SlideShare a Scribd company logo
1 of 3
Download to read offline
Severity:
HIGH
C​ORONAVIRUS​ R​ELATED​ S​CAMS
​ B​Y
K​AWTHAR​ A​BDULLA
C​YBER​ T​HREAT​ A​NALYST
Reference: CTM-ADV-0320-1
Date: 23rd March 2020
Category: Scams
THREAT TARGETS:
● All Sectors & Industries
● General Public
POSSIBLE IMPACTS:
● Compromise of financial credentials &
confidential data
● Compromise of user data
● Financial, Reputational and Data loss
TARGET AUDIENCE FOR CIRCULATION:
● Administrators of internet facing
infrastructure services
● IT security team, Management & Staff
Description
As the current pandemic crisis has scaled across the globe, there has already been a surprisingly large number of
cyber crime related incidents. Cybercriminals are using the novel COVID-19 issue as a base for their attacks,
which includes spreading malware through files containing information about Coronavirus, fake news to spread
worldwide fear, panic, and even scams related to masks or cures.
Researchers have found pdfs, mp4s and Docx files camouflaged as documents connected with the virus. The files
are advertised to have some instructions or advice about the virus and even remedies that are completely false.
The malicious files can destroy, block, modify, or copy the data of victims’ machines. Moreover, these threats are
capable of interfering with the operation of computers and their networks.
Following are the names detected for the malicious files:
● Worm.VBS.Dinihou.r
● Worm.Python.Agent.c
● UDS:DangerousBoject.Multi.Generic
● Trojan.WinLNK.Agent. gg
● Trojan.WinLNK.Agent.ew
● HEUR:Trojan.WinLnk.Agent.gen
● HEUR:Trojan.PDF.Badur.b
A recent campaign had been identified, where the attackers target industries such as manufacturing, industrial,
finance, transportation, pharmaceutical and cosmetics.
Copyright ©2020 CTM360® www.ctm360.com 1
#staysafe #‫ﻛﻠﻨﺎ_ﻓﺮﯾﻖ_اﻟﺒﺤﺮﯾﻦ‬
Severity:
HIGH
Attackers, in this case, are sending malicious emails to the victims warning them about the impact of the
coronavirus on their respective industries. The emails contain a Word document attachment that will help in
exploiting a Microsoft Office vulnerability discovered back in 2017 which drops AZORult information-stealing
malware.
Coronavirus related scams:
1. Emotet
Coronavirus based malicious emails have been spreading. Based on researchers, the most common
language for these emails is Japanese. Which may indicate that Asia is the most targeted region.
2. Fake news
As Coronavirus spreads, so does fake news. cybercriminals have been leveraging the panic for their own
gain, by manipulating media content.
3. Fake Alerts
The public demand is to be up to date with the latest news on the Coronavirus, however, this opens
doors to scammers sending out fake news alerts that may be phishing emails/websites containing
malware, malicious content and more.
4. Face Mask scams
The growing demand for face masks leads to online shopping scams and financial loses by consumers
5. Phishing scams
Phishing emails having malicious URLs and attachments under the theme of Coronavirus awareness have
also increased.
6. Fake Cures
Scammers are also posting some fake cures and dangerous claims for Coronavirus via Social Media
platforms and blogs.
Recommendation
CTM360 recommends the following tips to help people identify and avoid such campaigns:
1. Be wary of any posts or messages that cause you to feel any strong emotions such as fear, as attackers
use this as a way to attract their victims.
2. Steer clear of opening e-mail and attachments from unknown sources.
3. Ensure not to give any personal or financial information to an unverified contact.
4. Ensure the antivirus and anti-malware on your computer are up to date.
Copyright ©2020 CTM360® www.ctm360.com 2
#staysafe #‫ﻛﻠﻨﺎ_ﻓﺮﯾﻖ_اﻟﺒﺤﺮﯾﻦ‬
Severity:
HIGH
5. Avoid downloading .exe or .lnk format documents from untrusted sources.
6. Ignore online offers for vaccinations against coronavirus.
7. Always rely on verified sources with strong reputations for your information and services.
8. If you come across such scams, please email us at ​report@ctm360.com
Organizations should to adhere to the following best practices:
1. Use trusted sources, such as legitimate government websites — for up-to-date, fact-based information
about COVID-19.
2. Organizations should ensure that remote access technologies are configured securely so that employees
can conduct business securely from home, also using multi-factor authentication should be encouraged.
3. Individuals should keep away from using unauthorized personal devices for work, and ensure "personal
devices will need to have the same level of security as a company-owned device, and you will also need
to consider the privacy implications of employee-owned devices connecting to a business network."
4. Watch out for emails and files received from unknown senders. Most importantly, check a sender's email
address for authenticity, don't open unknown attachments or click on suspicious links, and avoid emails
that ask them to share sensitive data such as account passwords or bank information.
NOTE: Organizations can contact us for a Threat Intel Feed on COVID-19 through Cyber Blindspot (CBS),
a product of CTM360.
References:
● https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-used-in-spam-malware-file-
names-and-malicious-domains
● https://www.performanta.com/resources/coronavirus-fears-exploited-by-newly-registered-domains/
● https://cybersecuritynews.com/fake-coronavirus-maps/
● https://gbhackers.com/malware-via-weaponized-coronavirus-lure-documents/
● https://usa.kaspersky.com/blog/coronavirus-used-to-spread-malware-online/20213/
● https://www.securityweek.com/coronavirus-themed-emails-deliver-malware-phishing-scams
Disclaimer
The information contained in this document is meant to provide general guidance and brief information to the intended recipient pertaining to the incident and
recommended action. Therefore, this information is provided "as is" without warranties of any kind, express or implied, including accuracy, timeliness, and
completeness. Consequently, under NO condition shall CTM360®, its related partners, directors, principals, agents or employees be liable for any direct, indirect,
accidental, special, exemplary, punitive, consequential or other damages or claims whatsoever including, but not limited to: loss of data, loss in profits/business,
network disruption…etc., arising out of or in connection with this advisory.
For more information:
Email: monitor@ctm360.com​ ​Tel: (+973) 77 360 360
Copyright ©2020 CTM360® www.ctm360.com 3
#staysafe #‫ﻛﻠﻨﺎ_ﻓﺮﯾﻖ_اﻟﺒﺤﺮﯾﻦ‬

More Related Content

What's hot

Phishing Education
Phishing EducationPhishing Education
Phishing EducationBrandProtect
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Executive threat monitoring
Executive threat monitoringExecutive threat monitoring
Executive threat monitoringMichael Kiefer
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015RapidSSLOnline.com
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersUnited Security Providers AG
 
Cybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfCybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfFiyona Nourin
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thrsmile790243
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportSymantec
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsOPSWAT
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Mehrdad Jingoism
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sectorinnov-acts-ltd
 

What's hot (20)

Phishing Education
Phishing EducationPhishing Education
Phishing Education
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Executive threat monitoring
Executive threat monitoringExecutive threat monitoring
Executive threat monitoring
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Cybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfCybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdf
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr7122017 cyber espionage is alive and well apt32 and the thr
7122017 cyber espionage is alive and well apt32 and the thr
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Phishing
PhishingPhishing
Phishing
 

Similar to Cyber Threat Advisory: Coronavirus Related Scams

Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicCyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicUmang Singh
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? XNSPY
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesPYA, P.C.
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxmeghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryHow COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2Conf
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfkirtigoyal328
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Studentsrainrjcahili
 

Similar to Cyber Threat Advisory: Coronavirus Related Scams (20)

Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post PandemicCyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
Cyber Crime Statistics and Trends in COVID-19 Pandemic and Post Pandemic
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work Guidelines
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
techalpha07
techalpha07techalpha07
techalpha07
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryHow COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 

More from CTM360

Secure web conferencing for c level executives
Secure web conferencing for c level executivesSecure web conferencing for c level executives
Secure web conferencing for c level executivesCTM360
 
Unlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel ScamsUnlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel ScamsCTM360
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDECTM360
 
The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017CTM360
 
Cyber Warrior - Business in Gulf 2017
Cyber Warrior - Business in Gulf  2017Cyber Warrior - Business in Gulf  2017
Cyber Warrior - Business in Gulf 2017CTM360
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016 CTM360
 
TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents CTM360
 
XSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesXSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesCTM360
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domainsCTM360
 
CTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messengerCTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messengerCTM360
 

More from CTM360 (10)

Secure web conferencing for c level executives
Secure web conferencing for c level executivesSecure web conferencing for c level executives
Secure web conferencing for c level executives
 
Unlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel ScamsUnlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel Scams
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017
 
Cyber Warrior - Business in Gulf 2017
Cyber Warrior - Business in Gulf  2017Cyber Warrior - Business in Gulf  2017
Cyber Warrior - Business in Gulf 2017
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents
 
XSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesXSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilities
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
 
CTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messengerCTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messenger
 

Recently uploaded

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 

Recently uploaded (20)

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 

Cyber Threat Advisory: Coronavirus Related Scams

  • 1. Severity: HIGH C​ORONAVIRUS​ R​ELATED​ S​CAMS ​ B​Y K​AWTHAR​ A​BDULLA C​YBER​ T​HREAT​ A​NALYST Reference: CTM-ADV-0320-1 Date: 23rd March 2020 Category: Scams THREAT TARGETS: ● All Sectors & Industries ● General Public POSSIBLE IMPACTS: ● Compromise of financial credentials & confidential data ● Compromise of user data ● Financial, Reputational and Data loss TARGET AUDIENCE FOR CIRCULATION: ● Administrators of internet facing infrastructure services ● IT security team, Management & Staff Description As the current pandemic crisis has scaled across the globe, there has already been a surprisingly large number of cyber crime related incidents. Cybercriminals are using the novel COVID-19 issue as a base for their attacks, which includes spreading malware through files containing information about Coronavirus, fake news to spread worldwide fear, panic, and even scams related to masks or cures. Researchers have found pdfs, mp4s and Docx files camouflaged as documents connected with the virus. The files are advertised to have some instructions or advice about the virus and even remedies that are completely false. The malicious files can destroy, block, modify, or copy the data of victims’ machines. Moreover, these threats are capable of interfering with the operation of computers and their networks. Following are the names detected for the malicious files: ● Worm.VBS.Dinihou.r ● Worm.Python.Agent.c ● UDS:DangerousBoject.Multi.Generic ● Trojan.WinLNK.Agent. gg ● Trojan.WinLNK.Agent.ew ● HEUR:Trojan.WinLnk.Agent.gen ● HEUR:Trojan.PDF.Badur.b A recent campaign had been identified, where the attackers target industries such as manufacturing, industrial, finance, transportation, pharmaceutical and cosmetics. Copyright ©2020 CTM360® www.ctm360.com 1 #staysafe #‫ﻛﻠﻨﺎ_ﻓﺮﯾﻖ_اﻟﺒﺤﺮﯾﻦ‬
  • 2. Severity: HIGH Attackers, in this case, are sending malicious emails to the victims warning them about the impact of the coronavirus on their respective industries. The emails contain a Word document attachment that will help in exploiting a Microsoft Office vulnerability discovered back in 2017 which drops AZORult information-stealing malware. Coronavirus related scams: 1. Emotet Coronavirus based malicious emails have been spreading. Based on researchers, the most common language for these emails is Japanese. Which may indicate that Asia is the most targeted region. 2. Fake news As Coronavirus spreads, so does fake news. cybercriminals have been leveraging the panic for their own gain, by manipulating media content. 3. Fake Alerts The public demand is to be up to date with the latest news on the Coronavirus, however, this opens doors to scammers sending out fake news alerts that may be phishing emails/websites containing malware, malicious content and more. 4. Face Mask scams The growing demand for face masks leads to online shopping scams and financial loses by consumers 5. Phishing scams Phishing emails having malicious URLs and attachments under the theme of Coronavirus awareness have also increased. 6. Fake Cures Scammers are also posting some fake cures and dangerous claims for Coronavirus via Social Media platforms and blogs. Recommendation CTM360 recommends the following tips to help people identify and avoid such campaigns: 1. Be wary of any posts or messages that cause you to feel any strong emotions such as fear, as attackers use this as a way to attract their victims. 2. Steer clear of opening e-mail and attachments from unknown sources. 3. Ensure not to give any personal or financial information to an unverified contact. 4. Ensure the antivirus and anti-malware on your computer are up to date. Copyright ©2020 CTM360® www.ctm360.com 2 #staysafe #‫ﻛﻠﻨﺎ_ﻓﺮﯾﻖ_اﻟﺒﺤﺮﯾﻦ‬
  • 3. Severity: HIGH 5. Avoid downloading .exe or .lnk format documents from untrusted sources. 6. Ignore online offers for vaccinations against coronavirus. 7. Always rely on verified sources with strong reputations for your information and services. 8. If you come across such scams, please email us at ​report@ctm360.com Organizations should to adhere to the following best practices: 1. Use trusted sources, such as legitimate government websites — for up-to-date, fact-based information about COVID-19. 2. Organizations should ensure that remote access technologies are configured securely so that employees can conduct business securely from home, also using multi-factor authentication should be encouraged. 3. Individuals should keep away from using unauthorized personal devices for work, and ensure "personal devices will need to have the same level of security as a company-owned device, and you will also need to consider the privacy implications of employee-owned devices connecting to a business network." 4. Watch out for emails and files received from unknown senders. Most importantly, check a sender's email address for authenticity, don't open unknown attachments or click on suspicious links, and avoid emails that ask them to share sensitive data such as account passwords or bank information. NOTE: Organizations can contact us for a Threat Intel Feed on COVID-19 through Cyber Blindspot (CBS), a product of CTM360. References: ● https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-used-in-spam-malware-file- names-and-malicious-domains ● https://www.performanta.com/resources/coronavirus-fears-exploited-by-newly-registered-domains/ ● https://cybersecuritynews.com/fake-coronavirus-maps/ ● https://gbhackers.com/malware-via-weaponized-coronavirus-lure-documents/ ● https://usa.kaspersky.com/blog/coronavirus-used-to-spread-malware-online/20213/ ● https://www.securityweek.com/coronavirus-themed-emails-deliver-malware-phishing-scams Disclaimer The information contained in this document is meant to provide general guidance and brief information to the intended recipient pertaining to the incident and recommended action. Therefore, this information is provided "as is" without warranties of any kind, express or implied, including accuracy, timeliness, and completeness. Consequently, under NO condition shall CTM360®, its related partners, directors, principals, agents or employees be liable for any direct, indirect, accidental, special, exemplary, punitive, consequential or other damages or claims whatsoever including, but not limited to: loss of data, loss in profits/business, network disruption…etc., arising out of or in connection with this advisory. For more information: Email: monitor@ctm360.com​ ​Tel: (+973) 77 360 360 Copyright ©2020 CTM360® www.ctm360.com 3 #staysafe #‫ﻛﻠﻨﺎ_ﻓﺮﯾﻖ_اﻟﺒﺤﺮﯾﻦ‬