Hackers continue to profit from coronavirus
According to Checkpoint Software Technologies Ltd, the company that specializes in providing computer security solutions, the coronavirus pandemic has been a springboard for cyber-mallening activities even for the past 4 months.
To believe that the theme is not about to run out of steam anytime soon. Indeed, Checkpoint has observed in recent weeks a sharp increase in attempts on the basis of phishing. The cybersecurity firm reports a more than 30% increase in pandemic-based cyberattacks since the beginning of May. It accounts for about 192,000 acts of cyber malice per week worldwide. These actions are organized around fake web platforms. These sites are centered around the theme of the moment with often variations: "coronavirus," "Corona" or "CoviD." And the same policy is used for files, emails and associated attachments.
This article will also interest you: Coronavirus as the main theme for phishing campaigns
Title spoofing is always the order of the day. While this has been present since the beginning, hackers continue to use visual identities, logos of international organizations such as WHO, companies (such as Google, Microsoft, Netflix or Zoom) or other agencies in public (especially ministries of health). Here again the objective remains the same. Encourage users to provide them with certain personal information such as names and surnames, passwords, dates of birth of locations, usernames, and even sensitive information such as credit card or credit card number. The conclusion is simple, containment has made things easier for them. Indeed, people confined to their homes often have no choice but to be constantly on the Internet, to be entertained, study and inform themselves and even work. All this has made the average individual more vulnerable than usual. "Pirates pretend to be trustworthy organizations and send emails or instant messages. While the coronavirus epidemic has forced people to remain confined to their homes and developed telework and digital communications, this year has created unprecedented opportunities for hackers," Checkpoint researchers said in a statement.
The most visible impact of containment has been the increased development of email fraud, according to the researchers. Indeed, Google has informed that more than 18 million emails are used on a daily basis for malicious purposes, especially for phishing, only on Gmail. The US giant also revealed that nearly 240 million spams are delivered daily on the coronavirus pandemic. This demonstrates greatly, the danger posed by malicious emails, they are so numerous that it is almost difficult if not impossible to distinguish them from real emails.
It is absolutely important to note that while attempts at cyber-healing have multiplied through e-mails, it is important to be even more careful, especially for companies, which have their employees in telework. Because, a lot of data hacking involving companies started with a phishing email. Exactly 32% according to Verizon's Data Breach Investigations 2019 report. The study also found that 78% of computer espionage activities involved the use of malicious emails. In the space of 3 weeks, Checkpoint researchers discovered 2,449 new websites whose domain names are associated with the disease. And these domain names were all fraudulent. These platforms typically mimic big names such as Zoom and Microsoft Teams. The most widely used remote collaboration tools in recent moments.
The techniques used by cyber criminals have not changed at all as we said earlier. This is a situation that points to a fairly significant problem. Indeed, it is simply understandable that Internet users do not learn, neglect or listen sufficiently to the recommendations and advice given to them for their digital hygiene. He should know that you should never click on any link from a message, received from a so-called international organization or to the department. "An official email will never ask you to do this type of thing," the security firm's experts said.
Now access an unlimited number of passwords: