The coronavirus pandemic has created an environment of fear and uncertainty that cybercriminals are actively exploiting. As people search for information about the outbreak, malicious actors attempt to take advantage of heightened emotions to distribute malware and steal data. This article examines the key ways cybercriminals are leveraging the COVID-19 crisis and provides recommendations on how individuals and organizations can protect themselves.
Malware Hidden in Maps and Dashboards
As the virus has spread globally, interactive maps and dashboards tracking the number of cases have proliferated online. While many of these resources provide legitimate information, some contain malware that infects visitors’ devices.
Cybercriminals create maps that appear to show the spread of coronavirus. When users click on the map to enlarge it or see additional details, malware is secretly installed on their device. This allows hackers to steal sensitive information, install ransomware, or take control of the infected system.
To avoid this threat, only use reputable sources like the WHO or Johns Hopkins for coronavirus maps and data. Be wary of email links claiming to lead to updated case statistics, as they may install malware.
Phishing Emails Promising Health Information
Another common tactic is phishing emails discussing the coronavirus outbreak. These messages often pretend to be from health organizations and contain links purporting to provide safety tips, news updates, or access to vaccines and test kits.
In reality, the links lead to phishing websites designed to trick users into inputting their credentials or downloading malware. With many citizens understandably hungry for authoritative information, these fake coronavirus emails can be very convincing.
Scrutinize senders’ email addresses in messages about COVID-19, as official organizations will use their real domains. Avoid opening attachments or clicking links in unsolicited messages, and be wary of online offers for vaccines, test kits, or miracle cures, as they are likely scams.
Malware Hidden in Mobile Apps
Hackers have developed coronavirus-themed mobile apps infected with malware and published them in official app stores. For example, some apps claim to provide updates on the outbreak or offer symptom trackers or safety tips. Once installed, they can steal sensitive data or spy on users.
Only install mobile apps from official sources like health agencies or known developers. Be suspicious of apps related to coronavirus that come from unknown publishers. Instead of downloading, check for web-based alternatives that don’t require installation. This avoids needlessly exposing your device to malware.
Targeting Remote Workers with Fake VPNs
With the rise in remote work due to COVID-19, cybercriminals have shifted to offering fraudulent VPN services promising secure connections. By mimicking legitimate products, they hope to trap now-remote employees who need access to company networks and data.
The fake VPN apps claim to provide the encryption and access required for remote work. However, they instead give hackers access to all traffic and data sent through them, including login credentials and sensitive work files.
Employers should provide and mandate approved corporate VPNs to prevent breaches. Remote workers should be wary of unsolicited VPN offers and verify any new VPN service is legitimate before installing.
Exploiting COVID-19 Fears for Social Engineering
Beyond malware and phishing campaigns, hackers are exploiting fears around coronavirus to manipulate users and gain access to private data. With citizens anxious for information and solutions, criminals posing as health authorities or researchers can use social engineering tactics to gather sensitive details or persuade targets to install malware.
For example, a hacker may send a message pretending to be from the WHO offering access to an important update on the outbreak. If the victim provides their email address and clicks the link, malware will infect their device. Or a hacker may pose as a medical researcher offering early vaccine access in exchange for a donation or access to the target’s computer to install “required software.”
Avoid offers that seem too good to be true, like early access to vaccines, and verify any COVID-19 communications by contacting the organization directly. If the message is legitimate, the sender will understand the caution. Avoid clicking links or opening attachments without verifying the source first.
How to Protect Yourself from Exploitation
- Be wary of unsolicited emails or messages related to coronavirus, as they may be phishing attempts or contain malware – verify legitimacy before opening
- Only use trusted sources and platforms when looking for COVID-19 maps, data dashboards, health tips, etc.
- Do not install unverified mobile apps related to the pandemic, no matter how convincing – malware is common
- Verify VPN services are legit before installing to connect remotely – fake VPN apps put data at risk
- Avoid offers that seem too good be true about vaccines, cures, etc. – they are likely social engineering
- Never share personal information with unverified medical researchers, health authorities, etc.
The coronavirus pandemic remains a developing situation exploited by malicious actors. By understanding and recognizing the tactics cybercriminals use to take advantage of COVID-19 fears, individuals and organizations can keep themselves safe during this challenging time. Through vigilance and verifying the legitimacy of any communications or offers related to the outbreak, we can prevent hackers from capitalizing on health concerns to distribute malware or steal data.