Tuesday, April 8, 2025
HomeCyber AttackHackers Using COVID-19 Training Lure to Attack Office 365 Users

Hackers Using COVID-19 Training Lure to Attack Office 365 Users

Published on

SIEM as a Service

Follow Us on Google News

Coronavirus poses a huge impact globally, most of the countries in lockdown and some countries returning to some sort of normality.

Organizations also under risk of being impacted by a malicious coronavirus-related website depends on whether the country it is located in has gone back to business or is still under lockdown.

New COVID-19 Training Lure

COVID-19 continues to pose a serious threat for organizations, so organizations implemented testing programs to prevent employees from infection.

- Advertisement - Google News

Checkpoint researchers observed the Cybercriminals distributing phishing emails and malicious files disguised as Covid-19 training materials.

The email is trying to lure the victim in signing up for a fake employee training web page, once the victim enters the login credentials it will be sent to the attacker’s server.

When the user opens the email and clicks on the attachment it displays the following image. But in the background, it downloads two malicious files.

Cyberattacks found to be increased by 16% in May when compared to March and April. Starting from June 2,451 new domains registered, out of 91 found malicious and 66 are suspicious.

Attackers taking advantage of the Coronavirus fear to continuously exploit online users by infecting their mobile with various tactics and techniques.

Cybercriminals continue to create phishing emails with this Coronavirus as the email subject or put in the email body to lure victims to click on links or download unwanted files.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Hackers Using Zoom’s Popularity in Coronavirus Outbreak to Infect Computers With Malware

Beware of Coronavirus-themed Attack that Attacks Windows Computer to Install’s Lokibot Malware

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actor Leaks Data from Major Bulletproof Hosting Provider Medialand

A threat actor disclosed internal data from Medialand, a prominent bulletproof hosting (BPH) provider...

Morphing Meerkat: A PhaaS Utilizing DNS Reconnaissance to Generate Targeted Phishing Pages

Originally discovered in 2020 as a Phishing-as-a-Service (PhaaS) platform, Morphing Meerkat has since evolved...

Hackers Abuse Windows .RDP Files to Launch Unauthorized Remote Desktop Sessions

The Google Threat Intelligence Group (GTIG) has unearthed a novel phishing campaign leveraging Windows...

Linux 6.15-rc1 Released: Better Drivers, Faster Performance

The Linux kernel community has witnessed another milestone with the release of Linux 6.15-rc1,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actor Leaks Data from Major Bulletproof Hosting Provider Medialand

A threat actor disclosed internal data from Medialand, a prominent bulletproof hosting (BPH) provider...

Morphing Meerkat: A PhaaS Utilizing DNS Reconnaissance to Generate Targeted Phishing Pages

Originally discovered in 2020 as a Phishing-as-a-Service (PhaaS) platform, Morphing Meerkat has since evolved...

Hackers Abuse Windows .RDP Files to Launch Unauthorized Remote Desktop Sessions

The Google Threat Intelligence Group (GTIG) has unearthed a novel phishing campaign leveraging Windows...