Hackers Using COVID-19 Training Lure to Attack Office 365 Users

Coronavirus poses a huge impact globally, most of the countries in lockdown and some countries returning to some sort of normality.

Organizations also under risk of being impacted by a malicious coronavirus-related website depends on whether the country it is located in has gone back to business or is still under lockdown.

New COVID-19 Training Lure

COVID-19 continues to pose a serious threat for organizations, so organizations implemented testing programs to prevent employees from infection.

Checkpoint researchers observed the Cybercriminals distributing phishing emails and malicious files disguised as Covid-19 training materials.

The email is trying to lure the victim in signing up for a fake employee training web page, once the victim enters the login credentials it will be sent to the attacker’s server.

When the user opens the email and clicks on the attachment it displays the following image. But in the background, it downloads two malicious files.

Cyberattacks found to be increased by 16% in May when compared to March and April. Starting from June 2,451 new domains registered, out of 91 found malicious and 66 are suspicious.

Attackers taking advantage of the Coronavirus fear to continuously exploit online users by infecting their mobile with various tactics and techniques.

Cybercriminals continue to create phishing emails with this Coronavirus as the email subject or put in the email body to lure victims to click on links or download unwanted files.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Hackers Using Zoom’s Popularity in Coronavirus Outbreak to Infect Computers With Malware

Beware of Coronavirus-themed Attack that Attacks Windows Computer to Install’s Lokibot Malware

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

4 hours ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

4 hours ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

5 hours ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

5 hours ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

5 hours ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

18 hours ago