The Corona virus that originated in the city of Wuhan, China is causing tremors across the world with more than 14,000 confirmed cases world wide and 300+ people are already dead. Second country to have the most number of confirmed cases next to China is Thailand with 20 cases followed by Japan with 19 cases, however other major nations has reported around 10 cases, with United States 8, Ausrtralia 7, Germany 8, Britian 2, and India 2.
With Corona outbreak already causing fear among the people, hackers have started exploiting the trend by launching corona based Emotet malware campaign.
Hackers have created many phishing campaigns that are being distributed in the name of Corona. The mailer campaign is attached with a word document that is being specially designed by the hackers to infiltrate systems with Emotet malware once opened, but it is disguised as the preventive measures of Corona virus luring the recipients to open the document, considering the buzz around recipients are more likely to open the document. This malware could extract sensitive data from the devices, get away with browser history information and more.
The Corona malware campaign was reported by IBM X-Force and has stated more Corona Emotet malware campaigns can be expected in future. Dr. Francis Gaffney, Director of Threat Intelligence at Mimecast said the main motive behind the Emotet campaign is “to cause infection or monetary gain”.
Users need to identify the phished mails, try to check the sender’s mail address, the relevancy of the mailer and think twice before clicking on the attachments. A cyber aware community should educate their fellow human beings about the malware campaign and how a lethargic attitude to emails can result in the Corona malware infections that can infiltrate the systems and get away with personal data.
Users should restrain themselves from opening any emails with subject line that includes’Corona’ in the subject line and also completely avoid downloading, clicking or opening the attached documents in those mails.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…