy strong policies and security teams must look for keywords on this on their email gateway. Since it’s easy to lure victims into a trap.

It is quite common for threat actors to exploit basic human emotions such as fear – especially if a global event has already caused terror and panic.

Now, most of the people started working from home with fewer security defenses in place, already the current situation is undesirable, any cyberattacks could make it worse. User’s should be more vigilant about the attacks.

We recommend you to stay safe at home and while surfing online.


Latest articles

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

A phishing email with a malicious zip attachment initiates the attack. The zip contains...

OmniVision Technologies Cyber Attack, Hackers Stolen Personal Data in Ransomware Attack

OmniVision Technologies, Inc. (OVT) recently disclosed a significant security breach that compromised its clients'...

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

The widely used team workspace corporate wiki Confluence has been discovered to have a...

Threat Actors Leverage Bitbucket Artifacts to Breach AWS Accounts

In a recent investigation into Amazon Web Services (AWS) security breaches, Mandiant uncovered a...

Hackers Breached Western Sydney University Microsoft 365 & Sharepoint Environments

Western Sydney University has informed approximately 7,500 individuals today of an unauthorized access incident...

Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

Memcyco Inc., provider of digital trust technology designed to protect companies and their customers...

DoppelGänger Attack: Malware Routed Via News Websites And Social Media

A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles