Site icon Secplicity – Security Simplified

Hackers Exploit Coronavirus Fears in Phishing and Malware Campaigns

It seems hackers will take advantage of any major news story or world event to launch their attacks. At a time of heightened fear, your employees’ email and social media accounts are flooded with news reports, comments, videos, and links about the virus. Unfortunately, cyber criminals are exploiting fears to phish your users, hack their systems, or deliver malware. Here are just a few examples of how threat actors are taking advantage of coronavirus:

During this time of crisis, employees, especially those working remotely, are prime targets for cyber criminals. Phishing attacks specifically have skyrocketed, with dozens of malicious domains exploiting coronavirus deployed each day. Many of these campaigns use well-known phishing kits, simply repurposed for the times.[1]

COVID-19 MALICIOUS DOMAIN FEEDS

A variety of people track malicious domains and other intelligence and share it openly with the security community for use in DNS-filtering solutions. Many of these intelligence sources have ramped up their efforts to detect and classify malicious domains exploiting the coronavirus outbreak and provide regular updates to their feeds against these specific attacks.

WatchGuard continually curates and adds updates our intelligence sources to address the latest threats, protecting your network and users from opportunistic criminals. To that end, WatchGuard DNSWatch and DNSWatchGO now include three independent feeds of malicious domains related to COVID-19, including those from Centro Criptológico Nacional CERT. Additional intelligence feeds will be added as the threat picture evolves.

Secure Your Users with a FREE trial of DNSWatchGO from WatchGuard

For a limited time, WatchGuard is offering DNSWatchGO free for 120 days for up to 250 users. To get started, visit the WatchGuard website or request a trial through your preferred WatchGuard Security Partner.

[1] https://threatpost.com/covid-19-scam-scramble-cybercrooks-recycle/154383/

Exit mobile version