Researchers from security firm Kaspersky said cybercriminals are exploiting the coronavirus pandemic by actively using the topic in spreading malware such as backdoors and spyware in the past few weeks.
Phishers have long used emails faking business logistics, such as orders and bookings, in order to target organizations and spread malware in email attachments. The more these emails resemble reality and contain correct information, the better they work in fooling the victims and with the coronavirus outbreak making the headlines daily, scams are only becoming more convincing.
Kaspersky experts previously shared research about the RevengeHotels campaign, during which cybercriminals sent out targeted booking emails mimicking various trustworthy organizations and even real people, going on to infect hotel computers and being able to steal clients’ credit card data.
This type of phishing is especially dangerous for employees of organizations that sell goods – they often receive requests for supplies and various orders. It is difficult to determine whether an email is real or not, even for very careful and attentive employees, which is why the number of scams is continuing to grow, Kaspersky said.
In the most recent cases, cybercriminals have referred to delivery issues caused by the pandemic: from their supplier in China not being able to produce the products on time, to checking if the victim would be able to fulfill the order that they have agreed to. In some cases, cybercriminals discuss urgent orders and this puts pressure on victims.
The main purpose of these emails is to make the victim open a malicious attachment, ultimately infecting the device and giving cybercriminals remote control or access to the organization’s system. In order to trigger them to do so, cybercriminals ask victims to check delivery information, payment or order details that seemingly are in the attachment.
“Such phishing schemes are not as widespread as the regular ones we usually see, but they are often focused on a specific group of organizations and are quite regularly targeted. The best medicine from such a threat is a good security solution that can detect various threats in attachments and has a database of cataloguing these types of scams. The other piece of advice is remaining calm and attentive to details, and this is something we need to continue doing regardless of any external circumstances,” commented Tatyana Shcherbakova, Kaspersky’s senior Web content analyst.
To minimize the risk of falling victim to spam and phishing, Kaspersky offered some tips on how to recognize it:
- Carefully look at the files extensions. If it is an executable file, it is most likely not safe to open.
- Check whether the company that sent you an email actually exists and look it up in a web search or on social media. If you cannot find any evidence of its existence, reconsider whether you should be working with such firm.
- Check whether the information in the automatic signature and in the ‘Sent’ field is the same. If it is different, it is likely that the email was sent by a spammer.
Kaspersky said cybercriminals can create fake documents by using information about the company they are pretending to be. Even if the information in the official email is the same as on the official resources of the organization, but there still doubt on its safety, users are advised to reach out to the company in order to get a confirmation of the email having been sent.
Kaspersky also recommends organizations follow these cybersecurity practices:
- Implement cybersecurity awareness training for your employees to teach them how to recognize phishing emails, so they do not open attachments or click on links from unknown or suspicious addresses. To reinforce skills, regularly conduct simulated phishing attacks.
- Use a dedicated cybersecurity solution that have mail threat protection along with Web threat protection, behavior detection, and exploit prevention capabilities.
- Make sure that the security solution, as well as any other software used in a company, is regularly updated.