Cybercriminals continue to take advantage of the current coronavirus situation to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.
We have already detailed number of cyber attacks that taking advantage of the coronavirus pandemic situation.
The strain of Coronavirus currently making its way around countries in Asia, Europe, and North America was first identified in Wuhan, China and is called the 2019 Novel Coronavirus (2019-nCoV).
Attackers disguise emails as official notifications from public health centers and come with attachments that promise to provide more details on preventative measures against corona-virus infections.
The number of newly registered domains related to coronavirus has increased since the outbreak has become more widespread.
Threat actors continue to attack the various organization, including the ones that research the COVID-19 virus. Talos observed a fraud and disinformation campaign using that takes advantage of the COVID themes.
The website was advertised to sell medical masks and they also advertised as free shipping of the face mask. This website appears to be fraudulent.
Multiple email campaigns have been detected by security firms monitoring for the latest threats, all of which use coronavirus as a hook to try and get victims to open infected messages.
Organizations must deploy strong policies and security teams must look for keywords on this on their email gateway. Since it’s easy to lure victims into a trap.
It is quite common for threat actors to exploit basic human emotions such as fear – especially if a global event has already caused terror and panic.
Now, most of the people started working from home with fewer security defenses in place, already the current situation is undesirable, any cyberattacks could make it worse. User’s should be more vigilant about the attacks.
We recommend you to stay safe at home and while surfing online.
Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z Series…
Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware targeting…
A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies and…
Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall firewalls.…
Seashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated…
EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the…