Saturday, March 15, 2025
HomeCyber AttackHackers Using COVID-19 Training Lure to Attack Office 365 Users

Hackers Using COVID-19 Training Lure to Attack Office 365 Users

Published on

SIEM as a Service

Follow Us on Google News

Coronavirus poses a huge impact globally, most of the countries in lockdown and some countries returning to some sort of normality.

Organizations also under risk of being impacted by a malicious coronavirus-related website depends on whether the country it is located in has gone back to business or is still under lockdown.

New COVID-19 Training Lure

COVID-19 continues to pose a serious threat for organizations, so organizations implemented testing programs to prevent employees from infection.

Checkpoint researchers observed the Cybercriminals distributing phishing emails and malicious files disguised as Covid-19 training materials.

The email is trying to lure the victim in signing up for a fake employee training web page, once the victim enters the login credentials it will be sent to the attacker’s server.

When the user opens the email and clicks on the attachment it displays the following image. But in the background, it downloads two malicious files.

Cyberattacks found to be increased by 16% in May when compared to March and April. Starting from June 2,451 new domains registered, out of 91 found malicious and 66 are suspicious.

Attackers taking advantage of the Coronavirus fear to continuously exploit online users by infecting their mobile with various tactics and techniques.

Cybercriminals continue to create phishing emails with this Coronavirus as the email subject or put in the email body to lure victims to click on links or download unwanted files.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Also Read

Hackers Using Zoom’s Popularity in Coronavirus Outbreak to Infect Computers With Malware

Beware of Coronavirus-themed Attack that Attacks Windows Computer to Install’s Lokibot Malware

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and...