FLICK PAST

Coronavirus now attacks the cyber world  

From ‘trojan attacks’ to phishing, cybercriminals are making the most of the Coronavirus outbreak

Africa has been spared so far from coronavirus. Why?
Africa has been spared so far from coronavirus. Why? 

From ‘trojan attacks’ to phishing, cybercriminals are making the most of the Coronavirus outbreak.

Hackers are using Coronavirus to spread their own “viruses” online.

Hundreds of websites using the novel virus’ domain have popped in just the two weeks.

Published: undefined

Cybercriminals are running  several spam campaigns relating to the outbreak of the virus.

Hackers around the globe have found the virus serving them well as an enabler for their activities.

Several email campaigns and noticeable number of new websites  have been registered with domain names related to the virus.

Published: undefined

It was found that from about a 100 domains, the number of websites jumped to 1,000 in one week.

There were over 1,600 web pages that had malicious content.

Many of these domains will probably be used for phishing attempts.

Published: undefined

These website lure the victims to their websites with discussions around the virus.

Most of the scam websites claim to sell face masks, vaccines, and home tests that can detect the virus.

Published: undefined

One such insecure website “vaccinecovid-19.com” offers to sell “the best and fastest test for Coronavirus detection.

The website registered in Russia offers the price of 19,000 Russian rubles (about $300).

Published: undefined

In January and February 2020 the most prominent Coronavirus-themed campaign targeted Japan.

It distributed Emotet in malicious email attachments pretending to be sent by a Japanese disability welfare service provider.

Published: undefined

The emails appeared to be reporting where the infection is spreading in several Japanese cities.

When the document was opened, Emotet was downloaded onto the victim’s computer.

Published: undefined

Emotet is an advanced, self-propagating and modular Trojan.

It was originally a banking Trojan, but recently has been used as a distributor of other malware or malicious campaigns.

It uses multiple methods to maintain persistence and evasion techniques to avoid detection.

It can also spread through phishing spam emails containing malicious attachments.

Published: undefined

Follow us on: Facebook, Twitter, Google News, Instagram 

Join our official telegram channel (@nationalherald) and stay updated with the latest headlines

Published: undefined