Ready-made website templates make it simple for criminals to create fake government and NGO websites for COVID-19-related phishing campaigns.

Dark Reading Staff, Dark Reading

May 16, 2020

1 Min Read

Building a phishing campaign using the government's response to the coronavirus as bait became a little easier with the release of COVID-19-themed credential phishing website templates that have hit the malicious markets.

The templates make it simple for criminals to quickly create high-quality, malicious Web domains that mimic key government agencies and non-government organizations involved in fighting COVID-19. In most cases, the look-alike website is a trap for credential mining, capturing information that can be used for identity theft, financial fraud, and enterprise system intrusion.

According to researchers at Proofpoint, who published the news, more than 300 different COVID-19 campaigns have been found since January. And the criminal efforts are truly international: While these efforts are primarily in English, the researchers have also seen campaigns in Japanese, Spanish, Italian, French, Portuguese, Turkish, and other languages.

Read more here.

VIRTUALSUMMIT_DR20_320x50.jpg

 

 

 

 

Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights