Breaking

Coronavirus themed cyberattacks continues to evolve: Malware and Booby-trapped URLs

Cyber industry is concerned about the new threats leveraging the corona virus anxiety. A few days back, The Cybersecurity Times published an article on the phishing campaign that clouted into people’s fear and made them open malicious attachments disguised to be corona-based advisories and precautions. This week, security professionals have identified substantial amount of new threats like booby-trapped URLs, coronavirus themed malware, and credential stuffing manoeuvres.

On March 3rd, researchers identified two new malware campaigns linked to the corona virus, first one spreads via phishing email to deploy Remcos RAT and malware, while the second one through Microsoft Office document dropping a backdoor into the victim’s computer. 

The former disguises as a corona virus safety measures PDF, with a EXE file for Remcos RAT deployment which can run with a VBS file. This is found to be a sophisticated move, as the malware can clearly evade detection by firewalls as it establishes a TLS protection, thanks to Zlab-Yoroi Cybaze for sharing this with the cyber community. 

Once the systems are infected, the victims are asked to download and install two EXE files, and then the VBSscript is used for initiating the attack. On the other hand, MalwareHunterTeam, discovered a corona virus themed MS Office document which was pretended to be from Public Health Centre of Ukraine. This malicious document comes with macros that is designed to drop a backdoor into victim’s computers and can steal clipboard information, key-logging and even take screenshots of the infected computer.

Something even more threatening is, as per Check Point’s report there have been 4,000 corona virus related domains registered world wide. Among them, 3% of the domains are found to be malicious and 5% are suspicious. More fake emails pretending to be from Centre of Disease Control (CDC) are being broadcasted to take advantage of people’s anxiety and fear. A phished page is used for obtaining the credentials and when the user types in the password, the browser navigates the user to the legitimate CDC website keeping the attack absolutely sneaky.

How to stay safe against Corona Virus based cyber scams?

It’s surprising to see how attackers are taking advantage of such a concerning situation, this pandemic is already driving people crazy and employees have started working remotely. Cyberthreats like corona virus themed malware, booby-trapped URLs, back doors, and phishing campaigns are going to be around for a while, and users are advised to check their emails with caution, do not download unknown attachments from anonymous senders, and always look for pushing content in the emails.

While IT departments need to force strong data security policies like browser isolation, automated patch management, security information and event management (SIEM), log management, user and entity behavior analytics (UEBA), blacklisting and whitelisting applications, email security management, content management, device management and more to keep their employees, clients and partners secured and safe from corona virus themed cyberattacks.

Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago