Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Scams, Fraud and Misinformation: How Cybercriminals are Taking Advantage of Coronavirus

Which Security Testing is Right for Your Enterprise? - Security Magazine
March 13, 2020

Concern over the Coronavirus (COVID-19) has dominated global headlines. And now cybercriminals are using all tools at hand to take advantage of this concern to spread phishing and social engineering scams and misinformation. 

Almost immediately following the emergence of confirmed infections throughout the world and the U.S., the Digital Shadows Photon Research team found multiple examples of email phishing campaigns, fraudulent goods, and disinformation campaigns, all geared toward exploiting people’s fear and uncertainty for personal gain. 

Among the findings, cybercriminals are aiming to exploit people’s fear and uncertainty using three core tactics:

  1. Phishing and social engineering scams
  2. Sale of fraudulent or counterfeit goods
  3. Misinformation

While COVID-19 itself presents a significant global security risk to individuals and organizations across the world, cybercriminal activity around this global pandemic can result in financial damage and promote dangerous guidance, ultimately putting additional strain on efforts to contain the virus, warns the research team. 

Most notably, says the research team, reports of email phishing campaigns using COVID-19-related lures surfaced almost immediately after confirmed infections began increasing in January 2020. Health organizations such as the World Health Organization (WHO) and US Centers for Disease Control and Prevention (CDC) have been prime targets for impersonation due to their perceived authority: Attackers have been observed tempting victims with URLs or document downloads using promises of important safety documentation or infection maps, such as the Johns Hopkins Center for Systems Science and Engineering (CSSE) map. 

According to Digital Shadows, in February 2020, a user initiated a thread on the Russian cybercriminal forum XSS to advertise a method to deliver malware via an email attachment disguised as a John Hopkins map of the virus’s outbreak. The offering was priced at $200 for a “private build”, and if buyers also required a Java CodeSign certificate, the price would be $700. 

Another phishing scam, as detailed by Sophos, impersonated an official email correspondence from the WHO, which contained a link to purported document on preventing the spread of the virus, but redirected victims to a malicious domain which attempted to harvest credentials. But, organizations like the WHO or CDC are not the only ones at risk of being impersonated. "Since January 2020, the number of COVID-19-related domains registered has increased significantly: Digital Shadows has identified over 1,400 domains registered over the past three months. Malicious domains can be used to spread misinformation, host phishing pages, impersonate legitimate brands, and sell fraudulent or counterfeit items," notes the blog. 

In March 2020, says the research team,  the UK’s National Fraud Intelligence Bureau (NFIB) reported over 21 cases of COVID-19-related fraud schemes, resulting in losses of over £800,000 in the UK alone. The NFIB cited specific examples which included the fraudulent sale of face masks and sites which promised victims a map of COVID-19 infections near them in return for a bitcoin payment.

Lastly, Digital Shadows warns about the dangers of misinformation, or "infodemic," where COVID-19-related misinformation has primarily been spread via social media and private messaging platforms. However, social media platforms such as Facebook,Twitter and Instagram, and search engines like Google have also manually intervened to help fight the spread of misinformation.  

In addition, Security Magazine spoke to Tom Pendergast, Chief Learning Officer at MediaPro, about the rise of cyber threats as universities, schools, workplaces and other organizations switch to digital learning or work-from-home arrangements to fight the spread of the COVID-19 virus. Pendergast says, "You can count on cybercriminals for one thing: they will jump to take advantage of a crisis. Sure enough, we’re starting to see reports across the media of scams related to the coronavirus. Just today, my mom reported that she saw an invitation to contribute to a GoFundMe effort to support people who have lost their jobs as a result of this crisis. Imagine my pleasure when she then said: “But I figured there was no way I could tell if this was a scam or not, so I just deleted it.” You’ve been listening!"

"That skeptical turn of thought is one we all need to apply with special urgency these days: it you can’t be absolutely sure a request for help or even a request to click a link is legitimate, the best thing to do is to keep scrolling, turn away, or delete it," adds Pendergast. "Now more than ever, we need to turn to trusted sources of information to be sure we’re getting the straight story. As for enterprise security, they’re always working on keeping out bogus information from their network. But with people working from home more these days, they’ve got to remind people to use a VPN to take advantage of these network protections.”

Chris Hazelton, Director of Security Solutions at Lookout, notes that working from home or online education programs are not new. "However, a large, immediate migration of people from enterprise and university networks that are closely monitored and secured, to largely unmonitored and often unsecure home WiFi networks, creates a very large target of opportunity for cybercriminals. These users are outside the reach of perimeter based security tools, and will likely have higher exposure to phishing and network attacks. Cyberattacks are going to leverage the coronavirus where they can, attacks that take advantage of Maslow's hierarchy of needs, concern for personal safety and loved ones, will have significant success," says Hazelton. 

"Students and workers remaining at home, or possibly stranded in a remote locations are going to be heavily dependent on their mobile devices. Mobile attacks are particularly effective because they often trigger immediate responses from recipients - instant communication platforms like SMS, iMessage, WhatsApp, WeChat, and others," Hazelton concludes. 

Joseph Carson, chief security scientist and Advisory CISO at Thycotic, told Security Magazine that “Cybercriminals will always take advantage of global catastrophes. They will typically try to exploit those who will attempt to provide financial support and will launch many fake websites, such as Coronavirus tracking websites or medical advice websites, in an attempt to get victims to transfer money to help the victims.  At a time like this, where many events are being cancelled, cybercriminals will attempt to take advantage of this by luring them with phishing scams on fake news, refunds, changes of schedules and many other ways to get victims to give up their credit card information or credentials. This is common for any catastrophe where cybercriminals can use phishing scams for financial fraud.”

For more detailed information, please visit the Digital Shadows blog.

KEYWORDS: coronavirus cyber security cybersecurity phishing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • holiday-shopping

    How cybercriminals are taking advantage of deals and discounts this holiday season

    See More
  • Untitled.png

    Lessons learned from COVID-19: How cybercriminals took advantage of financial institutions

    See More
  • cyber 3 responsive default

    Taking a Closer Look at Remote Workplace Fraud Vulnerabilities: How to Mitigate Escalating Threats

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing