Bots

#TECH: Misinformation on Covid-19 reaches new heights

OUR dependency on the Internet for news on Covid-19 has caused us become the target of cyber criminals.

As the virus continues to spread across the world, users are increasingly being left confused with fake information being distributed online at a very high rate.

Cybercriminals are among the first to jump on this activity, taking advantage of unsuspecting users.

According to Kaspersky's senior web content analyst, Tatyana Shcherbakova, the company found emails offering products such as masks, a topic commonly used in Nigerian spam emails.

"We also found scam emails with phishing links and malicious attachments," she says.

Using WHO

One of the latest spam campaigns mimics the World Health Organization (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"Users receive emails allegedly from WHO, which supposedly offer information about safety measures to be taken to avoid infection. Once a user clicks on the link embedded in the email, they are redirected to a phishing website and prompted to share personal information, which ends up in the hands of cybercriminals," says Shcherbakova.

"This scam looks more realistic than other examples we have seen lately, such as alleged donations from the World Bank or IMF for anyone who needs a loan," she adds.

In order to stay safe, Kaspersky advises users to carefully study the content of the emails they receive and only trust reliable sources.

"If you are promised a vaccine for the virus or some magic protective measures, or content of the email is making you worried, it has most likely come from cybercriminals," she says.

This is especially true if the sender suggests clicking on a link and sharing your personal data or opening an attachment.

"You should not donate any real money or trust information with promises to help those affected by the virus, even if the email comes from someone who introduces themselves as an employee of a trusted organisation," says Shcherbakova.

She says people need double check the email address, as scammers often use free email services or addresses that have no relation to the organisation mentioned.

“Coronavirus” on your device

Kaspersky detection technologies have also found malicious files disguised as documents related to the virus. The malicious files were masked under the guise of pdf, mp4 and docx files about the coronavirus.

The names of files imply that they contain video instructions on how to protect yourself from the virus, updates on the threat and even virus detection procedures, which is not actually the case. In fact, these files contained a range of threats, from Trojans to worms, which are capable of destroying, blocking, modifying or copying data, as well as interfering with the operation of computers or computer networks.

Some malicious files are spread via email.

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organization (WHO) was in fact a Trojan-Downloader, which secretly downloads and installs another malicious file. This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Meanwhile, Kaspersky's malware analyst, Anton Ivanov, says the coronavirus, which is being widely discussed as a major news story, has already been used as bait by cybercriminals.

Now, the number of users whose devices have had malicious files named after the coronavirus on them has risen to 403 in 2020, with a total of 2,673 detections and 513 unique files distributed. While the numbers rose significantly compared to the initial statistics we have shared, this threat is still rather minimal.

How to secure your remote workplace:

Governments and businesses across the world are increasingly encouraging home working in a bid to slow the spread of Covid-19.

"It is likely that, where feasible, companies will allow more people than ever before to work remotely, so now is a good time for organisations to re-examine security around remote access to corporate systems," says Ivanov.

"Once devices are taken outside of a company’s network infrastructure and are connected to new networks and Wifi, the risks to corporate information increase," he says.

Kaspersky's principal security researcher, David Emm, urges companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution.

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home. In addition to the increase in remote working, we have also seen cybercriminals trying to piggyback on the virus, hiding malicious files in documents purporting to relate to the disease," he says.

"With this opportunistic approach by criminals, coupled with changes to working habits, it’s wise for businesses to be extra vigilant at this time,” he says.

Steps to reduce the cyber-risks associated with home working:

1.Provide a VPN for staff to connect securely to the corporate network

2.All corporate devices – including mobiles and laptops – should be protected with appropriate security software, including mobile devices (e.g. allowing data to be wiped from devices that are reported lost or stolen, segregating personal and work data, along with restricting which apps can be installed)

3.Always implement the latest updates to operating systems and apps

4.Restrict the access rights of people connecting to the corporate network

5.Ensure that staff are aware of the dangers of responding to unsolicited messages

Most Popular
Related Article
Says Stories