Forewarned is forearmed: Kaspersky researchers share their findings on coronavirus scams for users and businesses

  • By : Mohamed Shauky

    Kaspersky researchers have found multiple COVID-19-related malicious e-mail campaigns and hundreds of downloadable files that attempt to infect users’ devices with the threats. While news on coronavirus spread continue to appear and dominate the headlines, attackers are also looking for opportunities to use this topic in malicious purposes. This is a very dangerous practice, as it exploits people’s concerns for their health and safety of their beloved ones in attempt to pressure them into falling for a trick.

    The researchers have detected malicious files that were masked under the guise of pdf, mp4 and docx files about the coronavirus. The names of files imply that they contain video instructions on how to protect yourself from the virus, updates on the threat and even virus detection procedures, which is not actually the case. In fact, these files contained threats to users’ devices.

     «The coronavirus, which is being widely discussed as a major news story, has already been used as bait by cybercriminals. Now, the number of users whose devices have had malicious files named after the coronavirus on them has risen to 403 in 2020, with a total of 2,673 detections and 513 unique files distributed. While the numbers rose significantly compared to the initial statistics we have shared, this threat is still rather minimal,» - comments Anton Ivanov, malware analyst at Kaspersky.

    An infected Excel file was attached in the email that allegedly included information about the victims of coronavirus

    Some malicious files are spread via email. For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organization (WHO) was in fact a Trojan-Downloader, which secretly downloads and installs another malicious file. This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

    An email allegedly from WHO leads to a phishing website that gathers victims’ personal data

    Security researcher Tatyana Scherbakova, has elaborated on the mechanics of such scams: “We were detecting emails offering products such as masks leading to phishing websites or fake offerings of vaccines, since the COVID-16 epidemic started. Yet lately we saw a more elaborate spam campaigns that mimic the World Health Organization (WHO). Cybercriminals recognize the important role WHO has in providing trustworthy information about the coronavirus. Users receive emails allegedly from WHO, which supposedly offer information about safety measures to be taken to avoid infection. Once a user clicks on the link embedded in the email, they are redirected to a phishing website and prompted to share personal information, which ends up in the hands of cybercriminals. This scam looks more realistic than other examples we have seen lately”.

     

    Some spam emails contain fake information about wondrous vaccines developed for coronavirus

    In the meantime, governments and businesses across the world are increasingly encouraging home working in a bid to slow the spread of COVID-19/coronavirus. It is likely that, where feasible, companies will allow more people than ever before to work remotely, so now is a good time for organizations to re-examine security around remote access to corporate systems. Once devices are taken outside of a company’s network infrastructure and are connected to new networks and WIFI, the risks to corporate information increase.

     We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home. In addition to the increase in remote working, we have also seen cybercriminals trying to piggyback on the virus, hiding malicious files in documents purporting to relate to the disease. So, with this opportunistic approach by criminals, coupled with changes to working habits, it’s wise for businesses to be extra vigilant at this time,” comments David Emm, principal security researcher, Kaspersky.

    There are a number of simple steps that can be taken to reduce the cyber-risks associated with coronavirus.

    If you are an individual, Kaspersky advises the following:

    In order to stay safe, we advise users to carefully study the content of the emails they receive and only trust reliable sources. If you are promised a vaccine for the virus or some magic protective measures, or content of the email is making you worried, it has most likely come from cybercriminals.

    When downloading files, pay attention to the file extension. Even if you download TV show episodes from a source you consider trusted and legitimate, the file should have an .avi, .mkv or mp4 extension. Do not download the file if it is an .exe.

    Use reliable security solution for comprehensive protection from a wide range of threats, such as Kaspersky Total Security.

    If you are a business, consider taking the following steps:

    Provide a VPN for staff to connect securely to the corporate network

    All corporate devices – including mobiles and laptops – should be protected with appropriate security software, including mobile devices (e.g. allowing data to be wiped from devices that are reported lost or stolen, segregating personal and work data, along with restricting which apps can be installed)

    Always implement the latest updates to operating systems and apps

    Restrict the access rights of people connecting to the corporate network

    Ensure that staff are aware of the dangers of responding to unsolicited messages



    حمّل تطبيق Alamrakamy| عالم رقمي الآن