Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/13/2020
11:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Coronavirus-Related Cyber Attacks Jump 30%

Check Point Researchers document 192,000 coronavirus-related cyberattacks a week, citing impersonations of WHO, UN, and Zoom.

In the past two weeks, Check Point researchers documented 192,000 coronavirus-related cyber attacks a week, marking a 30% increase when compared to previous weeks. As researchers unpack that number, they cite a key observation: impersonations.

Hackers Impersonate WHO and UN

The World Health Organization (WHO) is a popular name hackers impersonate. Recently, cyber criminals sent malicious emails posing as the WHO from the domain “who.int” with the email subject “Urgent letter from WHO: First human COVID-19 vaccine test/result update” to lure victims into a trap. The emails contained a file named “xerox_scan_covid-19_urgent information letter.xlxs.exe” that contained the infamous Agent Tesla malware, a password stealing program that comes with a key logger for hackers to gather usernames and passwords from a victim’s device. Victims who clicked on the file ended up downloading the malware.

In addition, Check Point researchers found two examples of extortion emails allegedly sent by the United Nations (UN) and WHO that requested for funds to be sent into bitcoin wallets.

Zoom-like Domains Registrations Heighten

In the last 3 weeks, around 2,449 new Zoom-related domains were registered, in which 1.5% of these domains are malicious (32) and 13% are suspicious (320). Since January 2020 to date, a total of 6,576 Zoom-like domains have been registered globally. If you do the math, this means that nearly 37% of Zoom-related domains were registered in the last 3 weeks alone, since the advent of coronavirus pandemic.

Hackers Impersonate Microsoft Teams and Google Meets

Both Microsoft Teams and Google Meet are also being used to lure people into traps. Recently, victims fell prey to phishing emails that came with the subject “You have been added to a team in Microsoft Teams“. The emails contained a malicious URL, http://login\.microsoftonline.com-common-oauth2-eezylnrb\.medyacam\.com/common/oauth2/, and victims ended up downloading malware when clicking on the “Open Microsoft Teams” icon that led to this URL.  The actual link for Microsoft Teams is “https://teams.microsoft.com/l/team”.

Researchers also found fake Google Meets domains like “Googelmeets\.com”, which was first registered on April 27, 2020. The link did not lead victims to an actual Google website.

Coronavirus-related Domain Registrations Heighten

In the past three weeks, almost 20,000 (19,749) new coronavirus-related domains were registered, of which 2% of these domains are malicious (354) and another 15% are deemed suspicious (2,961).

Since the beginning of the outbreak, a total of 90,284 new coronavirus-related domains have been registered globally.

The Themes and Trends of Coronavirus-related Domain Registrations

As researchers analyzed the new coronavirus-related domains registered, they observed that the domains reflected the chronology of different stages of the pandemic outbreak.

  1. At the beginning of the outbreak, domains related to live maps (tracking geographic areas that saw a rise in coronavirus cases) were very common, as well as domains related to coronavirus symptoms.
  2. Towards the end of March, the focus shifted to relief packages and stimulus payments due to the economic plans executed by several countries.
  3. Then, domains related to life after the coronavirus became more common, as well as domains about a possible second wave of the virus.
  4. Along the entire pandemic timeframe, domains related to tests kits and vaccines remain very common, with slight increases as time goes on.

Check Point’s Manager of Data Research, Omer Dembinsky:

“We’ve noticed a change in the last three weeks. Hackers have gone into over-drive to take advantage of the coronavirus pandemic. If you unpack these latest cyber attacks, the theme of impersonation is a clear and strong one, especially around the WHO, the UN and Zoom. For example, the number of Zoom-like domain registrations in the past three weeks alone is staggering. More than ever, it is important to beware of lookalike domains and to be extra caution of unknown senders.”

How to Stay Protected

To stay safe, Check Point outlines the following guidelines:

  1. Beware of lookalike domains. Watch for spelling errors in emails or websites, and unfamiliar email senders.
  2. Beware of unknown senders. Be cautious with files received via email from unknown senders, especially if they prompt for a certain action you would not usually do.
  3. Use authentic sources. Ensure you are ordering goods from an authentic source. One way to do this is to NOT click on promotional links in emails, and instead, Google your desired retailer and click the link from the Google results page.
  4. Beware of “special” offers. “An exclusive cure for coronavirus for $150” is usually not a reliable or trustworthy purchase opportunity. At this point of time there is no cure for the coronavirus and even if there was, it definitely would not be offered to you via an email.
  5. Do not reuse passwords. Make sure you do not reuse passwords between different applications and accounts.
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Hunny, I looked every where for the dorritos. 
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
CVE-2020-8570
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
CVE-2020-8554
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...