SDN — Science & Digital News

Beware, Cybercriminals ‘Weaponizing’ Covid-19 to Attack Businesses

Media Release:

THE coronavirus or COVID-19 pandemic has affected businesses around the world, putting particular pressure on organizations that rely on international trade. Cybercriminals around the world have not missed the trend and, as discovered by Kaspersky researchers, started actively using the topic in spreading malware such as backdoors and spyware in the past few weeks.

Phishers have long used emails faking business logistics, such as orders and bookings, in order to target organizations and spread malware in email attachments. The more these emails resemble reality and contain correct information, the better they work in fooling the victims and with the coronavirus outbreak making the headlines daily, scams are only becoming more convincing.

Last autumn Kaspersky experts shared research about the RevengeHotels campaign, during which cyber criminals sent out targeted booking emails mimicking various trustworthy organizations and even real people, going on to infect hotel computers and being able to steal clients’ credit card data.

This type of phishing is especially dangerous for employees of organizations that sell goods – they often receive requests for supplies and various orders. It is difficult to determine whether an email is real or not, even for very careful and attentive employees, which is why the number of scams is continuing to grow.

Scammers, exploit, 'data-leak compensation scheme', Kaspersky, cybersecurity

In the most recent cases, cybercriminals have referred to delivery issues caused by the pandemic: from their supplier in China not being able to produce the products on time, to checking if the victim would be able to fulfill the order that they have agreed to. In some cases, cybercriminals discuss urgent orders and this puts pressure on victims.

The main purpose of these emails is to make the victim open a malicious attachment, ultimately infecting the device and giving cybercriminals remote control or access to the organization’s system. In order to trigger them to do so, cybercriminals ask victims to check delivery information, payment or order details that seemingly are in the attachment.

The attachment in this “urgent orde”’ is in fact a backdoor that enables remote access to the infected device. Kaspersky products detect it as Backdoor.MSIL.NanoBot.baxo

“Such phishing schemes are not as widespread as the regular ones we usually see, but they are often focused on a specific group of organizations and are quite regularly targeted. The best medicine from such a threat is a good security solution that can detect various threats in attachments and has a database of cataloguing these types of scams. The other piece of advice is remaining calm and attentive to details, and this is something we need to continue doing regardless of any external circumstances,” comments Tatyana Shcherbakova, Kaspersky’s senior web content analyst.

To minimize the risk of your business falling victim to spam and phishing, here are some tips on how to recognize it:

Kaspersky also recommends organizations follow these cybersecurity practices:

Exit mobile version